SlideShare a Scribd company logo
1 of 22
CYBER-CRIME
DON’T BE A VICTIM
Presenter:
ANSHUMAN TRIPATHI
CONTENTS
• Introduction
• History of cyber crime
• Manifestation
• Categories of cyber crime
• Types of cyber crime
• Statistics of Cyber crimes
• Cyber Laws
• Prevention of Cyber Crime
• Conclusion
• References
INTRODUCTION
• The internet has given rise to new opportunities
in every field we can think of – be it
entertainment, business, sports or education.
• There are two sides to a coin. Internet also has
its own disadvantages. One of the major
disadvantages is Cyber crime – illegal activity
committed on the internet.
HISTORY OF CYBER CRIME
• The first recorded cyber crime took place in the year 1820.
• In 1820, Joseph-Marie Jacquard, a textile manufacturer in
France, produced the loom. This device allowed the
repetition of a series of steps in the weaving of special
fabrics. This resulted in a fear amongst Jacquard's
employees that their traditional employment and livelihood
were being threatened. They committed acts of sabotage to
discourage Jacquard from further use of the new
technology. This is the first recorded cyber crime!
MANIFESTATION
• Cyber-Crime= Cyber+Crime.
• Cyber- The term cyber was first used in 1982 in a science
fiction story ‘Burning Chrome’ by ‘William Gibson’ where it was
referred to as a computer generated virtual reality. In the
modern era anything associated with the internet and the
diverse internet culture comes under the Cyberspace.
• So cyber crime is crimes committed on cyberspace.
• Though there is no technical definition by any statutory body
for Cyber crime, it is broadly defined by the Computer Crime
Research Center as - “Crimes committed on the internet using
the computer either as a tool or a targeted victim.”
CATEGORIES OF CYBER CRIME
• Cyber-Crime Against Persons
• Cyber-Crime Against Property
• Cyber-Crime Against Government
• Cyber-Crime Against Society at large
CYBER-CRIME AGAINST PERSONS
• Hacking: It means unauthorized control/access over computer system and
act of hacking completely destroys the whole data as well as computer
programs. Hackers usually hacks telecommunication and mobile network.
• Cross Site Scripting (XSS): Cross-site scripting (XSS) is a
security exploit in which the attacker inserts malicious coding
into a link that appears to be from a trustworthy source. When
someone clicks on the link, the embedded programming is
submitted allowing the attacker to steal information.
• Vishing: The name comes from “voice” and “phishing” Vishing is the act of
using the telephone in an attempt to scam the user.
• DDoS Attack: In computing, a denial-of-service (DoS) or distributed denial-
of-service (DDoS) attack is an attempt to make a machine or network
resource unavailable to its intended users.
• Phishing: phishers attempt to steal your personal information. They send
out e-mails that appear to come from legitimate websites such as eBay,
PayPal, or other banking institutions and ask for your account and
passwords. Ex-"http://www.ebay.com" is a valid Web addresse,
but "http://www.ebay.validate-info.com" and "http://ebay.login123.com"
are false addresses, which may be used by phishers.
• Harassment via E-Mails: This is very common type of harassment through
sending letters, attachments of files & folders i.e. via e-mails. At present
harassment is common as usage of social sites i.e. Facebook, Twitter etc.
increasing day by day.
• Defamation: It involves any person with intent to lower down the dignity of
the person by hacking his mail account and sending some mails with using
vulgar language to unknown persons mail account.
• Carding: It means false ATM cards i.e. Debit and Credit cards used by
criminals through withdrawing money from the victim’s bank account. There
is always unauthorized use of ATM cards in this type of cyber crimes.
• E-Mail Spoofing: A spoofed e-mail may be said to be one, which misrepresents
its origin. It shows it’s origin to be different from which actually it originates
• SMS Spoofing: Here a offender steals identity of another person in the form of
mobile phone number and sending SMS via internet and receiver gets the SMS
from the mobile phone number of the victim. It is very serious cyber crime
against any individual.
• Child Pornography: In this cyber crime defaulters create, distribute, or access
materials that sexually exploit underage children.
CYBER-CRIME AGAINST PROPERTY
• Cyber Trespass: It means to access someone’s computer or network
without the right authorization of the owner and disturb, alter, misuse, or
damage data or system by using wireless internet connection.
• Transmitting Virus: Viruses are programs written by programmers that
attach themselves to a computer or a file and then circulate themselves to
other files and to other computers on a network. They mainly affect the data
on a computer, either by altering or deleting it. Worm attacks plays major
role in affecting the computer system of the individuals.
• Cyber Squatting: It involves two persons claiming for the same Domain
Name either by claiming that they had registered the name first on by right
of using it before the other or using something similar to that previously. For
example two similar names i.e. www.yahoo.com and www.yahhoo.com
• Intellectual Property Crimes: Intellectual property consists of a bunch of
rights. The most common type of IPR violation may be said to be software
piracy, violation of copyright, trademark, patents, designs and theft of
computer source code etc.
CYBER CRIMES AGAINST GOVERNMENT
• Cyber terrorism is one distinct kind of crime in this category.
The medium of Cyberspace is being used by individuals and
groups to threaten the international governments as also to
threaten the citizens of a country. This crime is called cyber
terrorism when an individual "cracks" into a government or
military maintained website. The Parliament attack in Delhi and
the Mumbai attack fall under this category.
• Every country has its own way of defining cyber crime, which is
odd to its own socio-cultural situations. For instance, in India
defamation is a significant and rampant form of cyber
crime.
CYBERCRIMES AGAINST SOCIETY AT LARGE
• Child Pornography: In this act there is use of computer networks to create,
distribute, or access materials that sexually exploit underage children.
• Online Gambling: Online fraud and cheating is one of the most beneficial
businesses that are growing today in the cyber space. In India a lot of betting and
gambling is done on the name of cricket through computer and internet, credit card
crimes, offering jobs, etc.
• Financial Crimes: This type of offence is common as there is huge growth in the
users of networking sites and phone networking where culprit will try to attack by
sending bogus mails or messages through internet. Ex: Using credit cards by
obtaining password illegally.
• Forgery: It means to deceive large number of persons by sending threatening mails
as online business transactions are becoming the habitual need of today’s life style.
THE TOP 5 MOST BRUTAL CYBER ATTACKS
OF 2014 SO FAR
• eBay
• Domino’s Pizza
• Montana Health Department
• Evernote and Feedly
• P.F. Chang’s Restaurants
Src-https://www.forbes.com
COUNTRY DISTRIBUTION IN CYBERCRIME-2013
TOP TARGETS OF 2013
TOP 10 ATTACK TECHNIQUES IN 2013
CYBER LAWS:
• There is absolutely no comprehensive law on Cybercrime any where in the world.
This is reason that the investigating agencies like FBI are finding the Cyberspace to
be an extremely difficult terrain.
• India had enacted its first Cyber Law through IT Act 2000. It has been amended and
now in 2008 the revised version is under implementation.
• IT Act 2000
• IT Amendment Bill 2006
• IT Amendment Bill 2008
• According to European Convention, there is no exact definition of cyber crime. Every
country has its own way of defining cyber crime, which is peculiar to its own socio-
cultural situations. For instance, in India defamation is a significant and rampant form
of cyber crime.
PREVENTION OF CYBER CRIME
• Sailesh Kumar Zarkar, technical advisor and network security consultant to the
Mumbai Police Cyber crime Cell, advocates the 5P mantra for online security:
Precaution, Prevention, Protection, Preservation and Perseverance.
• One should avoid disclosing any personal information to strangers via e-
mail or while chatting or any social networking site.
• One must avoid sending any photograph to strangers by online as
misusing or modification of photograph incidents increasing day by day.
• An updated Anti-virus software to guard against virus attacks should be
used by all the netizens.
• A person should never send his credit card or debit card number to any
site that is not secured, to guard against frauds.
CONCLUSION
• In cyberspace, cyber crime replace the bytes with bullets.
• Hacking is the thing which need more concentration because most of data
need security.
• The key to protecting yourself is being aware.
• Indian Laws are well drafted and are capable of handling all kinds of
challenges as posed by cyber criminals. However, the enforcement agencies
are required to be well versed with the changing technologies and Laws.” In
times like these we must protect ourselves from cyber crime. Anti-virus
software, firewalls and security patches are just the beginning”.
• There is a whole other world that exists in cyberspace… So make sure
that your information travels safely.
REFERENCES
• International Journal of Advanced Research in Computer Science and Software
Engineering Volume 3, Issue 5, May 2013.
• International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-
2013.
• International Journal Of Engineering And Computer Science ISSN:2319-7242, Volume2
Issue 8 August, 2013 Page No. 2555-2559
• www.forbes.com
THANK YOU

More Related Content

What's hot (20)

Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
The evolution of computer viruses
The evolution of computer virusesThe evolution of computer viruses
The evolution of computer virusesbrya2rexmc
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013Marian Merritt
 
Cyber Wellness Program for the philippines
Cyber Wellness Program  for the philippinesCyber Wellness Program  for the philippines
Cyber Wellness Program for the philippinesSonnie Santos
 
Accomplishments
AccomplishmentsAccomplishments
Accomplishmentscalldoming
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanaomar timawa
 
Philippines Republic act no. 10175
Philippines Republic act no. 10175Philippines Republic act no. 10175
Philippines Republic act no. 10175arsieorgano
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepIBM Security
 
WSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot CampWSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot CampSonnie Santos
 
Topics: Graft and Corruption/Bribery /Cyber Crime: Should there be a law agai...
Topics: Graft and Corruption/Bribery /Cyber Crime: Should there be a law agai...Topics: Graft and Corruption/Bribery /Cyber Crime: Should there be a law agai...
Topics: Graft and Corruption/Bribery /Cyber Crime: Should there be a law agai...Jordan Florentino
 

Viewers also liked (20)

Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
The evolution of computer viruses
The evolution of computer virusesThe evolution of computer viruses
The evolution of computer viruses
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013
 
Cyber Wellness Program for the philippines
Cyber Wellness Program  for the philippinesCyber Wellness Program  for the philippines
Cyber Wellness Program for the philippines
 
Accomplishments
AccomplishmentsAccomplishments
Accomplishments
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
Philippines Republic act no. 10175
Philippines Republic act no. 10175Philippines Republic act no. 10175
Philippines Republic act no. 10175
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
WSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot CampWSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
 
Topics: Graft and Corruption/Bribery /Cyber Crime: Should there be a law agai...
Topics: Graft and Corruption/Bribery /Cyber Crime: Should there be a law agai...Topics: Graft and Corruption/Bribery /Cyber Crime: Should there be a law agai...
Topics: Graft and Corruption/Bribery /Cyber Crime: Should there be a law agai...
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 

Similar to Cyber crime-140128140443-phpapp02 (1)

Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptxClichesin
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaDr. Arun Verma
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptxKoukiGaz
 

Similar to Cyber crime-140128140443-phpapp02 (1) (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Final ppt
Final pptFinal ppt
Final ppt
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 

Recently uploaded

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Cyber crime-140128140443-phpapp02 (1)

  • 1. CYBER-CRIME DON’T BE A VICTIM Presenter: ANSHUMAN TRIPATHI
  • 2. CONTENTS • Introduction • History of cyber crime • Manifestation • Categories of cyber crime • Types of cyber crime • Statistics of Cyber crimes • Cyber Laws • Prevention of Cyber Crime • Conclusion • References
  • 3. INTRODUCTION • The internet has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. • There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
  • 4. HISTORY OF CYBER CRIME • The first recorded cyber crime took place in the year 1820. • In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
  • 5. MANIFESTATION • Cyber-Crime= Cyber+Crime. • Cyber- The term cyber was first used in 1982 in a science fiction story ‘Burning Chrome’ by ‘William Gibson’ where it was referred to as a computer generated virtual reality. In the modern era anything associated with the internet and the diverse internet culture comes under the Cyberspace. • So cyber crime is crimes committed on cyberspace. • Though there is no technical definition by any statutory body for Cyber crime, it is broadly defined by the Computer Crime Research Center as - “Crimes committed on the internet using the computer either as a tool or a targeted victim.”
  • 6. CATEGORIES OF CYBER CRIME • Cyber-Crime Against Persons • Cyber-Crime Against Property • Cyber-Crime Against Government • Cyber-Crime Against Society at large
  • 7. CYBER-CRIME AGAINST PERSONS • Hacking: It means unauthorized control/access over computer system and act of hacking completely destroys the whole data as well as computer programs. Hackers usually hacks telecommunication and mobile network. • Cross Site Scripting (XSS): Cross-site scripting (XSS) is a security exploit in which the attacker inserts malicious coding into a link that appears to be from a trustworthy source. When someone clicks on the link, the embedded programming is submitted allowing the attacker to steal information. • Vishing: The name comes from “voice” and “phishing” Vishing is the act of using the telephone in an attempt to scam the user. • DDoS Attack: In computing, a denial-of-service (DoS) or distributed denial- of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users.
  • 8. • Phishing: phishers attempt to steal your personal information. They send out e-mails that appear to come from legitimate websites such as eBay, PayPal, or other banking institutions and ask for your account and passwords. Ex-"http://www.ebay.com" is a valid Web addresse, but "http://www.ebay.validate-info.com" and "http://ebay.login123.com" are false addresses, which may be used by phishers. • Harassment via E-Mails: This is very common type of harassment through sending letters, attachments of files & folders i.e. via e-mails. At present harassment is common as usage of social sites i.e. Facebook, Twitter etc. increasing day by day. • Defamation: It involves any person with intent to lower down the dignity of the person by hacking his mail account and sending some mails with using vulgar language to unknown persons mail account. • Carding: It means false ATM cards i.e. Debit and Credit cards used by criminals through withdrawing money from the victim’s bank account. There is always unauthorized use of ATM cards in this type of cyber crimes.
  • 9. • E-Mail Spoofing: A spoofed e-mail may be said to be one, which misrepresents its origin. It shows it’s origin to be different from which actually it originates • SMS Spoofing: Here a offender steals identity of another person in the form of mobile phone number and sending SMS via internet and receiver gets the SMS from the mobile phone number of the victim. It is very serious cyber crime against any individual. • Child Pornography: In this cyber crime defaulters create, distribute, or access materials that sexually exploit underage children.
  • 10. CYBER-CRIME AGAINST PROPERTY • Cyber Trespass: It means to access someone’s computer or network without the right authorization of the owner and disturb, alter, misuse, or damage data or system by using wireless internet connection. • Transmitting Virus: Viruses are programs written by programmers that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They mainly affect the data on a computer, either by altering or deleting it. Worm attacks plays major role in affecting the computer system of the individuals. • Cyber Squatting: It involves two persons claiming for the same Domain Name either by claiming that they had registered the name first on by right of using it before the other or using something similar to that previously. For example two similar names i.e. www.yahoo.com and www.yahhoo.com
  • 11. • Intellectual Property Crimes: Intellectual property consists of a bunch of rights. The most common type of IPR violation may be said to be software piracy, violation of copyright, trademark, patents, designs and theft of computer source code etc.
  • 12. CYBER CRIMES AGAINST GOVERNMENT • Cyber terrorism is one distinct kind of crime in this category. The medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to threaten the citizens of a country. This crime is called cyber terrorism when an individual "cracks" into a government or military maintained website. The Parliament attack in Delhi and the Mumbai attack fall under this category. • Every country has its own way of defining cyber crime, which is odd to its own socio-cultural situations. For instance, in India defamation is a significant and rampant form of cyber crime.
  • 13. CYBERCRIMES AGAINST SOCIETY AT LARGE • Child Pornography: In this act there is use of computer networks to create, distribute, or access materials that sexually exploit underage children. • Online Gambling: Online fraud and cheating is one of the most beneficial businesses that are growing today in the cyber space. In India a lot of betting and gambling is done on the name of cricket through computer and internet, credit card crimes, offering jobs, etc. • Financial Crimes: This type of offence is common as there is huge growth in the users of networking sites and phone networking where culprit will try to attack by sending bogus mails or messages through internet. Ex: Using credit cards by obtaining password illegally. • Forgery: It means to deceive large number of persons by sending threatening mails as online business transactions are becoming the habitual need of today’s life style.
  • 14. THE TOP 5 MOST BRUTAL CYBER ATTACKS OF 2014 SO FAR • eBay • Domino’s Pizza • Montana Health Department • Evernote and Feedly • P.F. Chang’s Restaurants Src-https://www.forbes.com
  • 15. COUNTRY DISTRIBUTION IN CYBERCRIME-2013
  • 17. TOP 10 ATTACK TECHNIQUES IN 2013
  • 18. CYBER LAWS: • There is absolutely no comprehensive law on Cybercrime any where in the world. This is reason that the investigating agencies like FBI are finding the Cyberspace to be an extremely difficult terrain. • India had enacted its first Cyber Law through IT Act 2000. It has been amended and now in 2008 the revised version is under implementation. • IT Act 2000 • IT Amendment Bill 2006 • IT Amendment Bill 2008 • According to European Convention, there is no exact definition of cyber crime. Every country has its own way of defining cyber crime, which is peculiar to its own socio- cultural situations. For instance, in India defamation is a significant and rampant form of cyber crime.
  • 19. PREVENTION OF CYBER CRIME • Sailesh Kumar Zarkar, technical advisor and network security consultant to the Mumbai Police Cyber crime Cell, advocates the 5P mantra for online security: Precaution, Prevention, Protection, Preservation and Perseverance. • One should avoid disclosing any personal information to strangers via e- mail or while chatting or any social networking site. • One must avoid sending any photograph to strangers by online as misusing or modification of photograph incidents increasing day by day. • An updated Anti-virus software to guard against virus attacks should be used by all the netizens. • A person should never send his credit card or debit card number to any site that is not secured, to guard against frauds.
  • 20. CONCLUSION • In cyberspace, cyber crime replace the bytes with bullets. • Hacking is the thing which need more concentration because most of data need security. • The key to protecting yourself is being aware. • Indian Laws are well drafted and are capable of handling all kinds of challenges as posed by cyber criminals. However, the enforcement agencies are required to be well versed with the changing technologies and Laws.” In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls and security patches are just the beginning”. • There is a whole other world that exists in cyberspace… So make sure that your information travels safely.
  • 21. REFERENCES • International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 5, May 2013. • International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August- 2013. • International Journal Of Engineering And Computer Science ISSN:2319-7242, Volume2 Issue 8 August, 2013 Page No. 2555-2559 • www.forbes.com