SlideShare a Scribd company logo
1 of 30
Download to read offline
Monday, September 24, 2012
GROUP
                              1
Monday, September 24, 2012
Crimes are not to be measured by the issue of
   events, but by the bad intensions of men.




 The greatest crimes do not arise from a want of
feeling for others but from an over sensibility for
   ourselves and an over indulgence in our own
                     desires.


  Monday, September 24, 2012
CYBER CRIME !!
The expression ‘Crime’ is defined as an act, which subjects the doer to
legal punishment or any offence against morality, social order or any
unjust or shameful act. The “Offence" is defined in the Code of
Criminal Procedure to mean as an act or omission made punishable by
any law for the time being in force.

Cyber Crime is emerging as a serious threat. World wide
governments, police departments and intelligence units have started
to react.




   Monday, September 24, 2012
Cyber Crime is a term used to broadly describe criminal activity in which computers
or computer networks are a tool, a target, or a place of criminal activity and include
  everything from electronic cracking to denial of service attacks. It is also used to
 include traditional crimes in which computers or networks are used to enable the
                                   illicit activity.


 Computer crime mainly consists of unauthorized access to computer systems data
alteration, data destruction, theft of intellectual property. Cyber crime in the context
   of national security may involve hacking, traditional espionage, or information
                             warfare and related activities.


 Pornography, Threatening Email, Assuming someone's Identity, Sexual Harassment,
  Defamation, Spam and Phishing are some examples where computers are used to
commit crime, whereas Viruses, Worms and Industrial Espionage, Software Piracy and
          Hacking are examples where computers become target of crime.


    Monday, September 24, 2012
Indian Crime Scene

                                        The major Cyber Crimes reported, in
                                 India, are Denial of Services, Defacement of
                                Websites, Spam, Computer Virus and Worms,
                               Pornography, Cyber Squatting, Cyber Stalking
                                                                  and Phishing.
                                     Given the fact that nearly $ 120 million
                              worth of Mobiles are being lost or stolen in the
                                 country every year, the users have to protect
                                 Information, Contact details and Telephone
                              numbers as these could be misused. Nearly 69
                                per cent of information theft is carried out by
                                current and ex-employees and 31 per cent by
                             hackers. India has to go a long way in protecting
                                                         the vital information.
                                      [3 The Hindu, Saturday, Oct 27, 2007].
Monday, September 24, 2012
Cyber Crime Variants

Hacking
"Hacking" is a crime, which entails cracking
systems and gaining unauthorized access to the
data stored in them. Hacking had witnessed a 37
per cent increase this year.

Cyber Squatting
Cyber Squatting is the act of registering a famous
Domain Name and then selling it for a fortune.
This is an issue that has not been tackled in
IT ACT 2000.




    Monday, September 24, 2012
Phishing is just one of the many frauds on
the Internet, trying to fool people into
parting with their money. Phishing refers to
the receipt of unsolicited emails by
customers of Financial Institutions,
requesting them to enter their Username,
Password or other personal information to
access their Account for some reason.

The fraudster then has access to the
customer's online bank account and to the
funds contained in that account.
 Monday, September 24, 2012
Cyber Stalking is use of the Internet or other
                         electronic means to stalk someone. This
                         term is used interchangeably with online
                         harassment and online abuse. Stalking
                         generally involves harassing or threatening
                         behaviour that an individual engages in
                         repeatedly, such as following a person,
                         appearing at a person's home or place of
                         business, making harassing phone calls,
                         leaving written messages or objects, or
                         vandalizing a person's property.
Monday, September 24, 2012
VISHING
                             Vishing is the criminal practice of using
                                social engineering and Voice over IP
                             (VoIP) to gain access to private personal
                                 and financial information from the
                                 public for the purpose of financial
                                reward. The term is a combination of
                               “Voice" and phishing. Vishing exploits
                              the public's trust in landline telephone
                                               services.

                              Vishing is typically used to steal credit
                             card numbers or other information used
                                  in identity theft schemes from
Monday, September 24, 2012                  individuals.
India stands 11th in the ranking for Cyber Crime in
         the World, constituting 3% of the Global Cyber
Monday, September 24, 2012
                             Crime.
Why India?
A rapidly growing online user
base
     121 Million Internet Users
     65 Million Active Internet Users,
      up by 28% from 51 million in
      2010
     50 Million users shop online on
      Ecommerce and Online
      Shopping Sites
     46+ Million Social Network
      Users
     346 million mobile users had
      subscribed to Data Packages.
  Monday, September 24, 2012
    Source: IAMAI; Juxt; wearesocial 2011
Cyber Crime                              In
India


 The majority of cybercrimes are centered on forgery, fraud and
  Phishing,
 India is the third-most targeted country for Phishing attacks
  after the US and the UK,
 Social networks as well as ecommerce sites are major targets,
 6.9 million bot-infected systems in 2010,
 14,348 website defacements in 2010,
 6,850 .in and 4,150 .com domains were defaced during 2011,
 15,000 sites hacked in 2011,
 India is the number 1 country in the world for generating spam.
 Monday, September 24, 2012
Cost Of Cyber Crime In India (2010)



 29.9 million people fell victim to cybercrime,
 $4 billion in direct financial losses,
 $3.6 billion in time spent resolving the crime,
 4 in 5 online adults (80%) have been a victim of
  Cybercrime,
 17% of adults online have experienced cybercrime
  on their mobile phone.

Source: Norton Cybercrime Report 2011


Monday, September 24, 2012
We have covered about three instances where high-profile government websites were
   hacked and defaced. However, the actual number of Government Websites that were
   hacked are quite huge.

   A total number of 90, 119, 252 and 219 Government websites tracked by the Indian
   Computer Emergency Response Team (CERT-In) were hacked / defaced by various
   hacker groups in the year 2008, 2009, 2010 and Jan–Oct 2011 respectively.
Monday, September 24, 2012
 Again, this is
                                                  growing trend and
                                                  it is surprising that
                                                  authorities have
                                               not taken stern
                                               actions to curb the
                                               growth of these
                                               cyber-crimes.



 The police have recorded 3,038 cases but made only 2,700
  arrests in 3 years (between 2007 and 2010)

 India registered only 1,350 cases under the IT Act and IPC in
  2010

 50% of cybercrimes are not even reported.
  Monday, September 24, 2012
Cyber Laws in India

Under The Information
Technology Act, 2000
CHAPTER XI – OFFENCES – 66. Hacking with
computer system.

(1) Whoever with the Intent to cause or knowing
 that he is likely to cause Wrongful Loss or
Damage to the public or any person Destroys or
Deletes or Alters any Information Residing in a
Computer Resource or diminishes its value or
utility or affects it injuriously by any means,
commits hack.

(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with
fine which may extend up to two lakh rupees, or with both.



    Monday, September 24, 2012
Whoever without permission of
  the owner of the computer :

         Secures Access;
         Downloads, Copies or extracts
        any data, computer database or
        any information;
         Introduce or causes to be introduce
        any Virus or Contaminant;
         Disrupts or causes disruption;
         Denies or causes denial of access to any person;
         Provides any assistance to any person to facilitate access
         Charges the services availed of by a person to the account of
            another person by Tampering with or Manipulating any Computer,
            Computer System, or Computer Network;

        Shall be liable to pay damages by way of compensation not exceeding one
        crore rupees to the person so affected.
Monday, September 24, 2012
Information Technology Amendment Act,
                    2008
Section – 43,
Destroys, Deletes or Alters any Information residing in a computer resource or
diminishes its value or utility or affects it injuriously by any means;

Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy
or alter any computer source code used for a computer resource with an intention
to cause damage;

“If any person, dishonestly, or fraudulently, does any act referred to in section 43,
he shall be punishable with imprisonment for a term which may extend to two
three years or with fine which may extend to five lakh rupees or with both.” [S.66]
  Monday, September 24, 2012
S .66A      - P u n i s h me n tf or s e ndi ng
o f f e n s i v e me s s a g e s t h r o u g h
c o mmu n i c a t i o n s e r v i c e , e t c
 A n y p e r s o n w h o s e n d s , b y me a n s o f   a
  c o mp u t e r r e s o u r c e o r a
  c o mmu n i c a t i o n d e v i c e ;
 A n y i n f o r ma t i o n t h a t i s g r o s s l y
  o f f e n s i v e o r h a s me n a c i n g
  c ha r a c t e r ; or
 An    y i n f o r ma t i o n w h i c h h e k n o w s t o
  be     f a l s e , but f or t he pur pos e of
  c a   us i ng a nnoy a nc e , i nc onv e ni e nc e ,
  da    nge r , obs t r uc t i on , i ns ul t ,
  i n   j u r y , c r i mi n a l i n t i mi d a t i o n ,
  e n   mi t y , h a t r e d , o r i l l w i l l ,
  pe    r s i s t e n t l y ma k e s b y ma k i n g u s e
  of     s u c h c o mp u t e r r e s o u r c e o r a
  c o   mmu n i c a t i o n d e v i c e ;
 A n y e l e c t r o n i c ma i l o r e l e c t r o n i c
 Monday, September m 2012 s a g e
  m a i l 24, e s                 f or t he pur pos e of
  c a us i ng a nnoy a nc e or
S. 66C - Punishment for identity theft
        “Whoever, fraudulently or dishonestly make use of the
electronic signature, password or any other unique identification
feature of any other person, shall be punished with imprisonment
of either description for a term which may extend to three years
and shall also be liable to fine which may extend to rupees one
lakh”

S. 66D - Punishment for cheating by personation by using
computer resource

            “Whoever, by means of any communication device or
computer resource cheats by personation, shall be punished with
imprisonment of either description for a term which may extend
to three years and shall also be liable to fine which may extend to
one lakh rupees. “
  Monday, September 24, 2012
S . 66E - P u n i s h m e n t f o r
v i ol a t i on of             pr i v a c y .

“Wh o e v e r , i n t e n t i o n a l l y o r
k n o wi n g l y c a p t u r e s , p u b l i s h e s o r
t   r a   n s mi t s t h e i ma g e o f a p r i v a t e
a   r e   a o f a n y p e r s o n wi t h o u t h i s o r
h   e r    c o n s e n t , u n d e r c i r c u ms t a n c e s
v   i o   l a t i ng t he pr i v a c y of t ha t
p   e r   s o n , s h a l l b e p u n i s h e d wi t h
i   mp    r i s o n me n t w h i c h ma y e x t e n d t o
t   hr    e e y e a r s o r wi t h f i n e n o t
e   x c   e e d i n g t wo l a k h r u p e e s , o r wi t h
b   ot    h”

S . 67 A         - P u n i s h me n t    f    or
publ i s hi ng or t r a ns                   mi t t i n g
o f ma t e r i a l c o n t a i n             i ng
sMonday,x u a 24, 2012 y e x p l i c i t a
   e September l l                           c t , e t c . i n
S. 67 C - Preservation and Retention of information
by intermediaries.


“(1) Intermediary shall preserve and retain such
information as may be specified for such duration and
in such manner and format as the Central Government
may prescribe.

(2) Any intermediary who intentionally or knowingly
contravenes the provisions of sub section (1) shall be
punished with an imprisonment for a term which may
extend to three years and shall also be liable to fine.”

Monday, September 24, 2012
Arrests & Reports Under IT Act
                              Under the IT Act, 966 cybercrime
                               cases were filed in 2010
                               420 in 2009)
                              Geographic breakdown of cases
                               reported:
                                o   153 from Karnataka,
                                o   148 from Kerala
                                o   142 from Maharashtra
                                o   105 Andhra Pradesh
                                o   52 Rajasthan
                                o   52 Punjab
                              233 persons were arrested in 2010
                              33% of the cases registered were
                               related to hacking
                             Source: National Crime Records Bureau

Monday, September 24, 2012
Arrests & Reports Under IPC
 Under the IPC, 356 cybercrime cases were registered in
  2010 (276 cases in 2009)
 Geographic breakdown of cases reported --

      o 104 from Maharashtra
      o 66 Andhra Pradesh
      o 46 Chhattisgarh


                            The majority of these crimes were
    either                          forgery or fraud cases.

                             Source: National Crime Records Bureau


Monday, September 24, 2012
How to Tackle Such Activities?

An important question arises that how can these crimes be prevented. A
number of techniques and solutions have been presented but the problems still
exists and are increasing day by day.

Antivirus And Anti Spyware Software:
Аntivirus software consists of computer programs that attempt to identify,
thwart and eliminate computer viruses and other malicious software. Anti spy
wares are used to restrict backdoor program, trojans and other spy wares to be
installed on the computer.

Firewalls:
A firewall protects a computer network from unauthorized access. Network
firewalls may be hardware devices, software programs, or a combination of the
two. A network firewall typically guards an internal computer network against
malicious access from outside the network.

 Monday, September 24, 2012
Cr y p t o g r a p h y :
Cr    y pt ogr a phy i s t he s c i e nc e of
e n   c r y pt i ng a nd de c r y pt i ng
i n   f o r ma t i o n . E n c r y p t i o n i s l i k e
s e   n d i n g a p o s t a l ma i l t o a n o t h e r
pa    r t y wi t h a l o c k c o d e o n t h e
e n   v e l o p e wh i c h i s k n o wn o n l y t o
t h   e s e nde r a nd t he r e c i pi e nt . A
nu    mb e r o f c r y p t o g r a p h i c me t h o d s
ha    v e b e e n d e v e l o p e d a n d s o me o f
t h   e m a r e s t i l l not c r a c k e d.


Cy b e r      E t h i c s a n d L a ws :
Cy b e r e t h i c s a       n d c y b e r l a ws a r e
a l s o be i ng f or         mu l a t e d t o s t o p
c y b e r c r i me s . I      t i s a
r e s pons i bi l i t        y of e v e r y
i ndi v i dua l t o          f ol l ow c y be r e t hi c s
Monday, September 24, 2012
a n d c y b e r l a ws        s o t ha t t he
The Future of Cyber-Crimes in India
• Continued Website Hacks and
  Defacements

• Data and Information theft

• Increasing phishing attacks on
  Ecommerce and Financial Websites

• Cybercriminals targeting Social and
  Professional Networks

• Threats directed at the Mobile Platform:
  Smartphones and Tablets
  Monday, September 24, 2012
Conclusion…
“Indian Laws are well drafted and are capable of handling all kinds of
challenges as posed by cyber criminals. However, the enforcement
agencies are required to be well versed with the changing technologies
and Laws.”

"As internet technology advances so does the threat of cyber crime.
In times like these we must protect ourselves from cyber crime. Anti-
virus software, firewalls and security patches are just the beginning.
Never open suspicious e-mails and only navigate to trusted sites.”
  Monday, September 24, 2012
THANK YOU!!
                             F.Y.B.M.S. – B
                           -- Namita Ludbe (140)
                           -- Kavish Pandya (149)
                        -- Mohammed Lakdawala (117)
                           -- Ruchit Mehta (114)
                           -- Kalpesh Solanki (70)
                             -- Yash Dodia (93)
                             -- Pratik Jain (72)
Monday, September 24, 2012

More Related Content

What's hot

What's hot (20)

Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Zara Tariq
 
Death To Bullshit
Death To BullshitDeath To Bullshit
Death To BullshitBrad Frost
 
Simone Burgess Career Portfolio 2012
Simone Burgess Career Portfolio 2012Simone Burgess Career Portfolio 2012
Simone Burgess Career Portfolio 2012simoneburgess
 
ppt on e crime management system
ppt on e crime management systemppt on e crime management system
ppt on e crime management systemKrishna Kinkar Jha
 
SydMobNet July 2014: Xamarin 3 & Xamarin Forms
SydMobNet July 2014: Xamarin 3 & Xamarin FormsSydMobNet July 2014: Xamarin 3 & Xamarin Forms
SydMobNet July 2014: Xamarin 3 & Xamarin FormsAlec Tucker
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of InternetAreeb Khan
 
Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)gunpreet kamboj
 
2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child PornographyFrederick Lane
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime008_Anuj
 
PPT on Child labor
PPT on Child labor PPT on Child labor
PPT on Child labor Mv Raam
 
Presentation on farmer suicides
Presentation on farmer suicidesPresentation on farmer suicides
Presentation on farmer suicidesDivya Ravali
 

Viewers also liked (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)
 
Death To Bullshit
Death To BullshitDeath To Bullshit
Death To Bullshit
 
Simone Burgess Career Portfolio 2012
Simone Burgess Career Portfolio 2012Simone Burgess Career Portfolio 2012
Simone Burgess Career Portfolio 2012
 
ppt on e crime management system
ppt on e crime management systemppt on e crime management system
ppt on e crime management system
 
SydMobNet July 2014: Xamarin 3 & Xamarin Forms
SydMobNet July 2014: Xamarin 3 & Xamarin FormsSydMobNet July 2014: Xamarin 3 & Xamarin Forms
SydMobNet July 2014: Xamarin 3 & Xamarin Forms
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)
 
2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography
 
Child labour
Child labourChild labour
Child labour
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
PPT on Child labor
PPT on Child labor PPT on Child labor
PPT on Child labor
 
Presentation on farmer suicides
Presentation on farmer suicidesPresentation on farmer suicides
Presentation on farmer suicides
 

Similar to Cyber crime ppt

Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Sooraj Maurya
 
cybercrimeppt-120924121427-phpapp01.ppt
cybercrimeppt-120924121427-phpapp01.pptcybercrimeppt-120924121427-phpapp01.ppt
cybercrimeppt-120924121427-phpapp01.pptSIRINET2
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
A Study On The Cyber-Crime And Cyber Criminals  A Global ProblemA Study On The Cyber-Crime And Cyber Criminals  A Global Problem
A Study On The Cyber-Crime And Cyber Criminals A Global ProblemChristina Bauer
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)Priyatham Kanigarla
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internetAlexander Decker
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 

Similar to Cyber crime ppt (20)

Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER
 
cybercrimeppt-120924121427-phpapp01.ppt
cybercrimeppt-120924121427-phpapp01.pptcybercrimeppt-120924121427-phpapp01.ppt
cybercrimeppt-120924121427-phpapp01.ppt
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
A Study On The Cyber-Crime And Cyber Criminals  A Global ProblemA Study On The Cyber-Crime And Cyber Criminals  A Global Problem
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 

Recently uploaded

TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and businessFrancesco Corti
 
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3DianaGray10
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxSatishbabu Gunukula
 
Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...DianaGray10
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch TuesdayIvanti
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kitJamie (Taka) Wang
 
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptxGraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptxNeo4j
 
Where developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingWhere developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingFrancesco Corti
 
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInOutage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInThousandEyes
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.IPLOOK Networks
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsDianaGray10
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applicationsnooralam814309
 
The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)codyslingerland1
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)IES VE
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNeo4j
 
UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1DianaGray10
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameKapil Thakar
 

Recently uploaded (20)

TrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc Webinar - How to Live in a Post Third-Party Cookie World
TrustArc Webinar - How to Live in a Post Third-Party Cookie World
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and business
 
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile Brochure
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptx
 
Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kit
 
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptxGraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
GraphSummit Copenhagen 2024 - Neo4j Vision and Roadmap.pptx
 
Where developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingWhere developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is going
 
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInOutage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projects
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applications
 
The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)The New Cloud World Order Is FinOps (Slideshow)
The New Cloud World Order Is FinOps (Slideshow)
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4j
 
UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First Frame
 

Cyber crime ppt

  • 2. GROUP 1 Monday, September 24, 2012
  • 3. Crimes are not to be measured by the issue of events, but by the bad intensions of men. The greatest crimes do not arise from a want of feeling for others but from an over sensibility for ourselves and an over indulgence in our own desires. Monday, September 24, 2012
  • 4. CYBER CRIME !! The expression ‘Crime’ is defined as an act, which subjects the doer to legal punishment or any offence against morality, social order or any unjust or shameful act. The “Offence" is defined in the Code of Criminal Procedure to mean as an act or omission made punishable by any law for the time being in force. Cyber Crime is emerging as a serious threat. World wide governments, police departments and intelligence units have started to react. Monday, September 24, 2012
  • 5. Cyber Crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to enable the illicit activity. Computer crime mainly consists of unauthorized access to computer systems data alteration, data destruction, theft of intellectual property. Cyber crime in the context of national security may involve hacking, traditional espionage, or information warfare and related activities. Pornography, Threatening Email, Assuming someone's Identity, Sexual Harassment, Defamation, Spam and Phishing are some examples where computers are used to commit crime, whereas Viruses, Worms and Industrial Espionage, Software Piracy and Hacking are examples where computers become target of crime. Monday, September 24, 2012
  • 6. Indian Crime Scene The major Cyber Crimes reported, in India, are Denial of Services, Defacement of Websites, Spam, Computer Virus and Worms, Pornography, Cyber Squatting, Cyber Stalking and Phishing. Given the fact that nearly $ 120 million worth of Mobiles are being lost or stolen in the country every year, the users have to protect Information, Contact details and Telephone numbers as these could be misused. Nearly 69 per cent of information theft is carried out by current and ex-employees and 31 per cent by hackers. India has to go a long way in protecting the vital information. [3 The Hindu, Saturday, Oct 27, 2007]. Monday, September 24, 2012
  • 7. Cyber Crime Variants Hacking "Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 per cent increase this year. Cyber Squatting Cyber Squatting is the act of registering a famous Domain Name and then selling it for a fortune. This is an issue that has not been tackled in IT ACT 2000. Monday, September 24, 2012
  • 8. Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason. The fraudster then has access to the customer's online bank account and to the funds contained in that account. Monday, September 24, 2012
  • 9. Cyber Stalking is use of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse. Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. Monday, September 24, 2012
  • 10. VISHING Vishing is the criminal practice of using social engineering and Voice over IP (VoIP) to gain access to private personal and financial information from the public for the purpose of financial reward. The term is a combination of “Voice" and phishing. Vishing exploits the public's trust in landline telephone services. Vishing is typically used to steal credit card numbers or other information used in identity theft schemes from Monday, September 24, 2012 individuals.
  • 11. India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the Global Cyber Monday, September 24, 2012 Crime.
  • 12. Why India? A rapidly growing online user base  121 Million Internet Users  65 Million Active Internet Users, up by 28% from 51 million in 2010  50 Million users shop online on Ecommerce and Online Shopping Sites  46+ Million Social Network Users  346 million mobile users had subscribed to Data Packages. Monday, September 24, 2012 Source: IAMAI; Juxt; wearesocial 2011
  • 13. Cyber Crime In India  The majority of cybercrimes are centered on forgery, fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK,  Social networks as well as ecommerce sites are major targets,  6.9 million bot-infected systems in 2010,  14,348 website defacements in 2010,  6,850 .in and 4,150 .com domains were defaced during 2011,  15,000 sites hacked in 2011,  India is the number 1 country in the world for generating spam. Monday, September 24, 2012
  • 14. Cost Of Cyber Crime In India (2010)  29.9 million people fell victim to cybercrime,  $4 billion in direct financial losses,  $3.6 billion in time spent resolving the crime,  4 in 5 online adults (80%) have been a victim of Cybercrime,  17% of adults online have experienced cybercrime on their mobile phone. Source: Norton Cybercrime Report 2011 Monday, September 24, 2012
  • 15. We have covered about three instances where high-profile government websites were hacked and defaced. However, the actual number of Government Websites that were hacked are quite huge. A total number of 90, 119, 252 and 219 Government websites tracked by the Indian Computer Emergency Response Team (CERT-In) were hacked / defaced by various hacker groups in the year 2008, 2009, 2010 and Jan–Oct 2011 respectively. Monday, September 24, 2012
  • 16.  Again, this is growing trend and it is surprising that authorities have not taken stern actions to curb the growth of these cyber-crimes.  The police have recorded 3,038 cases but made only 2,700 arrests in 3 years (between 2007 and 2010)  India registered only 1,350 cases under the IT Act and IPC in 2010  50% of cybercrimes are not even reported. Monday, September 24, 2012
  • 17. Cyber Laws in India Under The Information Technology Act, 2000 CHAPTER XI – OFFENCES – 66. Hacking with computer system. (1) Whoever with the Intent to cause or knowing that he is likely to cause Wrongful Loss or Damage to the public or any person Destroys or Deletes or Alters any Information Residing in a Computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack. (2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both. Monday, September 24, 2012
  • 18. Whoever without permission of the owner of the computer :  Secures Access;  Downloads, Copies or extracts any data, computer database or any information;  Introduce or causes to be introduce any Virus or Contaminant;  Disrupts or causes disruption;  Denies or causes denial of access to any person;  Provides any assistance to any person to facilitate access  Charges the services availed of by a person to the account of another person by Tampering with or Manipulating any Computer, Computer System, or Computer Network; Shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected. Monday, September 24, 2012
  • 19. Information Technology Amendment Act, 2008 Section – 43, Destroys, Deletes or Alters any Information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means; Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage; “If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both.” [S.66] Monday, September 24, 2012
  • 20. S .66A - P u n i s h me n tf or s e ndi ng o f f e n s i v e me s s a g e s t h r o u g h c o mmu n i c a t i o n s e r v i c e , e t c  A n y p e r s o n w h o s e n d s , b y me a n s o f a c o mp u t e r r e s o u r c e o r a c o mmu n i c a t i o n d e v i c e ;  A n y i n f o r ma t i o n t h a t i s g r o s s l y o f f e n s i v e o r h a s me n a c i n g c ha r a c t e r ; or  An y i n f o r ma t i o n w h i c h h e k n o w s t o be f a l s e , but f or t he pur pos e of c a us i ng a nnoy a nc e , i nc onv e ni e nc e , da nge r , obs t r uc t i on , i ns ul t , i n j u r y , c r i mi n a l i n t i mi d a t i o n , e n mi t y , h a t r e d , o r i l l w i l l , pe r s i s t e n t l y ma k e s b y ma k i n g u s e of s u c h c o mp u t e r r e s o u r c e o r a c o mmu n i c a t i o n d e v i c e ;  A n y e l e c t r o n i c ma i l o r e l e c t r o n i c Monday, September m 2012 s a g e m a i l 24, e s f or t he pur pos e of c a us i ng a nnoy a nc e or
  • 21. S. 66C - Punishment for identity theft “Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh” S. 66D - Punishment for cheating by personation by using computer resource “Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees. “ Monday, September 24, 2012
  • 22. S . 66E - P u n i s h m e n t f o r v i ol a t i on of pr i v a c y . “Wh o e v e r , i n t e n t i o n a l l y o r k n o wi n g l y c a p t u r e s , p u b l i s h e s o r t r a n s mi t s t h e i ma g e o f a p r i v a t e a r e a o f a n y p e r s o n wi t h o u t h i s o r h e r c o n s e n t , u n d e r c i r c u ms t a n c e s v i o l a t i ng t he pr i v a c y of t ha t p e r s o n , s h a l l b e p u n i s h e d wi t h i mp r i s o n me n t w h i c h ma y e x t e n d t o t hr e e y e a r s o r wi t h f i n e n o t e x c e e d i n g t wo l a k h r u p e e s , o r wi t h b ot h” S . 67 A - P u n i s h me n t f or publ i s hi ng or t r a ns mi t t i n g o f ma t e r i a l c o n t a i n i ng sMonday,x u a 24, 2012 y e x p l i c i t a e September l l c t , e t c . i n
  • 23. S. 67 C - Preservation and Retention of information by intermediaries. “(1) Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe. (2) Any intermediary who intentionally or knowingly contravenes the provisions of sub section (1) shall be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.” Monday, September 24, 2012
  • 24. Arrests & Reports Under IT Act  Under the IT Act, 966 cybercrime cases were filed in 2010 420 in 2009)  Geographic breakdown of cases reported: o 153 from Karnataka, o 148 from Kerala o 142 from Maharashtra o 105 Andhra Pradesh o 52 Rajasthan o 52 Punjab  233 persons were arrested in 2010  33% of the cases registered were related to hacking Source: National Crime Records Bureau Monday, September 24, 2012
  • 25. Arrests & Reports Under IPC  Under the IPC, 356 cybercrime cases were registered in 2010 (276 cases in 2009)  Geographic breakdown of cases reported -- o 104 from Maharashtra o 66 Andhra Pradesh o 46 Chhattisgarh  The majority of these crimes were either forgery or fraud cases. Source: National Crime Records Bureau Monday, September 24, 2012
  • 26. How to Tackle Such Activities? An important question arises that how can these crimes be prevented. A number of techniques and solutions have been presented but the problems still exists and are increasing day by day. Antivirus And Anti Spyware Software: Аntivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software. Anti spy wares are used to restrict backdoor program, trojans and other spy wares to be installed on the computer. Firewalls: A firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two. A network firewall typically guards an internal computer network against malicious access from outside the network. Monday, September 24, 2012
  • 27. Cr y p t o g r a p h y : Cr y pt ogr a phy i s t he s c i e nc e of e n c r y pt i ng a nd de c r y pt i ng i n f o r ma t i o n . E n c r y p t i o n i s l i k e s e n d i n g a p o s t a l ma i l t o a n o t h e r pa r t y wi t h a l o c k c o d e o n t h e e n v e l o p e wh i c h i s k n o wn o n l y t o t h e s e nde r a nd t he r e c i pi e nt . A nu mb e r o f c r y p t o g r a p h i c me t h o d s ha v e b e e n d e v e l o p e d a n d s o me o f t h e m a r e s t i l l not c r a c k e d. Cy b e r E t h i c s a n d L a ws : Cy b e r e t h i c s a n d c y b e r l a ws a r e a l s o be i ng f or mu l a t e d t o s t o p c y b e r c r i me s . I t i s a r e s pons i bi l i t y of e v e r y i ndi v i dua l t o f ol l ow c y be r e t hi c s Monday, September 24, 2012 a n d c y b e r l a ws s o t ha t t he
  • 28. The Future of Cyber-Crimes in India • Continued Website Hacks and Defacements • Data and Information theft • Increasing phishing attacks on Ecommerce and Financial Websites • Cybercriminals targeting Social and Professional Networks • Threats directed at the Mobile Platform: Smartphones and Tablets Monday, September 24, 2012
  • 29. Conclusion… “Indian Laws are well drafted and are capable of handling all kinds of challenges as posed by cyber criminals. However, the enforcement agencies are required to be well versed with the changing technologies and Laws.” "As internet technology advances so does the threat of cyber crime. In times like these we must protect ourselves from cyber crime. Anti- virus software, firewalls and security patches are just the beginning. Never open suspicious e-mails and only navigate to trusted sites.” Monday, September 24, 2012
  • 30. THANK YOU!! F.Y.B.M.S. – B -- Namita Ludbe (140) -- Kavish Pandya (149) -- Mohammed Lakdawala (117) -- Ruchit Mehta (114) -- Kalpesh Solanki (70) -- Yash Dodia (93) -- Pratik Jain (72) Monday, September 24, 2012