Professional Documents
Culture Documents
Security Guard Services Company Profile by Slide
Security Guard Services Company Profile by Slide
Security Guard Services Company Profile by Slide
What is Cyber
03 Crime 04 Causes
Describes the topic Tells the causes of
Cyber Crime cyber crime
TABLE OF CONTENTS
05 Case Study 1 06 Case Study 2
UIDAI’S Aadhar SONY.SAMBANDH.CO
Software hacked M CASE
07 Awareness 08 Prevention
Awares about cyber Prevention about the
crime problem
TABLE OF CONTENTS
09 CONCLUSION 10 REFERENCES
OBJECTIVES
02
To document select methods and tools for
curbing cyber criminal issues.
OUTCOMES
In May 2002, someone logged onto the website under the identity of Barbara Campa and
ordered a Sony Colour Television set and a cordless headphone. She gave her credit card
number for payment and requested that the products be delivered to Arif Azim in Noida.
In this matter, the CBI had evidence to prove their case and so the accused admitted his
guilt. The court convicted Arif Azim under Section 418, 419 and 420 of the Indian Penal
Code — this being the first time that a cybercrime has been convicted.
CASE STUDY 2:
SONY.SAMBHANDH.COM Case
The court, however, felt that as the accused was a young boy of 24 years and a first-
time convict, a lenient view needed to be taken. The court therefore released the
accused on probation for one year.
AWARENESS OF CYBER CRIME :-
Frauds that we should be aware of :-
1] CVV / OTP Sharing Fraud :
In this Fraud , the criminal
debits money from customers
account by asking his Otp And CVV.
10. Restriction on access to your most valuable data: Make a folder, if possible,
so that no one can see confidential documents.
11. Check security settings to prevent cybercrime: A cyber firewall checks your
network settings to see if anyone has logged into your computer.
12. Parental Control: In the era of online technology, parents should monitor all
the activities of their children online. Giving adequate privacy to children would
be problematic.
CONCLUSION
Technology is negative only in the hands of people who do not realize
that they are one and the same process as the universe. An internet
technology advances so does the threat of cyber crime. In times like
these we must protect ourselves from cyber crime. Anti-virus sofware,
firewalls and security patches are just the beginning.Never open
suspicious e-mails and only navigate to trusted sites.
➔ Cyber law’s essentional feature in today’s world of internet.
➔ To reduce the damage to critical infrastructures.
➔ To protect the internet from being abused.
➔ Achieving global peace and harmony.
REFERENCES
[1]https://www.huffpost.com/archive/in/entry/uidai-s-aadhaar-software-hacked-id-database-
compromised-experts-confirm_a_23522472
[2]https://www.helpnetsecurity.com/2021/10/01/risky-online-behaviors/
[3]https://www.legalserviceindia.com/legal/article-8311-an-introduction-to-cyber-crime.html
[4]https://cybercrime.gov.in/Webform/Crime_OnlineSafetyTips.aspx
[5]https://intellipaat.com/blog/what-is-cybercrime/
[6]https://jhpolice.gov.in/sites/default/files/documents-
reports/jhpolice_document_english_cyber_awareness_24112020.pdf
[7]https://shodhganga.inflibnet.ac.in/