SlideShare a Scribd company logo
1 of 19
Presented By:
Krishnav Ray Baruah
CONTENTS
 Introduction
 History of cyber crime
 Definition
 Categories of cyber crime
 Role of computer in crime
 Cyber criminals
 Phishing
 Prevention
source-michielwillens.com
INTRODUCTION
The internet in India is growing rapidly. It has
given rise to new opportunities in every field
we can think of – be it entertainment,
business, sports or education.
There are two sides to a coin. Internet also has
its own disadvantages. One of the major
disadvantages is Cyber crime – illegal
activity committed on the internet.
HISTORY OF CYBER CRIME
 THE FIRST RECORDED CYBER CRIME IN THE 1820.
In 1820, Joseph-Marie Jacquard, a textile
manufacturer in France, produced the loom. This
device allowed the repetition of a series of steps in
the weaving of special fabrics. This resulted in a
fear amongst Jacquard's employees that their
traditional employment and livelihood were being
threatened. They committed acts of sabotage to
discourage Jacquard from further use of the new
technology. This is the first recorded cyber crime!
DEFINING CYBER CRIME
It’s an unlawful act wherein the computer is either
a tool or a target or both.
Acts that are punishable by the Information
Technology Act.
Cyber space is a virtual space that has become as
important as real space for business, politics, and
communities
CATEGORIES OF CIBER CRIME
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government.
CYBER ATTACKS STATISTICS(2013)
Source-hackmageddon.com
ROLE OF COMPUTER IN CRIME
COMPUTER AS
TARGET
COMPUTER AS
TOOL
COMPUTER AS
APPLIANCE
Source-interaksyon.com
Insider Threats
(employees)
Hackers
(teenage thrill-seekers to
sophisticated criminals)
Hactivists'
(overloads e-mail servers or hack
web sites to send political message)
Virus writers
(writes viruses to that infect
systems)
Criminal groups
(attack systems & steal
password for financial gain)
Sensitive
intrusions
(sensitive information is
obtained via computer
intrusions)
Information
warfare
(alternative to military attacks)
Terrorists
(who have potential to disrupt
government systems with
computer attacks)
Cyber Warfare
(attack by sovereigns --- Crime or
Declaration of war)
CYBER CRIMINALS
Frequently Used Cyber Crimes
 Unauthorized access to computer
systems or networks.
 Theft of information contained in
electronic form.
 Email bombing.
 Data diddling.
 Salami attacks.
 Denial of Service attack.
 Virus / worm attacks
 Logic bombs
 Trojan attacks
 Internet time thefts
 Web jacking
 Theft of computer system
 Physically damaging a computer
system
Source:bostinno.streetwise.co
PHISHING
(A GROWING PROBLEM)
LINK MANIPULATION
A deception designed to steal valuable
personal data, such as credit card
numbers, passwords, account data, or
other information.
Source-pcwordl.com
GLOBAL PHISHING SURVEY 2012
Source-docs.apwg.org
EXAMPLE
WHOIS 210.104.211.21:
Location: Korea, Republic Of
Images from Anti-Phishing Working Group’s Phishing ArchiveSource-hongkiat.com
Source-hongkiat.com
PEREVENTION
USE STRONG PASSWORDS
SECURE YOUR COMPUTER
1) ACTIVATE YOUR FIREWALL
2) USE ANTI-VIRUS
3) BLOCK SPYWARE ATTACKS
BE SOCIAL –MEDIA SAVVY
SECURE YOUR MOBILR DEVICES.
INSTALL LATEST OS.
SECURE WIRELESS NETWORK.
PROTECT YOUR E-IDENTITY
CONCLUSION
“BYTES ARE REPLACING BULLETS IN
THE CRIME WORLD”
India needs a good combination of laws
and technology, in harmony with the
laws of other countries and keeping in
mind common security standards.
THANK YOU

More Related Content

What's hot

It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber CrimeLikan Patra
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt newOnkar1431
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Cyber crime presentation school level
Cyber crime presentation school levelCyber crime presentation school level
Cyber crime presentation school levelAbhinav Saxena
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 

What's hot (20)

It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime presentation school level
Cyber crime presentation school levelCyber crime presentation school level
Cyber crime presentation school level
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Similar to Cyber Crime (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Unit 1
Unit 1Unit 1
Unit 1
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
English in written
English in writtenEnglish in written
English in written
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correct
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Internet
InternetInternet
Internet
 
Evolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptxEvolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptx
 

More from Krishnav Ray Baruah

More from Krishnav Ray Baruah (8)

Internship Report (Krishnav Ray Baruah)
Internship Report (Krishnav Ray Baruah)Internship Report (Krishnav Ray Baruah)
Internship Report (Krishnav Ray Baruah)
 
United Colors of Benetton
United Colors of BenettonUnited Colors of Benetton
United Colors of Benetton
 
Research Methodology
Research MethodologyResearch Methodology
Research Methodology
 
PR Activities of Mc.Donald’s
PR Activities of Mc.Donald’sPR Activities of Mc.Donald’s
PR Activities of Mc.Donald’s
 
Make in India
Make in India Make in India
Make in India
 
Identifying Problems in Operations
Identifying Problems in OperationsIdentifying Problems in Operations
Identifying Problems in Operations
 
Environment Effects Personality
Environment Effects PersonalityEnvironment Effects Personality
Environment Effects Personality
 
Internship Report (Krishnav Ray Baruah)
Internship Report (Krishnav Ray Baruah)Internship Report (Krishnav Ray Baruah)
Internship Report (Krishnav Ray Baruah)
 

Recently uploaded

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Cyber Crime

  • 2. CONTENTS  Introduction  History of cyber crime  Definition  Categories of cyber crime  Role of computer in crime  Cyber criminals  Phishing  Prevention source-michielwillens.com
  • 3. INTRODUCTION The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
  • 4. HISTORY OF CYBER CRIME  THE FIRST RECORDED CYBER CRIME IN THE 1820. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
  • 5. DEFINING CYBER CRIME It’s an unlawful act wherein the computer is either a tool or a target or both. Acts that are punishable by the Information Technology Act. Cyber space is a virtual space that has become as important as real space for business, politics, and communities
  • 6. CATEGORIES OF CIBER CRIME 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government.
  • 8. ROLE OF COMPUTER IN CRIME COMPUTER AS TARGET COMPUTER AS TOOL COMPUTER AS APPLIANCE Source-interaksyon.com
  • 9. Insider Threats (employees) Hackers (teenage thrill-seekers to sophisticated criminals) Hactivists' (overloads e-mail servers or hack web sites to send political message) Virus writers (writes viruses to that infect systems) Criminal groups (attack systems & steal password for financial gain) Sensitive intrusions (sensitive information is obtained via computer intrusions) Information warfare (alternative to military attacks) Terrorists (who have potential to disrupt government systems with computer attacks) Cyber Warfare (attack by sovereigns --- Crime or Declaration of war) CYBER CRIMINALS
  • 10. Frequently Used Cyber Crimes  Unauthorized access to computer systems or networks.  Theft of information contained in electronic form.  Email bombing.  Data diddling.  Salami attacks.  Denial of Service attack.
  • 11.  Virus / worm attacks  Logic bombs  Trojan attacks  Internet time thefts  Web jacking  Theft of computer system  Physically damaging a computer system Source:bostinno.streetwise.co
  • 12. PHISHING (A GROWING PROBLEM) LINK MANIPULATION A deception designed to steal valuable personal data, such as credit card numbers, passwords, account data, or other information. Source-pcwordl.com
  • 13. GLOBAL PHISHING SURVEY 2012 Source-docs.apwg.org
  • 14. EXAMPLE WHOIS 210.104.211.21: Location: Korea, Republic Of Images from Anti-Phishing Working Group’s Phishing ArchiveSource-hongkiat.com
  • 16. PEREVENTION USE STRONG PASSWORDS SECURE YOUR COMPUTER 1) ACTIVATE YOUR FIREWALL 2) USE ANTI-VIRUS 3) BLOCK SPYWARE ATTACKS
  • 17. BE SOCIAL –MEDIA SAVVY SECURE YOUR MOBILR DEVICES. INSTALL LATEST OS. SECURE WIRELESS NETWORK. PROTECT YOUR E-IDENTITY
  • 18. CONCLUSION “BYTES ARE REPLACING BULLETS IN THE CRIME WORLD” India needs a good combination of laws and technology, in harmony with the laws of other countries and keeping in mind common security standards.