Thursday, October 31,
2013
Cyber Crime is a term used to broadly describe criminal
activity in which computers or computer networks are a
tool, a target, or a place of criminal activity and include
everything from electronic cracking to denial of service
attacks. It is also used to include traditional crimes in
which computers or networks are used to enable the
illicit activity.


.

Destroys, Deletes or Alters any Information residing in a computer
resource or diminishes its value or utility or affects it injuriously by
any means;
Steals, conceals, destroys or alters or causes any person to steal,
conceal, destroy or alter any computer source code used for a
computer resource with an intention to cause damage;
“If any person, dishonestly, or fraudulently, he shall be punishable
with imprisonment for a term which may extend to two to three years
or with fine which may extend to five lakh rupees or with both.”







Hacking
Cyber Squatting
Vishing
Phishing
Cyber Stalking






Hacking
"Hacking" is a crime, which entails cracking systems and
gaining unauthorized access to the data stored in them.
Hacking had witnessed a 37 per cent increase this year.
Cyber Squatting
Cyber Squatting is the act of registering a famous Domain
Name and then selling it for a fortune. This is an issue that has
not been tackled in
IT ACT 2000.
Vishing is the criminal practice of using social engineering and
Voice over IP (VoIP) to gain access to private personal and
financial information from the public for the purpose of
financial reward. The term is a combination of “Voice" and
phishing. Vishing exploits the public's trust in landline
telephone services.



Vishing is typically used to steal credit card numbers or other
information used in identity theft schemes from individual


Phishing is just one of the many frauds on the Internet, trying
to fool people into parting with their money. Phishing refers to
the receipt of unsolicited emails by customers of Financial
Institutions, requesting them to enter their Username,
Password or other personal information to access their
Account for some reason.



The fraudster then has access to the customer's online bank
account and to the funds contained in that account.


Cyber Stalking is use of the Internet or other electronic
means to stalk someone. Stalking generally involves
harassing or threatening behaviour that an individual
engages in repeatedly.
Cyber crime



Again, this is growing trend and it is surprising that authorities have
not taken stern actions to curb the growth of these cyber-crimes.



The police have recorded 3,038 cases but made only 2,700 arrests in
3 years (between 2007 and 2010)



India registered only 1,350 cases under the IT Act and IPC in 2010



50% of cybercrimes are not even reported.






Antivirus And Anti Spyware Software:
Antivirus software consists of computer programs that attempt
to identify, thwart and eliminate computer viruses and other
malicious software. Anti spy wares are used to restrict
backdoor program, Trojans and other spy wares to be installed
on the computer.

Firewalls:
A firewall protects a computer network from unauthorized
access. Network firewalls may be hardware devices, software
programs, or a combination of the two. A network firewall
typically guards an internal computer network against
malicious access from outside the network.






Cryptography:
Cryptography is the science of encrypting and decrypting information.
Encryption is like sending a postal mail to another party with a lock code
on the envelope which is known only to the sender and the recipient. A
number of cryptographic methods have been developed and some of them
are still not cracked.

Cyber Ethics and Laws:
Cyber ethics and cyber laws are also being formulated to stop cyber
crimes. It is a responsibility of every individual to follow cyber ethics and
cyber laws so that the increasing cyber crimes shall reduce. Security
Software like Anti Viruses and Anti Spy Wares should be installed on all
computers, in order to remain secure from Cyber Crimes. Internet Service
Providers should also provide high level of security at their servers in order
to keep their clients secure from all types of viruses and malicious
programs.


Continued Website Hacks and Defacements



Data and Information theft



Increasing phishing attacks on Ecommerce and Financial
Websites



Cybercriminals targeting Social and Professional Networks



Threats directed at the Mobile Platform: Smartphones and
Tablets


Indian Laws are well drafted and are capable of handling all
kinds of challenges as posed by cyber criminals. However, the
enforcement agencies are required to be well versed with the
changing technologies and Laws.”



"As internet technology advances so does the threat of cyber
crime. In times like these we must protect ourselves from
cyber crime. Anti-virus software, firewalls and security
patches are just the beginning. Never open suspicious e-mails
and only navigate to trusted sites.”
THANK YOU!!



By: Aamir Malik
Piyuesh Pandey
 Ashish Malik

More Related Content

PPT
Cyber Crime & Law
PPTX
Cyber laws in India
PPTX
PPTX
What constitutes a cyber crime in the country
PDF
Case study on cyber crime
PPTX
Cyber Crime & Information technology Act 2000
PPTX
Cyber Crime and Cyber Law of India BY Vinay
PPTX
Cyber laws in pakistan
Cyber Crime & Law
Cyber laws in India
What constitutes a cyber crime in the country
Case study on cyber crime
Cyber Crime & Information technology Act 2000
Cyber Crime and Cyber Law of India BY Vinay
Cyber laws in pakistan

What's hot (20)

PPT
Cyber Crime
PPTX
Cyber crime
PPTX
PPT
Email crimes and Cyber Law-Nasscom Cyber safe 2010
PPT
Overview of Computer & Internet Crimes in India
PPTX
Cyber crime in india
PPTX
Statutory laws pertaining to cybercrimes in india
PPT
Cyberlaw An Overview
PPTX
Cyber Crime
PDF
Cyber Crime
PPTX
Cyber Law And Ethics
PPTX
Cyber fraud
PPTX
Cyber law
PDF
Cyber Laws
PPTX
Cyber law
PPTX
Cybercrime final-ppt
PPTX
Unit 3 Cyber Crimes and Torts 8 hr
PPTX
Information Technology Act, 2000
PPT
Cyberlaw
PPTX
Cyber law
Cyber Crime
Cyber crime
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Overview of Computer & Internet Crimes in India
Cyber crime in india
Statutory laws pertaining to cybercrimes in india
Cyberlaw An Overview
Cyber Crime
Cyber Crime
Cyber Law And Ethics
Cyber fraud
Cyber law
Cyber Laws
Cyber law
Cybercrime final-ppt
Unit 3 Cyber Crimes and Torts 8 hr
Information Technology Act, 2000
Cyberlaw
Cyber law
Ad

Similar to Cyber crime (20)

PPTX
Cyber crime and issues
PPTX
Cyber crime ppt
PDF
Cybercrimeppt 160421074211
PPTX
CYBER CRIME - A Threat To Internet Users
PPTX
Cyber crime and laws
PPTX
Cyber Crime
PPTX
cyber security and its importance .pptx
PPTX
Cyber crime
PPTX
Cyber crime
PPTX
Cyber crime and Security
PPTX
Cyber crime
PPSX
Cyber Crimes - An Introduction
PDF
Cyber crime a potential threat and remedies
PDF
Cyber crime-A burning issue of today's world
PPTX
Cyber crime & law
PPTX
Internet
PPT
Cyber crime & security final tapan
PPTX
Cyber security
PPT
Cyber crime and forensic
PDF
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber crime and issues
Cyber crime ppt
Cybercrimeppt 160421074211
CYBER CRIME - A Threat To Internet Users
Cyber crime and laws
Cyber Crime
cyber security and its importance .pptx
Cyber crime
Cyber crime
Cyber crime and Security
Cyber crime
Cyber Crimes - An Introduction
Cyber crime a potential threat and remedies
Cyber crime-A burning issue of today's world
Cyber crime & law
Internet
Cyber crime & security final tapan
Cyber security
Cyber crime and forensic
Cyber Crime and Security ppt by Neeraj Ahirwar
Ad

Recently uploaded (20)

PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
SaaS reusability assessment using machine learning techniques
PPTX
Microsoft User Copilot Training Slide Deck
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Lung cancer patients survival prediction using outlier detection and optimize...
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Basics of Cloud Computing - Cloud Ecosystem
Data Virtualization in Action: Scaling APIs and Apps with FME
Convolutional neural network based encoder-decoder for efficient real-time ob...
MuleSoft-Compete-Deck for midddleware integrations
A symptom-driven medical diagnosis support model based on machine learning te...
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Connector Corner: Transform Unstructured Documents with Agentic Automation
4 layer Arch & Reference Arch of IoT.pdf
Electrocardiogram sequences data analytics and classification using unsupervi...
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
SaaS reusability assessment using machine learning techniques
Microsoft User Copilot Training Slide Deck

Cyber crime

  • 2. Cyber Crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to enable the illicit activity.
  • 3.  . Destroys, Deletes or Alters any Information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means; Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage; “If any person, dishonestly, or fraudulently, he shall be punishable with imprisonment for a term which may extend to two to three years or with fine which may extend to five lakh rupees or with both.”
  • 5.     Hacking "Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 per cent increase this year. Cyber Squatting Cyber Squatting is the act of registering a famous Domain Name and then selling it for a fortune. This is an issue that has not been tackled in IT ACT 2000.
  • 6. Vishing is the criminal practice of using social engineering and Voice over IP (VoIP) to gain access to private personal and financial information from the public for the purpose of financial reward. The term is a combination of “Voice" and phishing. Vishing exploits the public's trust in landline telephone services.   Vishing is typically used to steal credit card numbers or other information used in identity theft schemes from individual
  • 7.  Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason.  The fraudster then has access to the customer's online bank account and to the funds contained in that account.
  • 8.  Cyber Stalking is use of the Internet or other electronic means to stalk someone. Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly.
  • 10.   Again, this is growing trend and it is surprising that authorities have not taken stern actions to curb the growth of these cyber-crimes.  The police have recorded 3,038 cases but made only 2,700 arrests in 3 years (between 2007 and 2010)  India registered only 1,350 cases under the IT Act and IPC in 2010  50% of cybercrimes are not even reported.
  • 11.     Antivirus And Anti Spyware Software: Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software. Anti spy wares are used to restrict backdoor program, Trojans and other spy wares to be installed on the computer. Firewalls: A firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two. A network firewall typically guards an internal computer network against malicious access from outside the network.
  • 12.     Cryptography: Cryptography is the science of encrypting and decrypting information. Encryption is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender and the recipient. A number of cryptographic methods have been developed and some of them are still not cracked. Cyber Ethics and Laws: Cyber ethics and cyber laws are also being formulated to stop cyber crimes. It is a responsibility of every individual to follow cyber ethics and cyber laws so that the increasing cyber crimes shall reduce. Security Software like Anti Viruses and Anti Spy Wares should be installed on all computers, in order to remain secure from Cyber Crimes. Internet Service Providers should also provide high level of security at their servers in order to keep their clients secure from all types of viruses and malicious programs.
  • 13.  Continued Website Hacks and Defacements  Data and Information theft  Increasing phishing attacks on Ecommerce and Financial Websites  Cybercriminals targeting Social and Professional Networks  Threats directed at the Mobile Platform: Smartphones and Tablets
  • 14.  Indian Laws are well drafted and are capable of handling all kinds of challenges as posed by cyber criminals. However, the enforcement agencies are required to be well versed with the changing technologies and Laws.”  "As internet technology advances so does the threat of cyber crime. In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls and security patches are just the beginning. Never open suspicious e-mails and only navigate to trusted sites.”
  • 15. THANK YOU!!   By: Aamir Malik Piyuesh Pandey  Ashish Malik