SlideShare a Scribd company logo
1 of 18
Seminar on
CYBER-CRIME
Presented By:
Vaibhav Gaur
B.Tech IV Year/VIII Sem/CSE
CHARTERED INSTITUTE OF TECHNOLOGY
TRANSFORMING EDUCATION WITH GENERATION
JOIN ME ON :https://www.facebook.com/vaibh.gaur
INTRODUCTION
 As the use of internet is increasing day by day,
traditional concepts & methods of crime have
taken new dimensions.
 The development in information technology has
given rise to more number of cyber attacks like
hacking, phishing, data theft etc.
 A country like India has seen a growing number
of cyber assaults, witnessed the misuse of social
media & internet that brought home the threat of
CYBER-CRIME.
WHAT IS CYBER-CRIME ??
 Cyber-Crime can be defined as the intentional
use of computer, networks & public internets to
cause destruction & harm for personal objectives.
EXAMPLES OF CYBER-CRIME
 Hacking into computer systems.
 Introducing viruses to vulnerable networks.
 Website Defacing.
 Denial-of-Service(DoS) attacks.
 Terrorists threats made via e-mail.
CORE CHARACTERISTICS
Cyber Crime has some universal characteristics, which are as follows:
 It is done to convey a particular destructive or disruptive message to
the government.
 There are various methods to convey this message, viz., through
denial of services, sending threatening emails, defacing of
government websites, hacking and cracking of crucial governmental
systems or ‘protected systems’, disrupting the civil amenities through
destroying the proper working of the digital information systems, etc.
 It could affect the computers and the networks as a whole, it could
also affect the governing system, and it could affect the population of
target area to create threat.
 Computer and digital communication technology are used as main
tool to achieve extremist purposes.
 The whole act could be motivated by religious, social or political
ideologies.
COMMERCIAL SECTOR, A KEY TARGET
 Communication System:
News Organizations
Telephony suppliers
 Corporations:
Component suppliers(boots, foods, radios etc)
Civilian consulting companies
 Financial Institutions
Government funds tied up in commercial banks
 Health Care Industry
Pharmacies, hospitals, clinics
Drug companies(vaccines, antibiotics)
MOST COMMON ATTACKS !!
 Hackin With Computer System
 Data Theft
 Spreading Virus or Worms
 Identity Theft
HACKING WITH COMPUTER
SYSTEM
 Hacking means unauthorized attempts to bypass the security mechanisms
of an information system or network. Also, in simple words Hacking is the
unauthorized access to a computer system, programs, data and network
resources.
 LAWS :-Under section 66 of IT ACT 2008 & Section 43(A),IPC Section
379 and 406.
 PUNISHMENT:-Imprisonment upto 3 years or fine upto 5 lakh or
Both.
DATA THEFT
 If any person without permission of the owner or any other person, who is
incharge of a computer, computer system of computer network -
downloads, copies or extracts any data, computer data base or information
from such computer,computer system including information or data held
orstored in any removable storage medium.
 LAWS :-Under section 43(B) & Section 66 (E),67(C) of IT ACT 2008 &
IPC Section 379,405 and 420 &copyright.
 PUNISHMENT:-Imprisonment upto 3 years or fine upto 2 lakh or
Both.
SPREADING VIRUS OR WORM
 Viruses can do any amount of damage, the creator intends them to
do. They can send your data to a third party and then delete your
data from your computer. They can also ruin/mess up your system
and render it unusable without a re-installation of the operating
system.
 LAWS :-Under section 43(C) & Section 43 (E),66.
 PUNISHMENT:- Spreading of Virus offence is cognizable, bailable,
compoundable with permission of the court before which the prosecution
of such offence is pending and triable by any magistrate.
IDENTITY THEFT
 Identity theft is a form of fraud or cheating of another person’s identity in
which someone pretends to be someone else by assuming that person’s
identity, typically in order to access resources or obtain credit and other
benefits in that person’s name.
 LAWS :-Under section 66(C) & IPC Section 419.
 PUNISHMENT:- Imprisonment upto 3 years or fine upto 1 lakh or
Both.
CASE STUDIES
 9/11 attack
 Ahmadabad bomb blast
 26/11 Mumbai attack
9/11 TWIN TOWERS ATTACK
 Launched by Islamic terrorist group of Al-Qaeda
upon the United States in New York city & the
Washington D.C. metropolitan area.
 4 passengers airlines were hijacked by 19 Al-
Qaeda terrorists.
 Almost 3000 people died in the attack.
AHMADABAD BOMB BLAST(26-07-08)
 A mail with id alarbi_gujrat@yahoo.com was
being sent by a group of terrorists.
 Person named Kenneth Haywood’s unsecured
WiFi router in his house was being misused by
terrorists.
 56 people were killed & over 200 people were
injured.
26/11 MUMBAI ATTACK
 By the members of Lashkar-e-Taiba.
 Ajmal Kasab, the only attacker who was captured
alive, later confessed upon interrogation that the
attacks were conducted with the support of Pakistan.
 Major places of attacks were: Chhatrapati Shivaji
Terminus, the Taj Mahal Palace & tower, the Metro
Cinema etc.
 257 people were killed & 700 were injured.
WHAT DO WE NEED TO DO ??
 Maintain high alert & vigilance
 Update OS & applications regularly
 Enforce strong passwords
 “Lock down” systems
 Keep anti-virus software installed & up-to-date
 Employ intrusion detection systems & firewalls
CONCLUSION
 Cyber-Crime is a scary concept for many reasons.
It can do possible serious damage to various
aspects of our lives. It is difficult to catch & track
& prosecute.
 The information ago has brought us many good
things, but along with those good things came
some bad things too.
 All we can do as citizens is to protect ourselves by
protecting our information, who we give it to &
how much we give it out.
Cyber crime presentation By Vaibhav Gaur

More Related Content

What's hot

Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime typeskiran yadav
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital ageatuljaybhaye
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics sunanditaAnand
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 
Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crimeManish Singh
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signaturejolly9293
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 

What's hot (20)

Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Information security management
Information security managementInformation security management
Information security management
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crime
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 

Viewers also liked

Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and IntegrityZaid Shabbir
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full pptShahbaz Khan
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 

Viewers also liked (8)

Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Software Security
Software SecuritySoftware Security
Software Security
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
System security
System securitySystem security
System security
 

Similar to Cyber crime presentation By Vaibhav Gaur

1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptxAnkitShaw27
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd Iaetsd
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism Accenture
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 

Similar to Cyber crime presentation By Vaibhav Gaur (20)

Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 

Recently uploaded

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 

Recently uploaded (20)

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 

Cyber crime presentation By Vaibhav Gaur

  • 1. Seminar on CYBER-CRIME Presented By: Vaibhav Gaur B.Tech IV Year/VIII Sem/CSE CHARTERED INSTITUTE OF TECHNOLOGY TRANSFORMING EDUCATION WITH GENERATION JOIN ME ON :https://www.facebook.com/vaibh.gaur
  • 2. INTRODUCTION  As the use of internet is increasing day by day, traditional concepts & methods of crime have taken new dimensions.  The development in information technology has given rise to more number of cyber attacks like hacking, phishing, data theft etc.  A country like India has seen a growing number of cyber assaults, witnessed the misuse of social media & internet that brought home the threat of CYBER-CRIME.
  • 3. WHAT IS CYBER-CRIME ??  Cyber-Crime can be defined as the intentional use of computer, networks & public internets to cause destruction & harm for personal objectives.
  • 4. EXAMPLES OF CYBER-CRIME  Hacking into computer systems.  Introducing viruses to vulnerable networks.  Website Defacing.  Denial-of-Service(DoS) attacks.  Terrorists threats made via e-mail.
  • 5. CORE CHARACTERISTICS Cyber Crime has some universal characteristics, which are as follows:  It is done to convey a particular destructive or disruptive message to the government.  There are various methods to convey this message, viz., through denial of services, sending threatening emails, defacing of government websites, hacking and cracking of crucial governmental systems or ‘protected systems’, disrupting the civil amenities through destroying the proper working of the digital information systems, etc.  It could affect the computers and the networks as a whole, it could also affect the governing system, and it could affect the population of target area to create threat.  Computer and digital communication technology are used as main tool to achieve extremist purposes.  The whole act could be motivated by religious, social or political ideologies.
  • 6. COMMERCIAL SECTOR, A KEY TARGET  Communication System: News Organizations Telephony suppliers  Corporations: Component suppliers(boots, foods, radios etc) Civilian consulting companies  Financial Institutions Government funds tied up in commercial banks  Health Care Industry Pharmacies, hospitals, clinics Drug companies(vaccines, antibiotics)
  • 7. MOST COMMON ATTACKS !!  Hackin With Computer System  Data Theft  Spreading Virus or Worms  Identity Theft
  • 8. HACKING WITH COMPUTER SYSTEM  Hacking means unauthorized attempts to bypass the security mechanisms of an information system or network. Also, in simple words Hacking is the unauthorized access to a computer system, programs, data and network resources.  LAWS :-Under section 66 of IT ACT 2008 & Section 43(A),IPC Section 379 and 406.  PUNISHMENT:-Imprisonment upto 3 years or fine upto 5 lakh or Both.
  • 9. DATA THEFT  If any person without permission of the owner or any other person, who is incharge of a computer, computer system of computer network - downloads, copies or extracts any data, computer data base or information from such computer,computer system including information or data held orstored in any removable storage medium.  LAWS :-Under section 43(B) & Section 66 (E),67(C) of IT ACT 2008 & IPC Section 379,405 and 420 &copyright.  PUNISHMENT:-Imprisonment upto 3 years or fine upto 2 lakh or Both.
  • 10. SPREADING VIRUS OR WORM  Viruses can do any amount of damage, the creator intends them to do. They can send your data to a third party and then delete your data from your computer. They can also ruin/mess up your system and render it unusable without a re-installation of the operating system.  LAWS :-Under section 43(C) & Section 43 (E),66.  PUNISHMENT:- Spreading of Virus offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.
  • 11. IDENTITY THEFT  Identity theft is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name.  LAWS :-Under section 66(C) & IPC Section 419.  PUNISHMENT:- Imprisonment upto 3 years or fine upto 1 lakh or Both.
  • 12. CASE STUDIES  9/11 attack  Ahmadabad bomb blast  26/11 Mumbai attack
  • 13. 9/11 TWIN TOWERS ATTACK  Launched by Islamic terrorist group of Al-Qaeda upon the United States in New York city & the Washington D.C. metropolitan area.  4 passengers airlines were hijacked by 19 Al- Qaeda terrorists.  Almost 3000 people died in the attack.
  • 14. AHMADABAD BOMB BLAST(26-07-08)  A mail with id alarbi_gujrat@yahoo.com was being sent by a group of terrorists.  Person named Kenneth Haywood’s unsecured WiFi router in his house was being misused by terrorists.  56 people were killed & over 200 people were injured.
  • 15. 26/11 MUMBAI ATTACK  By the members of Lashkar-e-Taiba.  Ajmal Kasab, the only attacker who was captured alive, later confessed upon interrogation that the attacks were conducted with the support of Pakistan.  Major places of attacks were: Chhatrapati Shivaji Terminus, the Taj Mahal Palace & tower, the Metro Cinema etc.  257 people were killed & 700 were injured.
  • 16. WHAT DO WE NEED TO DO ??  Maintain high alert & vigilance  Update OS & applications regularly  Enforce strong passwords  “Lock down” systems  Keep anti-virus software installed & up-to-date  Employ intrusion detection systems & firewalls
  • 17. CONCLUSION  Cyber-Crime is a scary concept for many reasons. It can do possible serious damage to various aspects of our lives. It is difficult to catch & track & prosecute.  The information ago has brought us many good things, but along with those good things came some bad things too.  All we can do as citizens is to protect ourselves by protecting our information, who we give it to & how much we give it out.