SlideShare a Scribd company logo
7
Most read
15
Most read
19
Most read
Cyber
Safety
What is Cyber Safety?
•The act of protecting networks, computers,
servers, mobile devices, electronic systems, and
data against malicious attacks is known as cyber
safety.
•It is the mindful and secure use of the internet to
protect the privacy of personal data.
Identity Theft:- It occurs when someone impersonates
another using their personal information to commit
fraud.
Identity
Theft
Financial
Identity used
for getting
financial gain
Criminal
Identity used
to commit
crimes freely
Medical
Identity used
to obtain
medical
drugs
Ways in which websites track us
•IP address:- An IP address is a unique address which
identifies a device on the internet or a local network.
These are available to websites we visit and also
contain information about our rough location.
•Cookies:- They are small pieces of information stored
in the browser, which track, personalize, and save
information about each user’s session. Websites use
cookies to streamline your web experiences.
HTTP referrer:- It contains the address of the previous
web page from which a link to the currently requested
page was followed.
Super cookie:- They are a type of cookie which are
more persistent. These cookies are stored often in
multiple locations and are repopulated through
other locations when deleted from a particular
part. They are harder to get rid of.
User agent:- It tells the websites we visit about our
browser and operating system.
How to protect ourselves:- Anonymous and
Private browsing
• Anonymous browsers:- They are used by journalists governments etc.
which let the user access the internet without revealing personal
information such as IP address. For e.g. Tor browser
Private Browsing can be achieved through the following ways:-
Incognito Browsing
Proxy
VPNs
• Incognito browsing:- This is a version of the browser which
simply keeps your browsing activity private. It does not,
however, keep your ISP from seeing the sites you visit. For
e.g. Incognito mode in Chrome, private browsing in Firefox.
• Proxy:- A proxy site serves as an intermediate between the
user and the desired website. Instead of the user, the
trackers receive data about the proxy site.
• VPN:- A virtual private network, or VPN, is an encrypted
connection via internet from a device to a network. It can be
installed as a plugin too. It tunnels your connection through
a private server.
Need for confidentiality
The internet is a necessary tool in our day to day life.
There are multiple ways in which our data can be used
against us.
In order to avoid these mishappenings, there are a few
measures we need to take while browsing the
internet:-
Use a firewall whenever possible:-
A firewall is a barrier which
monitors and filters incoming and
outgoing network traffic based on
given guidelines. It keeps
unauthorized traffic out.
Control browser settings:-
Browsers track user data and share
information with websites you
might not approve of. Disable 3rd
party cookies to prevent tracking.
Use private browsing:- Using
methods such as the ones
mentioned previously, keep your
personal information and browsing
data safe.
Be careful with url:- It is better to
type it in yourself instead of
clicking on a link and making sure
that the connection is secure with
https and a padlock sign.
Be careful about what you’re
posting on the internet:- While
posting on social media sites like
Facebook, it should be ensured
that no personal information like
residential addresses are divulged.
Handle emails with care:- Be
cautious with how much you trust
emails, especially ones from
illegitimate looking sources. Do not
open attachments in this case, nor
click on any links.
Avoid dealing with sensitive
information while using public
connections:- Public WIFI's are
often unencrypted and are thus
easy to gain access to which can be
used to commit fraudulent
activities.
Avoid using public computers:-
Ensure your login information and
passwords are not getting saved.
Avoid putting sensitive data in and
make sure the computer is not left
unattended if you do. Delete
cookies and log out when you are
done.
THANK YOU
Submitted To: Er Anupam Sharma
Subm,itted by Swara Patil
Cyber Crime
And computer forensics
What is a Cybercrime?
Cybercrime is any criminal offense that
is facilitated by or involves electronic
communications or information systems,
including any electronic device, computer,
or the internet.
It is a general term that covers
crimes like phishing, credit card fraud,
illegal downloading, child pornography,
cyberbullying, and so on.
Common Cybercrimes
1. Cyber Trolls- A person who purposely posts
sarcastic, demeaning, or insulting comments
about someone.
2. Cyber Bullying- When someone uses the
internet, any electronic device, and social media
network to harass, embarrass or intimidate
someone else.
• Criminal charges such as harassment, libel,
assault, and even terrorism can be charged on
the criminal.
• According to the civil lawsuit they may be asked
to compensate for the damage caused.
3. Cyber Stalking- This is a kind of online harassment wherein the victim
is subjected to a barrage of online messages and emails.
• They collect all personal information.
• They may post the information online on any filthy/obscene sites
posing as if the victim is posting this information.
• People of all kinds, from all over the world, who come across this
information, start calling the victim at his/her residence for many
filthy/obscene reasons.
• Some stalkers subscribe the e-mail account of the victim to
innumerable obscene or illegal sites because of which the victim
starts receiving unsolicited e-mails.
• Some stalkers send repeated e-mails to ask for favours or threaten
them.
4. Spreading rumors online- When people
indulge in posting false information on social
media, or comments that could hurt or
spread rumors that could hurt others, may
trigger panic, or hurt the religious sentiments
of people resulting in clashes or even riots.
• As per the Information Technology Act of
India, publishing/circulation of rumors,
especially hurting religious sentiments is a
cybercrime and it may invite a fine with
imprisonment extendable upto 3 years.
5. Information Theft- Stealing of personal
information through ways such as-
• Phishing- It is a practice of attempting to
acquire sensitive information from
individuals over the internet, by means
of deception.
• Social engineering/pretexting- posing as
a legitimate business or government
official to obtain personal information.
6. Online Fraud- Fraud committed using the internet is called Online
Fraud.
7. Scam- Fraudulent business practice that extracts money.
Measures-
• Never enter any financial information on unsecure websites.
• Never answer e-mails from any unreliable source.
• Never click on links received in emails rather type the URL yourself.
• Never respond to an e-mail claiming you won something.
Non-delivered goods Non- existent companies
Stealing information Fraudulent Payments
Ways in which
it may occur
Strong
security
mechanism
Measures
8. Illegal Downloads- Illegal downloading refers to obtaining files for
which we don’t have the right to use on download from the internet. It
is downloading a paid item, without making any payment.
9. Child Pornography- Child Pornography is defined as any visual or
written representation that depicts or advocates the sexual activity of
anyone under the age of 18.
• The law also includes some child nudity, simulated sex involving
children, and any material that is computer-doctored to look like
child porn.
• Information Technology Act, 2000 & Indian Penal Code, 1860
provides protection from child pornography to a child below the age
of 18.
• According to the amended Information Technology Bill, Section 67
has been amended that not only creating and transmitting obscene
material in electronic form but also browsing such sites is an
offense.
Reporting Cybercrime
If any cyber crime happens, one must report it firstly to parents, school
authorities, and then to the police.
To report a cybercrime:
The Information technology Act provides that a cybercrime may be
reported in the Cyber Crime Units of any city, irrespective of the place
where the crime is committed.
The local police could be
approached for filing
complaints
Provisions have now
been made to file ‘E-FIR’
Complains can also be
filed on a website for
registering crimes against
women and children.
Computer Forensics
• Digital Forensics or computer forensics refers to methods used for
the interpretation of computer media for digital evidence.
Data
identification
Project
Planning
Data capture
Data
processing
Data analysis Data display
Data
processing
Important Practices of Computer Forensics:
• Acquire the evidence without damaging or altering the original.
• Authenticate that your recovered evidence is the same as the
originally seized data.
• Analyze the data without modifying it.
Cyber Law and IT Act
• Cyber law is a generic term that refers to
all legal and regulatory aspects of the
Internet and the World Wide Web.
• Cyber law is important because it touches
almost all aspects of transactions and
activities on and concerning the Internet,
the World Wide Web and Cyberspace.
India’s IT act and IT (Amendment) Act, 2008
• In India Cyber Laws are enforced through Information Technology
Act, 2000 (IT Act 2000).
• IT ACT 2000’s prime purpose was to provide legal recognition to
electronic commerce.
• IT (Amendment) Act, 2008 added several new sections of offenses
including Cyber Terrorism and Data Protection.
• Major amendments of IT ACT (2008)-
Digital Signatures
• Authentication of
electronic records
Electronic Governance
• E-Documents get legal
recognition
• Legal documents can be
supplied in electronic
form
Offences and Penalties
• Penalty upto INR 1
crore
Amendments to other
laws
• Indian Penal Code, 1860
• The Indian Evidence
Act, 1872
• The Banker’s book
evidence Act, 1891 and
many more
Submitted To: Er Anupam Sharma
Submitted

More Related Content

PPTX
IT Security Presentation
elihuwalker
 
PPT
presentation on cyber crime and security
Alisha Korpal
 
PPTX
Cyber crime.pptx
Dawood Faheem Abbasi
 
PPTX
Cyber Crime and Cyber Security
Sazed Salman
 
PPTX
Cyber security presentation
sweetpeace1
 
PPTX
Cyber crime
Muhammad Zeeshan Muzaffar
 
PPT
Cyber Security & Hygine
Amit Arya
 
PPTX
Cyber security
Krishanu Ghosh
 
IT Security Presentation
elihuwalker
 
presentation on cyber crime and security
Alisha Korpal
 
Cyber crime.pptx
Dawood Faheem Abbasi
 
Cyber Crime and Cyber Security
Sazed Salman
 
Cyber security presentation
sweetpeace1
 
Cyber Security & Hygine
Amit Arya
 
Cyber security
Krishanu Ghosh
 

What's hot (20)

PPTX
Cyber safety
Yash Jain
 
PPTX
Presentation on cyber safety
MOHAMMADZAINULABIDEE3
 
PPT
Cyber Bullying
TeamBanana
 
PPTX
Cyber crime ppt
Ritesh Thakur
 
PPTX
Cyber security for children
Avanzo net
 
PPTX
Cyber Safety
Niti Arora
 
PPTX
ELECTRONIC FRAUD TACTICS
ICFAI Business School
 
PDF
ABOUT DARK WEB
VenkatVs7
 
PPTX
Cyber crime and security
Sharath Raj
 
PPT
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
HDCH
 
PPTX
Power Point Cyber-bullying
bolan1jt
 
PDF
What is malware
Malcolm York
 
PPT
CYBER CRIME AND SECURITY
Chaya Sorir
 
PPTX
Final cyber crime and security
nikunjandy
 
PPTX
Cyber Crime and Security
Chitra Mudunuru
 
PPT
Cyber Crime
bhavya mohindru
 
PPSX
Cyber crime
Sanket Gogoi
 
PDF
Internet safety tips for kids and teens
SearchLock
 
PPTX
Cyber safety
Suresh Kumar Murugesan
 
PPTX
Cyber Crime and Security
sugandhaaggarwal
 
Cyber safety
Yash Jain
 
Presentation on cyber safety
MOHAMMADZAINULABIDEE3
 
Cyber Bullying
TeamBanana
 
Cyber crime ppt
Ritesh Thakur
 
Cyber security for children
Avanzo net
 
Cyber Safety
Niti Arora
 
ELECTRONIC FRAUD TACTICS
ICFAI Business School
 
ABOUT DARK WEB
VenkatVs7
 
Cyber crime and security
Sharath Raj
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
HDCH
 
Power Point Cyber-bullying
bolan1jt
 
What is malware
Malcolm York
 
CYBER CRIME AND SECURITY
Chaya Sorir
 
Final cyber crime and security
nikunjandy
 
Cyber Crime and Security
Chitra Mudunuru
 
Cyber Crime
bhavya mohindru
 
Cyber crime
Sanket Gogoi
 
Internet safety tips for kids and teens
SearchLock
 
Cyber Crime and Security
sugandhaaggarwal
 
Ad

Similar to Cyber Safety ppt.pptx (20)

PPTX
cyber safety_grade11cse_afsheen,vishal.pptx
JoelGautham
 
PPTX
Cyber Safety & Cyber Crimes by me.pptx
TejasSingh70
 
PPTX
Chp-15 Cyber Safety ppt-std 11.pptx
HarishParthasarathy4
 
PPTX
Cyber crime social media &; family
Dr.Keshav Sathaye
 
PPTX
Cyber crime
kinish kumar
 
PPTX
Cyber Security, cyber crime and cyber safety all .pptx
sri223n
 
PPT
Cyber crime and cyber security
Kaushal Solanki
 
PPTX
Cyber crime and issues
Roshan Mastana
 
PPTX
Cyber crime ppt
Journalist Ish
 
PDF
Cybercrimeppt 160421074211
Andreaa Viv
 
PPTX
CYBER CRIME - A Threat To Internet Users
Aman Sharma
 
PPTX
Introduction.pptx
ssusere71a07
 
PPTX
Cyber Crime &Cyber Awareness
ShwetaSingh713663
 
DOCX
Information Technology, cybersecurity and protection.docx
mkumar133
 
PDF
Cyber crime a potential threat and remedies
IJARIIT
 
PPTX
Cyber crime
Aamir Malik
 
PPTX
Cyber crime
Soreingam Ragui
 
PPTX
Impact-of-Cybercrime ppt presentation /cybercrime and digital hygine
VivekNaik79
 
PPTX
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
PPTX
Cyber_Crime_Security.pptx
bcanawakadalcollege
 
cyber safety_grade11cse_afsheen,vishal.pptx
JoelGautham
 
Cyber Safety & Cyber Crimes by me.pptx
TejasSingh70
 
Chp-15 Cyber Safety ppt-std 11.pptx
HarishParthasarathy4
 
Cyber crime social media &; family
Dr.Keshav Sathaye
 
Cyber crime
kinish kumar
 
Cyber Security, cyber crime and cyber safety all .pptx
sri223n
 
Cyber crime and cyber security
Kaushal Solanki
 
Cyber crime and issues
Roshan Mastana
 
Cyber crime ppt
Journalist Ish
 
Cybercrimeppt 160421074211
Andreaa Viv
 
CYBER CRIME - A Threat To Internet Users
Aman Sharma
 
Introduction.pptx
ssusere71a07
 
Cyber Crime &Cyber Awareness
ShwetaSingh713663
 
Information Technology, cybersecurity and protection.docx
mkumar133
 
Cyber crime a potential threat and remedies
IJARIIT
 
Cyber crime
Aamir Malik
 
Cyber crime
Soreingam Ragui
 
Impact-of-Cybercrime ppt presentation /cybercrime and digital hygine
VivekNaik79
 
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
Cyber_Crime_Security.pptx
bcanawakadalcollege
 
Ad

More from CGC Technical campus,Mohali (20)

PPTX
Gender Issues CS.pptx
CGC Technical campus,Mohali
 
PPTX
Intellectual Property Rights.pptx
CGC Technical campus,Mohali
 
PPTX
Python Modules .pptx
CGC Technical campus,Mohali
 
PPT
Dynamic allocation
CGC Technical campus,Mohali
 
PPT
Control statments in c
CGC Technical campus,Mohali
 
PPTX
Operators in c by anupam
CGC Technical campus,Mohali
 
PPTX
Datatypes in c
CGC Technical campus,Mohali
 
PPT
Fundamentals of-computer
CGC Technical campus,Mohali
 
PPT
File handling-c
CGC Technical campus,Mohali
 
PPTX
Structure in C language
CGC Technical campus,Mohali
 
PPTX
Function in c program
CGC Technical campus,Mohali
 
PPTX
Function in c
CGC Technical campus,Mohali
 
PPTX
Data processing and Report writing in Research(Section E)
CGC Technical campus,Mohali
 
PPTX
data analysis and report wring in research (Section d)
CGC Technical campus,Mohali
 
PPTX
Section C(Analytical and descriptive surveys... )
CGC Technical campus,Mohali
 
Gender Issues CS.pptx
CGC Technical campus,Mohali
 
Intellectual Property Rights.pptx
CGC Technical campus,Mohali
 
Python Modules .pptx
CGC Technical campus,Mohali
 
Dynamic allocation
CGC Technical campus,Mohali
 
Control statments in c
CGC Technical campus,Mohali
 
Operators in c by anupam
CGC Technical campus,Mohali
 
Fundamentals of-computer
CGC Technical campus,Mohali
 
Structure in C language
CGC Technical campus,Mohali
 
Function in c program
CGC Technical campus,Mohali
 
Data processing and Report writing in Research(Section E)
CGC Technical campus,Mohali
 
data analysis and report wring in research (Section d)
CGC Technical campus,Mohali
 
Section C(Analytical and descriptive surveys... )
CGC Technical campus,Mohali
 

Recently uploaded (20)

PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PDF
Sunset Boulevard Student Revision Booklet
jpinnuck
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PDF
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
PDF
UTS Health Student Promotional Representative_Position Description.pdf
Faculty of Health, University of Technology Sydney
 
PPTX
Autodock-for-Beginners by Rahul D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
PDF
1.Natural-Resources-and-Their-Use.ppt pdf /8th class social science Exploring...
Sandeep Swamy
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PDF
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
DOCX
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
PPT
Python Programming Unit II Control Statements.ppt
CUO VEERANAN VEERANAN
 
PDF
Types of Literary Text: Poetry and Prose
kaelandreabibit
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
Sunset Boulevard Student Revision Booklet
jpinnuck
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
UTS Health Student Promotional Representative_Position Description.pdf
Faculty of Health, University of Technology Sydney
 
Autodock-for-Beginners by Rahul D Jawarkar.pptx
Rahul Jawarkar
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
1.Natural-Resources-and-Their-Use.ppt pdf /8th class social science Exploring...
Sandeep Swamy
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
RA 12028_ARAL_Orientation_Day-2-Sessions_v2.pdf
Seven De Los Reyes
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
Python Programming Unit II Control Statements.ppt
CUO VEERANAN VEERANAN
 
Types of Literary Text: Poetry and Prose
kaelandreabibit
 

Cyber Safety ppt.pptx

  • 2. What is Cyber Safety? •The act of protecting networks, computers, servers, mobile devices, electronic systems, and data against malicious attacks is known as cyber safety. •It is the mindful and secure use of the internet to protect the privacy of personal data.
  • 3. Identity Theft:- It occurs when someone impersonates another using their personal information to commit fraud. Identity Theft Financial Identity used for getting financial gain Criminal Identity used to commit crimes freely Medical Identity used to obtain medical drugs
  • 4. Ways in which websites track us •IP address:- An IP address is a unique address which identifies a device on the internet or a local network. These are available to websites we visit and also contain information about our rough location. •Cookies:- They are small pieces of information stored in the browser, which track, personalize, and save information about each user’s session. Websites use cookies to streamline your web experiences.
  • 5. HTTP referrer:- It contains the address of the previous web page from which a link to the currently requested page was followed. Super cookie:- They are a type of cookie which are more persistent. These cookies are stored often in multiple locations and are repopulated through other locations when deleted from a particular part. They are harder to get rid of. User agent:- It tells the websites we visit about our browser and operating system.
  • 6. How to protect ourselves:- Anonymous and Private browsing • Anonymous browsers:- They are used by journalists governments etc. which let the user access the internet without revealing personal information such as IP address. For e.g. Tor browser Private Browsing can be achieved through the following ways:- Incognito Browsing Proxy VPNs
  • 7. • Incognito browsing:- This is a version of the browser which simply keeps your browsing activity private. It does not, however, keep your ISP from seeing the sites you visit. For e.g. Incognito mode in Chrome, private browsing in Firefox. • Proxy:- A proxy site serves as an intermediate between the user and the desired website. Instead of the user, the trackers receive data about the proxy site. • VPN:- A virtual private network, or VPN, is an encrypted connection via internet from a device to a network. It can be installed as a plugin too. It tunnels your connection through a private server.
  • 8. Need for confidentiality The internet is a necessary tool in our day to day life. There are multiple ways in which our data can be used against us. In order to avoid these mishappenings, there are a few measures we need to take while browsing the internet:-
  • 9. Use a firewall whenever possible:- A firewall is a barrier which monitors and filters incoming and outgoing network traffic based on given guidelines. It keeps unauthorized traffic out. Control browser settings:- Browsers track user data and share information with websites you might not approve of. Disable 3rd party cookies to prevent tracking. Use private browsing:- Using methods such as the ones mentioned previously, keep your personal information and browsing data safe. Be careful with url:- It is better to type it in yourself instead of clicking on a link and making sure that the connection is secure with https and a padlock sign.
  • 10. Be careful about what you’re posting on the internet:- While posting on social media sites like Facebook, it should be ensured that no personal information like residential addresses are divulged. Handle emails with care:- Be cautious with how much you trust emails, especially ones from illegitimate looking sources. Do not open attachments in this case, nor click on any links. Avoid dealing with sensitive information while using public connections:- Public WIFI's are often unencrypted and are thus easy to gain access to which can be used to commit fraudulent activities. Avoid using public computers:- Ensure your login information and passwords are not getting saved. Avoid putting sensitive data in and make sure the computer is not left unattended if you do. Delete cookies and log out when you are done.
  • 11. THANK YOU Submitted To: Er Anupam Sharma Subm,itted by Swara Patil
  • 13. What is a Cybercrime? Cybercrime is any criminal offense that is facilitated by or involves electronic communications or information systems, including any electronic device, computer, or the internet. It is a general term that covers crimes like phishing, credit card fraud, illegal downloading, child pornography, cyberbullying, and so on.
  • 14. Common Cybercrimes 1. Cyber Trolls- A person who purposely posts sarcastic, demeaning, or insulting comments about someone. 2. Cyber Bullying- When someone uses the internet, any electronic device, and social media network to harass, embarrass or intimidate someone else. • Criminal charges such as harassment, libel, assault, and even terrorism can be charged on the criminal. • According to the civil lawsuit they may be asked to compensate for the damage caused.
  • 15. 3. Cyber Stalking- This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. • They collect all personal information. • They may post the information online on any filthy/obscene sites posing as if the victim is posting this information. • People of all kinds, from all over the world, who come across this information, start calling the victim at his/her residence for many filthy/obscene reasons. • Some stalkers subscribe the e-mail account of the victim to innumerable obscene or illegal sites because of which the victim starts receiving unsolicited e-mails. • Some stalkers send repeated e-mails to ask for favours or threaten them.
  • 16. 4. Spreading rumors online- When people indulge in posting false information on social media, or comments that could hurt or spread rumors that could hurt others, may trigger panic, or hurt the religious sentiments of people resulting in clashes or even riots. • As per the Information Technology Act of India, publishing/circulation of rumors, especially hurting religious sentiments is a cybercrime and it may invite a fine with imprisonment extendable upto 3 years.
  • 17. 5. Information Theft- Stealing of personal information through ways such as- • Phishing- It is a practice of attempting to acquire sensitive information from individuals over the internet, by means of deception. • Social engineering/pretexting- posing as a legitimate business or government official to obtain personal information.
  • 18. 6. Online Fraud- Fraud committed using the internet is called Online Fraud. 7. Scam- Fraudulent business practice that extracts money. Measures- • Never enter any financial information on unsecure websites. • Never answer e-mails from any unreliable source. • Never click on links received in emails rather type the URL yourself. • Never respond to an e-mail claiming you won something. Non-delivered goods Non- existent companies Stealing information Fraudulent Payments Ways in which it may occur Strong security mechanism Measures
  • 19. 8. Illegal Downloads- Illegal downloading refers to obtaining files for which we don’t have the right to use on download from the internet. It is downloading a paid item, without making any payment. 9. Child Pornography- Child Pornography is defined as any visual or written representation that depicts or advocates the sexual activity of anyone under the age of 18. • The law also includes some child nudity, simulated sex involving children, and any material that is computer-doctored to look like child porn. • Information Technology Act, 2000 & Indian Penal Code, 1860 provides protection from child pornography to a child below the age of 18. • According to the amended Information Technology Bill, Section 67 has been amended that not only creating and transmitting obscene material in electronic form but also browsing such sites is an offense.
  • 20. Reporting Cybercrime If any cyber crime happens, one must report it firstly to parents, school authorities, and then to the police. To report a cybercrime: The Information technology Act provides that a cybercrime may be reported in the Cyber Crime Units of any city, irrespective of the place where the crime is committed. The local police could be approached for filing complaints Provisions have now been made to file ‘E-FIR’ Complains can also be filed on a website for registering crimes against women and children.
  • 21. Computer Forensics • Digital Forensics or computer forensics refers to methods used for the interpretation of computer media for digital evidence. Data identification Project Planning Data capture Data processing Data analysis Data display Data processing Important Practices of Computer Forensics: • Acquire the evidence without damaging or altering the original. • Authenticate that your recovered evidence is the same as the originally seized data. • Analyze the data without modifying it.
  • 22. Cyber Law and IT Act • Cyber law is a generic term that refers to all legal and regulatory aspects of the Internet and the World Wide Web. • Cyber law is important because it touches almost all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace.
  • 23. India’s IT act and IT (Amendment) Act, 2008 • In India Cyber Laws are enforced through Information Technology Act, 2000 (IT Act 2000). • IT ACT 2000’s prime purpose was to provide legal recognition to electronic commerce. • IT (Amendment) Act, 2008 added several new sections of offenses including Cyber Terrorism and Data Protection. • Major amendments of IT ACT (2008)- Digital Signatures • Authentication of electronic records Electronic Governance • E-Documents get legal recognition • Legal documents can be supplied in electronic form Offences and Penalties • Penalty upto INR 1 crore Amendments to other laws • Indian Penal Code, 1860 • The Indian Evidence Act, 1872 • The Banker’s book evidence Act, 1891 and many more
  • 24. Submitted To: Er Anupam Sharma Submitted