SlideShare a Scribd company logo
1 of 19
CYBER-CRIME
DON’T BE A VICTIM
Presenter:
ANSHUMAN TRIPATHI
Why Should we know about Cyber-
Crime?
 In thisTech-savvy world of 21st Century
every one is engaged with internet,
through whatsapp, twitter, facebook, net-
banking & lots of other platforms are there.
 And some criminal minded persons commit
crimes here, which is included under cyber-
crime.
 So we should be aware about crimes
happening around in the cyber-space.
Objectives
 To provide a general awareness ofCyber-
crime
 To RecognizeCyber-crime methods
 To know the importance ofCyber-laws(LOVE
BUG Suspects+ loss 10$ billion)
 To learn how to keep away from being a
victim
Technical Definition of
CYBER-CRIME.
 When Internet was developed, the founding
fathers of Internet hardly had any inclination that
Internet could also be misused for criminal
activities. Today, there are many disturbing things
happening in cyberspace. Cybercrime refers to all
the activities done with criminal intent in
cyberspace.
 Cyber crime refers to any crime that involves
a computer/mobile and a network.The
computer may have been used in the
commission of a crime, or it may be the
target.
What is Cyber-Crime?
Simple Theory-
 When you purchase a home it comes with
a door and a lock. Youalways ensure that
the door/lock exist and working properly.
You may even purchase security systems.
 Well, why would you not secure your
investments?
 Likewise,Your System is your home and
security tools are your door/lock and
security tools.
 So if someone breaches into your
home’s(System), accesses all your personal
accounts and tampers your data, is the
criminal who is committing the crime.
 And committed crime is known as cyber-
crime.
 That means more precisely we can say that-
 Cyber crime is an illegal activity committed
on the internet.
 Against Persons
 Against Property
 AgainstGovernment
Various categories of Cyber-
Crime.
Cyber Crime may be basically
divided into 3 categories-
Against Person:
 Cybercrimes committed against persons include
various crimes like transmission of child-
pornography, harassment of any one with the
use of a computer such as e-mail, and cyber-
stalking.
 The distribution, posting, and dissemination of
obscene material including pornography,
indecent exposure, and child pornography,
constitutes one of the most important
Cybercrimes known today.The potential harm of
such a crime to humanity can hardly be
overstated..
Against Property:
 The second category of Cybercrimes is
that of Cybercrimes against all forms of
property. These crimes include
unauthorized computer trespassing through
cyberspace, computer vandalism,
transmission of harmful programs, and
unauthorized possession of computerized
information.
Against Government:
 The third category of Cybercrimes relate to
Cybercrimes against Government. Cyber
Terrorism is one distinct kind of crime in this
category. The growth of Internet has shown
that the medium of Cyberspace is being used
by individuals and groups to the international
governments as also to threaten the citizens
of a country. This crime manifests itself into
terrorism when an individual "cracks“ into a
government or military maintained website.
Examples Of cyber-Crime:
Cyber-Crimes and their
History:
 The majority of cybercrimes are centered on forgery,
fraud and Phishing,
 India is the third-most targeted country for Phishing
attacks after the US and the UK,
 Social networks as well as ecommerce sites are
major targets,
 6.9 million bot-infected systems in 2010,
 14,348 website defacements in 2010,
 6,850 .in and 4,150 .com domains were defaced
during 2011,
 15,000 sites hacked in 2011,
 India is the number 1 country in the world for
generating spam.
 Looking at the scam history, some of the popular
scams have been the ‘419 scam’,
 ‘See who viewed your profile!’,
 ‘Dad walks in on daughter …. Embarrassing!’,
 ‘The ‘dislike’ button’,
 ‘Make thousands working from home!’,
 Twitter direct messages with bad links,
 ‘Twitter mentions’,
 ‘Justin Bieber stabbed!’,
 ‘Your account has been cancelled.’,
 ‘Confirm your email account’,
 ‘Facebook will start charging members!’, and
the list can go on and on.
 A total number of 90, 119, 252 and 219
Government websites tracked by the Indian
Computer Emergency ResponseTeam (CERT-In)
were hacked / defaced by various hacker groups in
the year 2010, 2011, 2012 and Jan–Oct 2013
respectively.
Cyber Laws:
 There is absolutely no comprehensive law on
Cybercrime any where in the world.This is
reason that the investigating agencies like FBI
are finding theCyberspace to be an extremely
difficult terrain.
“LOVE BUG”
 The most recent case of the virus "I love you"
demonstrates the need for having cyber laws
concerning Cybercrimes in different national
jurisdictions. At the time of the web publication
of this feature, Reuters has reported that "The
Philippines has yet to arrest the suspected
creator of the 'Love Bug' computer virus because
it lacks laws that deal with computer crime, a
senior police officer said". The fact of the matter
is that there are no laws relating to Cybercrime
in the Philippines.The National Bureau of
Investigation is finding it difficult to legally arrest
the suspect behind the 'Love Bug‘ computer
virus.
How to Tackle Such Activities??
 Awareness is the first step in protecting
yourself, your family and your business.
 Invest in Anti-virus, Firewall, and SPAM
blocking software for your PC.
 Detect secure websites when conducting
transactions online.
 Do NOT respond or act on emails sent
from unknown sources.
Conclusion
 The key to protecting yourself is being
aware.
 Not all cybercriminals are “hackers.”
 There is a whole other world that exists in
cyberspace… make sure that your
information travels safely.
 StaySecure,Stay
Thank You

More Related Content

Similar to cyber-crime-140128140443-phpapp02.pptx

111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)Priyatham Kanigarla
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineIRJET Journal
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in IraqAyub Nuri
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 

Similar to cyber-crime-140128140443-phpapp02.pptx (12)

Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 

More from sainnrg

MODREN SCIECE
MODREN SCIECEMODREN SCIECE
MODREN SCIECEsainnrg
 
MODREN SCIECE
MODREN SCIECEMODREN SCIECE
MODREN SCIECEsainnrg
 
MANGETIC
MANGETIC MANGETIC
MANGETIC sainnrg
 
avalanchephotodiodetherebandwidth A6.pptx
avalanchephotodiodetherebandwidth A6.pptxavalanchephotodiodetherebandwidth A6.pptx
avalanchephotodiodetherebandwidth A6.pptxsainnrg
 
animatedagricultureppt .pptx
animatedagricultureppt .pptxanimatedagricultureppt .pptx
animatedagricultureppt .pptxsainnrg
 
avalanchephotodid.pptx
avalanchephotodid.pptxavalanchephotodid.pptx
avalanchephotodid.pptxsainnrg
 
Travelling.ppt
Travelling.pptTravelling.ppt
Travelling.pptsainnrg
 
TELESCOPE PPT pptx.pptx
TELESCOPE PPT pptx.pptxTELESCOPE PPT pptx.pptx
TELESCOPE PPT pptx.pptxsainnrg
 
Solar-Power-Systems.7057483.powerpoint.pptx
Solar-Power-Systems.7057483.powerpoint.pptxSolar-Power-Systems.7057483.powerpoint.pptx
Solar-Power-Systems.7057483.powerpoint.pptxsainnrg
 
Solar-Power-Systems.AP.powerpoint.pptx
Solar-Power-Systems.AP.powerpoint.pptxSolar-Power-Systems.AP.powerpoint.pptx
Solar-Power-Systems.AP.powerpoint.pptxsainnrg
 

More from sainnrg (10)

MODREN SCIECE
MODREN SCIECEMODREN SCIECE
MODREN SCIECE
 
MODREN SCIECE
MODREN SCIECEMODREN SCIECE
MODREN SCIECE
 
MANGETIC
MANGETIC MANGETIC
MANGETIC
 
avalanchephotodiodetherebandwidth A6.pptx
avalanchephotodiodetherebandwidth A6.pptxavalanchephotodiodetherebandwidth A6.pptx
avalanchephotodiodetherebandwidth A6.pptx
 
animatedagricultureppt .pptx
animatedagricultureppt .pptxanimatedagricultureppt .pptx
animatedagricultureppt .pptx
 
avalanchephotodid.pptx
avalanchephotodid.pptxavalanchephotodid.pptx
avalanchephotodid.pptx
 
Travelling.ppt
Travelling.pptTravelling.ppt
Travelling.ppt
 
TELESCOPE PPT pptx.pptx
TELESCOPE PPT pptx.pptxTELESCOPE PPT pptx.pptx
TELESCOPE PPT pptx.pptx
 
Solar-Power-Systems.7057483.powerpoint.pptx
Solar-Power-Systems.7057483.powerpoint.pptxSolar-Power-Systems.7057483.powerpoint.pptx
Solar-Power-Systems.7057483.powerpoint.pptx
 
Solar-Power-Systems.AP.powerpoint.pptx
Solar-Power-Systems.AP.powerpoint.pptxSolar-Power-Systems.AP.powerpoint.pptx
Solar-Power-Systems.AP.powerpoint.pptx
 

Recently uploaded

Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...gajnagarg
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...gajnagarg
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabiaahmedjiabur940
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...gajnagarg
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Klinik kandungan
 
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...Bertram Ludäscher
 
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制vexqp
 
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样wsppdmt
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...Health
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格q6pzkpark
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteedamy56318795
 
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制vexqp
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...nirzagarg
 
PLE-statistics document for primary schs
PLE-statistics document for primary schsPLE-statistics document for primary schs
PLE-statistics document for primary schscnajjemba
 
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book nowVadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book nowgargpaaro
 
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制vexqp
 

Recently uploaded (20)

Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
 
Sequential and reinforcement learning for demand side management by Margaux B...
Sequential and reinforcement learning for demand side management by Margaux B...Sequential and reinforcement learning for demand side management by Margaux B...
Sequential and reinforcement learning for demand side management by Margaux B...
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit RiyadhCytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
 
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
 
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
 
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
 
PLE-statistics document for primary schs
PLE-statistics document for primary schsPLE-statistics document for primary schs
PLE-statistics document for primary schs
 
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book nowVadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
 
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
 

cyber-crime-140128140443-phpapp02.pptx

  • 1. CYBER-CRIME DON’T BE A VICTIM Presenter: ANSHUMAN TRIPATHI
  • 2. Why Should we know about Cyber- Crime?  In thisTech-savvy world of 21st Century every one is engaged with internet, through whatsapp, twitter, facebook, net- banking & lots of other platforms are there.  And some criminal minded persons commit crimes here, which is included under cyber- crime.  So we should be aware about crimes happening around in the cyber-space.
  • 3. Objectives  To provide a general awareness ofCyber- crime  To RecognizeCyber-crime methods  To know the importance ofCyber-laws(LOVE BUG Suspects+ loss 10$ billion)  To learn how to keep away from being a victim
  • 4. Technical Definition of CYBER-CRIME.  When Internet was developed, the founding fathers of Internet hardly had any inclination that Internet could also be misused for criminal activities. Today, there are many disturbing things happening in cyberspace. Cybercrime refers to all the activities done with criminal intent in cyberspace.  Cyber crime refers to any crime that involves a computer/mobile and a network.The computer may have been used in the commission of a crime, or it may be the target.
  • 5. What is Cyber-Crime? Simple Theory-  When you purchase a home it comes with a door and a lock. Youalways ensure that the door/lock exist and working properly. You may even purchase security systems.  Well, why would you not secure your investments?  Likewise,Your System is your home and security tools are your door/lock and security tools.
  • 6.  So if someone breaches into your home’s(System), accesses all your personal accounts and tampers your data, is the criminal who is committing the crime.  And committed crime is known as cyber- crime.  That means more precisely we can say that-  Cyber crime is an illegal activity committed on the internet.
  • 7.  Against Persons  Against Property  AgainstGovernment Various categories of Cyber- Crime. Cyber Crime may be basically divided into 3 categories-
  • 8. Against Person:  Cybercrimes committed against persons include various crimes like transmission of child- pornography, harassment of any one with the use of a computer such as e-mail, and cyber- stalking.  The distribution, posting, and dissemination of obscene material including pornography, indecent exposure, and child pornography, constitutes one of the most important Cybercrimes known today.The potential harm of such a crime to humanity can hardly be overstated..
  • 9. Against Property:  The second category of Cybercrimes is that of Cybercrimes against all forms of property. These crimes include unauthorized computer trespassing through cyberspace, computer vandalism, transmission of harmful programs, and unauthorized possession of computerized information.
  • 10. Against Government:  The third category of Cybercrimes relate to Cybercrimes against Government. Cyber Terrorism is one distinct kind of crime in this category. The growth of Internet has shown that the medium of Cyberspace is being used by individuals and groups to the international governments as also to threaten the citizens of a country. This crime manifests itself into terrorism when an individual "cracks“ into a government or military maintained website.
  • 12. Cyber-Crimes and their History:  The majority of cybercrimes are centered on forgery, fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK,  Social networks as well as ecommerce sites are major targets,  6.9 million bot-infected systems in 2010,  14,348 website defacements in 2010,  6,850 .in and 4,150 .com domains were defaced during 2011,  15,000 sites hacked in 2011,  India is the number 1 country in the world for generating spam.
  • 13.  Looking at the scam history, some of the popular scams have been the ‘419 scam’,  ‘See who viewed your profile!’,  ‘Dad walks in on daughter …. Embarrassing!’,  ‘The ‘dislike’ button’,  ‘Make thousands working from home!’,  Twitter direct messages with bad links,  ‘Twitter mentions’,  ‘Justin Bieber stabbed!’,  ‘Your account has been cancelled.’,  ‘Confirm your email account’,  ‘Facebook will start charging members!’, and the list can go on and on.
  • 14.  A total number of 90, 119, 252 and 219 Government websites tracked by the Indian Computer Emergency ResponseTeam (CERT-In) were hacked / defaced by various hacker groups in the year 2010, 2011, 2012 and Jan–Oct 2013 respectively.
  • 15. Cyber Laws:  There is absolutely no comprehensive law on Cybercrime any where in the world.This is reason that the investigating agencies like FBI are finding theCyberspace to be an extremely difficult terrain.
  • 16. “LOVE BUG”  The most recent case of the virus "I love you" demonstrates the need for having cyber laws concerning Cybercrimes in different national jurisdictions. At the time of the web publication of this feature, Reuters has reported that "The Philippines has yet to arrest the suspected creator of the 'Love Bug' computer virus because it lacks laws that deal with computer crime, a senior police officer said". The fact of the matter is that there are no laws relating to Cybercrime in the Philippines.The National Bureau of Investigation is finding it difficult to legally arrest the suspect behind the 'Love Bug‘ computer virus.
  • 17. How to Tackle Such Activities??  Awareness is the first step in protecting yourself, your family and your business.  Invest in Anti-virus, Firewall, and SPAM blocking software for your PC.  Detect secure websites when conducting transactions online.  Do NOT respond or act on emails sent from unknown sources.
  • 18. Conclusion  The key to protecting yourself is being aware.  Not all cybercriminals are “hackers.”  There is a whole other world that exists in cyberspace… make sure that your information travels safely.  StaySecure,Stay