Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

Presented By:

Burkhawala Shiv
Jariwala Tapan CYBER CRIME
Madrasi Kaivan
Mistry Hemaxi
Pandey Srishti MR. HIMANSHU LAD
AGENDA

1 WHAT IS CYBER CRIME ?

2 TYPES OF CYBER CRIME

3 CYBER LAWS OF INDIA

4 PREVENTION OF CYBER CRIME

5 CYBER SECURITY
1 WHAT IS CYBER CRIME ?

Cyber crime is any criminal activity that includes a computer or a computer network
or a networked device. Cyber crime is also known as computer crime. It uses a
computer as an instrument to further illegal ends, such as committing frauds,
trafficking in child pornography and intellectual property, stealing identities, or
violating privacy.
2 TYPES OF CYBER CRIME

CRIMES AGAINST PEOPLE

Cyber harassment Cyber Stalking: Spoofing:


(Cyberbullying):
Cyber stalking can take Spoofing is the act of
Cyberbullying is bullying that many different forms, but in disguising a communication
takes place over digital the broadest sense, it is from an unknown source as
devices like cell phones, stalking or harassment that being from a known, trusted
computers, and tablets. takes place via online source. It can apply to emails,
Cyberbullying can occur channels such as social phone calls, and websites, or
through SMS, Text, and apps, media, forums or email. It is can be more technical, such as
or online in social media, typically planned and a computer spoofing an IP
forums, or gaming where sustained over a period of address, Address Resolution
people can view, participate time. Protocol (ARP), or Domain
in, or share content. Name System (DNS) server.
CRIMES AGAINST PROPERTY

Exploit Kits: Computer Trademark


Vandalism: Infringement:
Exploit kits use a software In everyday life, there are It can be described as using a
toolkit to target vulnerabilities vandals that seem to enjoy service mark or trademark
found in remote software. A destroying things even unauthorized.
common example is the act of though it can be hard to
silently exploiting Flash or understand how they derive
Java vulnerabilities in order to any tangible benefit from
hack a website, then their acts of vandalism.
redirecting traffic to malicious
pages.
3 CYBER LAWS OF INDIA

Section 65 Tampering with computer source documents: A person who intentionally


conceals, destroys or alters any computer source code (such as programmes,
computer commands, design and layout), when it is required to be maintained
by law commits an offence and can be punished with 3 years’ imprisonment or
a fine of 2 Lakhs INR or both.

Section 66C Using password of another person: If a person fraudulently uses the password,
digital signature or other unique identification of another person, he/she can
face imprisonment up to 3 years or/and a fine of 1 Lakh INR.

Section 66D Cheating using computer resource: If a person cheats someone using a
computer resource or a communication device, he/she could face imprisonment
up to 3 years or/and fine up to 1 Lakh INR.

Publishing private images of others: If a person captures, transmits or publishes


Section 66E
images of a person’s private parts without his/her consent or knowledge, the
person is entitled to imprisonment up to 3 years of fine up to 2 Lakhs INR or
both.
Section 66F Acts of cyber terrorism: A person can face life imprisonment if he/she denies an
authorized person the access to the computer resource or attempts to
penetrate/access a computer resource without authorization, with an aim to
threaten the unity, integrity, security or sovereignty of the nation. This is a non-
bailable offence.

Section 67B Publishing child porn or predating children online: If a person captures,
publishes or transmits images of a child in a sexually explicit act or induces
anyone under the age of 18 into a sexual act, then the person can face
imprisonment up to 7 years or fine up to 10 lakhs INR or both.

Government’s power to block websites: If the government feels it necessary in


Section 69A the interest of sovereignty and integrity of India, it can intercept, monitor or
decrypt any information generated, transmitted, received or stored in any
computer resource. The power is subject to compliance of procedure. Under
section 69A, the central government can also block any information from public
access.

Data protection at corporate level: If a body corporate is negligent in


Section 43A
implementing reasonable security practices which causes wrongful loss or gain
to any person, such body corporate shall be liable to pay damages to the
affection person.
4 PREVENTION OF CYBER CRIME

Use strong passwords


Don’t repeat your passwords on different sites. Change your passwords regularly. Make them complex, i.e.,
using a combination of at least 10 letters, numbers and symbols. A password management application can
help you keep your passwords locked down.

Manage your social media settings


Make sure your social networking profiles like those of Facebook, Instagram, Snapchat, Twitter, Youtube,
etc. are set to private. Check your security settings. Be careful with what information you share online,
because once it is on the internet, it is there forever.

Secure your devices


Beware that your mobile devices are vulnerable to viruses and hackers. Download applications from
trusted sources.

Install the latest OS updates


Keep your applications and operating systems (E.g.. Windows, Mac, Linux) current with the latest updates.
Cybercriminals frequently use known exploits, or flaws, in your software to gain access to your system.
Patching those exploits and flaws can make it less likely that you’ll become a cyber crime target. Turn on
automatic updates to prevent potential attacks on older software.
Protect your data
Use encryption for your most sensitive files such as tax returns or financial records, make regular back-ups
of all your important data, and store it in another location.

Secure your wireless network


Wi-Fi (wireless) networks at home are vulnerable to intrusion if they are not properly secured. Review and
modify default settings. Public Wi-Fi, also known as ‘Hotspots’, are also vulnerable. Avoid conducting
financial or corporate transactions on these networks.

Protect your e-identity


Be cautious when giving out personal information such as your name, address, contact number or financial
information on the internet. Make sure that the websites are secure (for e.g., when making online
purchases) or that you’ve enabled privacy settings (for e.g., when accessing/using social networking sites).

Avoid being scammed


Always think before you click on a link or file of an unknown origin. Don’t feel pressured by any e-mails.
Check the source of the message. When in doubt, verify the source. Never reply to the emails that ask you
to verify your information or confirm your user ID or password.
5 CYBER SECURITY

Cyber security is a potential activity by which information and


other communication systems are protected from and/or defended
Cyber against the unauthorized use or modification or exploitation or
even theft.
security Likewise, cyber security is a well-designed technique to protect
computers, networks, different programs, personal data, etc., from
unauthorized access. All sorts of data whether it is government,
corporate, or personal need high security;

however, some of the data, which belongs to the government


defense system, banks, defense research and development
organization, etc. are highly confidential and even small amounts
of negligence to these data may cause great damage to the whole
nation. Therefore, such data need security at a very high level.

A successful cybersecurity approach has multiple layers of


protection spread across the computers, networks, programs, or
data that one intends to keep safe. In an organization, the people,
processes, and technology must all complement one another to
create an effective defense from cyber attacks.
THANK YOU

You might also like