SlideShare a Scribd company logo
1 of 19
CYBER-CRIME
DON’T BE A VICTIM

Presenter:

ANSHUMAN TRIPATHI
Why Should we know about CyberCrime?
 In this Tech-savvy world of 21st Century

every one is engaged with internet,
through whatsapp, twitter, facebook, netbanking & lots of other platforms are there.
 And some criminal minded persons commit
crimes here, which is included under cybercrime.
 So we should be aware about crimes
happening around in the cyber-space.
Objectives
 To provide a general awareness of Cyber-

crime
 To Recognize Cyber-crime methods
 To know the importance of Cyber-laws(LOVE
BUG Suspects+ loss 10$ billion)
 To learn how to keep away from being a
victim
Technical Definition of
CYBER-CRIME.
 When Internet was developed, the founding
fathers of Internet hardly had any inclination that
Internet could also be misused for criminal

activities. Today, there are many disturbing things
happening in cyberspace. Cybercrime refers to all
the activities done with criminal intent in
cyberspace.

 Cyber crime refers to any crime that involves
a computer/mobile and a network. The
computer may have been used in the
commission of a crime, or it may be the

target.
What is Cyber-Crime?
Simple Theory When you purchase a home it comes with

a door and a lock. You always ensure that
the door/lock exist and working properly.
You may even purchase security systems.
 Well, why would you not secure your
investments?
 Likewise, Your System is your home and
security tools are your door/lock and
security tools.
 So if someone breaches into your

home’s(System), accesses all your personal
accounts and tampers your data, is the
criminal who is committing the crime.
 And committed crime is known as cybercrime.
 That means more precisely we can say that Cyber crime is an illegal activity committed
on the internet.
Various categories of CyberCrime.
Cyber Crime may be basically
divided into 3 categories Against Persons
 Against Property
 Against Government
Against Person:
 Cybercrimes committed against persons include
various crimes like transmission of childpornography, harassment of any one with the
use of a computer such as e-mail, and cyberstalking.
 The distribution, posting, and dissemination of

obscene material including pornography,
indecent exposure, and child pornography,
constitutes one of the most important
Cybercrimes known today. The potential harm of
such a crime to humanity can hardly be
overstated..
Against Property:
 The second category of Cybercrimes is

that of Cybercrimes against all forms of
property. These crimes include
unauthorized computer trespassing through
cyberspace, computer vandalism,
transmission of harmful programs, and
unauthorized possession of computerized
information.
Against Government:
 The third category of Cybercrimes relate to
Cybercrimes against Government. Cyber

Terrorism is one distinct kind of crime in this
category. The growth of Internet has shown
that the medium of Cyberspace is being used
by individuals and groups to the international
governments as also to threaten the citizens
of a country. This crime manifests itself into
terrorism when an individual "cracks“ into a
government or military maintained website.
Examples Of cyber-Crime:
Cyber-Crimes and their
History:
 The majority of cybercrimes are centered on forgery,

fraud and Phishing,
 India is the third-most targeted country for Phishing
attacks after the US and the UK,
 Social networks as well as ecommerce sites are
major targets,
 6.9 million bot-infected systems in 2010,
 14,348 website defacements in 2010,
 6,850 .in and 4,150 .com domains were defaced
during 2011,
 15,000 sites hacked in 2011,
 India is the number 1 country in the world for
generating spam.
 Looking at the scam history, some of the popular











scams have been the ‘419 scam’,
‘See who viewed your profile!’,
‘Dad walks in on daughter …. Embarrassing!’,
‘The ‘dislike’ button’,
‘Make thousands working from home!’,
Twitter direct messages with bad links,
‘Twitter mentions’,
‘Justin Bieber stabbed!’,
‘Your account has been cancelled.’,
‘Confirm your email account’,
‘Facebook will start charging members!’, and
the list can go on and on.
 A total number of 90, 119, 252 and 219

Government websites tracked by the Indian
Computer Emergency Response Team (CERT-In)
were hacked / defaced by various hacker groups in
the year 2010, 2011, 2012 and Jan–Oct 2013
respectively.
Cyber Laws:
 There is absolutely no comprehensive law on

Cybercrime any where in the world. This is
reason that the investigating agencies like FBI
are finding the Cyberspace to be an extremely
difficult terrain.
“LOVE BUG”
 The most recent case of the virus "I love you"

demonstrates the need for having cyber laws
concerning Cybercrimes in different national
jurisdictions. At the time of the web publication
of this feature, Reuters has reported that "The
Philippines has yet to arrest the suspected
creator of the 'Love Bug' computer virus because
it lacks laws that deal with computer crime, a
senior police officer said". The fact of the matter
is that there are no laws relating to Cybercrime
in the Philippines. The National Bureau of
Investigation is finding it difficult to legally arrest
the suspect behind the 'Love Bug‘ computer
virus.
How to Tackle Such Activities??
 Awareness is the first step in protecting

yourself, your family and your business.
 Invest in Anti-virus, Firewall, and SPAM
blocking software for your PC.
 Detect secure websites when conducting
transactions online.
 Do NOT respond or act on emails sent
from unknown sources.
Conclusion
 The key to protecting yourself is being

aware.
 Not all cybercriminals are “hackers.”
 There is a whole other world that exists in
cyberspace… make sure that your
information travels safely.
 Stay Secure, Stay
Thank You

More Related Content

What's hot

Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hackingAyush Upadhyay
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptShravan Sanidhya
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 

What's hot (20)

Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Viewers also liked

SydMobNet July 2014: Xamarin 3 & Xamarin Forms
SydMobNet July 2014: Xamarin 3 & Xamarin FormsSydMobNet July 2014: Xamarin 3 & Xamarin Forms
SydMobNet July 2014: Xamarin 3 & Xamarin FormsAlec Tucker
 
Cyborg ppt presentation
Cyborg ppt presentationCyborg ppt presentation
Cyborg ppt presentationmunisai
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation Priya Saluja
 
111124 farmer suicides presentation
111124 farmer suicides presentation111124 farmer suicides presentation
111124 farmer suicides presentationRamanjaneyulu GV
 
Presentation on farmer suicides
Presentation on farmer suicidesPresentation on farmer suicides
Presentation on farmer suicidesDivya Ravali
 
Farmers suicides
Farmers suicidesFarmers suicides
Farmers suicideskrishna65
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made EasyJerry Bishop
 
IT Governance Introduction
IT Governance  IntroductionIT Governance  Introduction
IT Governance IntroductionKeith Rackley
 
farmer suicide ppt
farmer suicide pptfarmer suicide ppt
farmer suicide pptPankaj Kumar
 
EFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentationEFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentationS L
 
Cyber laws
Cyber lawsCyber laws
Cyber lawsmadhu190
 
Sociology of the mass media - Marxist perspective on the media
Sociology of the mass media - Marxist perspective on the mediaSociology of the mass media - Marxist perspective on the media
Sociology of the mass media - Marxist perspective on the mediabrunogiegerich
 

Viewers also liked (20)

SydMobNet July 2014: Xamarin 3 & Xamarin Forms
SydMobNet July 2014: Xamarin 3 & Xamarin FormsSydMobNet July 2014: Xamarin 3 & Xamarin Forms
SydMobNet July 2014: Xamarin 3 & Xamarin Forms
 
Cyborgs Powerpoint
Cyborgs PowerpointCyborgs Powerpoint
Cyborgs Powerpoint
 
Cyborg ppt presentation
Cyborg ppt presentationCyborg ppt presentation
Cyborg ppt presentation
 
Cyborg
CyborgCyborg
Cyborg
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Farmers suicide
Farmers suicideFarmers suicide
Farmers suicide
 
111124 farmer suicides presentation
111124 farmer suicides presentation111124 farmer suicides presentation
111124 farmer suicides presentation
 
Presentation on farmer suicides
Presentation on farmer suicidesPresentation on farmer suicides
Presentation on farmer suicides
 
Farmers suicide
Farmers suicideFarmers suicide
Farmers suicide
 
Farmers suicides
Farmers suicidesFarmers suicides
Farmers suicides
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made Easy
 
IT Governance Introduction
IT Governance  IntroductionIT Governance  Introduction
IT Governance Introduction
 
MIS 12 E-Governance
MIS 12 E-GovernanceMIS 12 E-Governance
MIS 12 E-Governance
 
farmer suicide ppt
farmer suicide pptfarmer suicide ppt
farmer suicide ppt
 
EFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentationEFFECTIVE IT GOVERNANCE presentation
EFFECTIVE IT GOVERNANCE presentation
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber law
Cyber lawCyber law
Cyber law
 
What is IT Governance?
What is IT Governance?What is IT Governance?
What is IT Governance?
 
Sociology of the mass media - Marxist perspective on the media
Sociology of the mass media - Marxist perspective on the mediaSociology of the mass media - Marxist perspective on the media
Sociology of the mass media - Marxist perspective on the media
 

Similar to CYBER-CRIME DON’T BE A VICTIM

Similar to CYBER-CRIME DON’T BE A VICTIM (17)

cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

CYBER-CRIME DON’T BE A VICTIM

  • 1. CYBER-CRIME DON’T BE A VICTIM Presenter: ANSHUMAN TRIPATHI
  • 2. Why Should we know about CyberCrime?  In this Tech-savvy world of 21st Century every one is engaged with internet, through whatsapp, twitter, facebook, netbanking & lots of other platforms are there.  And some criminal minded persons commit crimes here, which is included under cybercrime.  So we should be aware about crimes happening around in the cyber-space.
  • 3. Objectives  To provide a general awareness of Cyber- crime  To Recognize Cyber-crime methods  To know the importance of Cyber-laws(LOVE BUG Suspects+ loss 10$ billion)  To learn how to keep away from being a victim
  • 4. Technical Definition of CYBER-CRIME.  When Internet was developed, the founding fathers of Internet hardly had any inclination that Internet could also be misused for criminal activities. Today, there are many disturbing things happening in cyberspace. Cybercrime refers to all the activities done with criminal intent in cyberspace.  Cyber crime refers to any crime that involves a computer/mobile and a network. The computer may have been used in the commission of a crime, or it may be the target.
  • 5. What is Cyber-Crime? Simple Theory When you purchase a home it comes with a door and a lock. You always ensure that the door/lock exist and working properly. You may even purchase security systems.  Well, why would you not secure your investments?  Likewise, Your System is your home and security tools are your door/lock and security tools.
  • 6.  So if someone breaches into your home’s(System), accesses all your personal accounts and tampers your data, is the criminal who is committing the crime.  And committed crime is known as cybercrime.  That means more precisely we can say that Cyber crime is an illegal activity committed on the internet.
  • 7. Various categories of CyberCrime. Cyber Crime may be basically divided into 3 categories Against Persons  Against Property  Against Government
  • 8. Against Person:  Cybercrimes committed against persons include various crimes like transmission of childpornography, harassment of any one with the use of a computer such as e-mail, and cyberstalking.  The distribution, posting, and dissemination of obscene material including pornography, indecent exposure, and child pornography, constitutes one of the most important Cybercrimes known today. The potential harm of such a crime to humanity can hardly be overstated..
  • 9. Against Property:  The second category of Cybercrimes is that of Cybercrimes against all forms of property. These crimes include unauthorized computer trespassing through cyberspace, computer vandalism, transmission of harmful programs, and unauthorized possession of computerized information.
  • 10. Against Government:  The third category of Cybercrimes relate to Cybercrimes against Government. Cyber Terrorism is one distinct kind of crime in this category. The growth of Internet has shown that the medium of Cyberspace is being used by individuals and groups to the international governments as also to threaten the citizens of a country. This crime manifests itself into terrorism when an individual "cracks“ into a government or military maintained website.
  • 12. Cyber-Crimes and their History:  The majority of cybercrimes are centered on forgery, fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK,  Social networks as well as ecommerce sites are major targets,  6.9 million bot-infected systems in 2010,  14,348 website defacements in 2010,  6,850 .in and 4,150 .com domains were defaced during 2011,  15,000 sites hacked in 2011,  India is the number 1 country in the world for generating spam.
  • 13.  Looking at the scam history, some of the popular           scams have been the ‘419 scam’, ‘See who viewed your profile!’, ‘Dad walks in on daughter …. Embarrassing!’, ‘The ‘dislike’ button’, ‘Make thousands working from home!’, Twitter direct messages with bad links, ‘Twitter mentions’, ‘Justin Bieber stabbed!’, ‘Your account has been cancelled.’, ‘Confirm your email account’, ‘Facebook will start charging members!’, and the list can go on and on.
  • 14.  A total number of 90, 119, 252 and 219 Government websites tracked by the Indian Computer Emergency Response Team (CERT-In) were hacked / defaced by various hacker groups in the year 2010, 2011, 2012 and Jan–Oct 2013 respectively.
  • 15. Cyber Laws:  There is absolutely no comprehensive law on Cybercrime any where in the world. This is reason that the investigating agencies like FBI are finding the Cyberspace to be an extremely difficult terrain.
  • 16. “LOVE BUG”  The most recent case of the virus "I love you" demonstrates the need for having cyber laws concerning Cybercrimes in different national jurisdictions. At the time of the web publication of this feature, Reuters has reported that "The Philippines has yet to arrest the suspected creator of the 'Love Bug' computer virus because it lacks laws that deal with computer crime, a senior police officer said". The fact of the matter is that there are no laws relating to Cybercrime in the Philippines. The National Bureau of Investigation is finding it difficult to legally arrest the suspect behind the 'Love Bug‘ computer virus.
  • 17. How to Tackle Such Activities??  Awareness is the first step in protecting yourself, your family and your business.  Invest in Anti-virus, Firewall, and SPAM blocking software for your PC.  Detect secure websites when conducting transactions online.  Do NOT respond or act on emails sent from unknown sources.
  • 18. Conclusion  The key to protecting yourself is being aware.  Not all cybercriminals are “hackers.”  There is a whole other world that exists in cyberspace… make sure that your information travels safely.  Stay Secure, Stay