Visit to a blind student's school🧑🦯🧑🦯(community medicine)
Cybercrime and its Effects on Society
1. AJEENKYA D.Y.PATIL SCHOOL OF ENGINEERING, PUNE
DEPARTMENT OF COMPUTER ENGINEERING
title
“CyberCrime,CyberSpaceandEffectsofCyberCrime…”
PRESENTED BY:
SAHIL MISHRA Roll No 72158457J
UNDER THE GUIDANCE OF:
Prof. NEHA SHARMA
3. INTRODUCTION
• CYBER SPACE:-A global domain within the information environment consisting of the
interdependent network of information systems infrastructures including the Internet,
telecommunications networks, computer systems, and embedded processors and
controllers.
• CYBER CRIME:-cybercrime, also called computer crime, the use of a computer as an
instrument to further illegal ends, such as committing fraud, trafficking in child
pornography and intellectual property, stealing identities, or violating privacy.
• EFFECT OF CYBER CRIME:-Some of the most commonly known cybercrimes include
identity theft, ransomware, cyber extortion, phishing, data breach, online shopping scams,
etc. The ill effects of cybercrimes often lead to extreme financial ruin and reputation
loss to both businesses and individuals.
6. What is IOT ??
• The Internet of Things (IoT) is the network of physical objects-devices,
vehicles, buildings and other items embedded with electronics,
software, sensors, and network connectivity-that enables these
objects to collect and exchange data.
• In simple words, Internet of Things (IoT) is an ecosystem of connected
physical objects that are accessible through the internet.
THINK / FIND GET A SOLUTION
9. The global human population will reach 8.0
billion alive in 2022. This is the percentage
that represent the IOT devices used and
creating a cyber-space
11. Problem Statement …..!!!!!
• E Governance
• Social Media site
• Micro Blogs
• Mobile Apps
• Web Sites
• Internet has: porn sites- hate sites pirated software, music, movies -
viruses and malicious downloads, spyware - and data collection sites
Harassment and legal/financial risks
13. IMPORTANTACT AGAINST CYBER CRIME……!!!!!!
• Information act –2000
• Indian penal code –1860
• Indian Copyright Act – 1957IT Act
Applicable to all states of India including Jammu & Kashmir It is
applicable to any violation of the provisions of this Act done by any
person anywhere in the world.
14. NATIONAL CYBER CRIME REPORTING PORTAL….!!!
WEBSITE :-
https://cybercrime.gov.in/
15. CYBER BULLYING….!!!
• Cyber bullying is one of the common cyber
threats being faced by children and young
people. Though cyber bullying can impact
anyone yet due to limited understanding
about cyber threats, children become easy
victims of cyber bullying .
• Cyber bullying means using internet or
mobile technology to intentionally harass or
bully someone by sending rude, mean or
hurtful messages, comments and
images/videos. A cyber bully can use text
messages, emails, social media platforms,
web pages, chat rooms, etc. to bully others.
16. MOBILE PHONE HARASSMENT….!!!
• Mobile phone harassment is Word, gesture or
act intended to insult the modesty of also
called BULLYING, which is a general term to
describe any type of unwanted telephone
calls or messages, or picture messages,
intended to cause upset and grief!!! - Sec 499,
509 of IPC and 120(0) KP Act . woman. Shall
be punished with simple imprisonment for a
term which may extend to one year, or with
fine, or with both
17. CYBER GROOMING….!!!
• Cyber Grooming is growing as one of the
major cyber threats faced by children and
teenagers. It is a practice where someone
builds an emotional bond with children
through social media or messaging platforms
with an objective of gaining their trust for
sexually abusing or exploiting them. The cyber
groomers can use gaming websites, social
media, email , chat rooms, instant messaging,
etc. by creating a fake account and pretending
to be a child or having same interests as of
the child.
18. BE AWARE OF THE VIDEO CHAT….!!!
“THIS IS A REAL LIFE ACCIDENT THAT HAVE BEEN WITH MY
BROTHER ALSO SO TAKE SOME NOTES……!!!!”
He is Manohar. He is in a
NGO and trying to make the
general public aware of the
money trap call and threat.
About shareing some private
pics and video with your
relatives and friends.
19. SOCIAL MEDIA (FAKE ACCOUNT)
• Similarly, Section 419 of the IPC could also be applied
with the same qualification that it must be making a
pecuniary(financial) benefit to it . Under Section 465 of
the Act, a person committing forgery shall be
imprisoned for up to two years and shall also liable to
pay fine Section 499/500 IPC. When fake profile is
posted with defamatory content with an intention to
defame other the offence punishable under Section
490/S001PC (defamation) is attracted Details Required
URL of the Suspect FB Account Screen Shot of FB
Account - Two or more ID Proof & Photo of the
Complainant URL & Screen Shot of the any post related
with the complainant .
20. SOCIAL MEDIA (FAKE ACCOUNT)
• Making a fake account of another person Section 66-
D of Information Technology Act 2000, which was
subsequently amended in 2008, states that
"whoever by means of any communication device or
computer resource cheats by personating, shall be
punished with imprisonment of either description
for a term which may extend to three years and shall
also be liable to fine which may extend to one lakh
rupees . "The real face behind the fake profile can be
traced through IP address, Internet Protocol address
(IP address) is a numeric label-a set of four numbers
(Eg. 202.54.30.1) that is assigned to every device
(e.g., computer, printer) participating on the internet
21. CAUSE OF ONLINE GAMES
• Addiction
• Loss of interest
• Underdeveloped physical condition
• Decline in personal hygiene
• Declining social activity
22. DANGEROUS ONLINE GAMES….!!!!
• Roblox popular with kids, teens and even add which losers to interact with one
another in this virtual world, play games and also engage in role play.
• My Friend Cayla - smart toy looks like an innocent baby doll with pretty
features, lovely hair, a sweet smile, and an equally adorable outfit.
• Blue Whale -This social media game dares its players to also Participate in a
series of tasks which are detrimental to their health and can also cause them
great harm.
• Fire Fairy This online prank targets younger children and is modelled after the
animated series, It gives dangerous instructions to unsuspecting kids on how
they can become a magical "fire fairy".
• Cloud Pets -These innocent-looking smart toys which come as cuddly elephant,
bear, cat, rabbit, dog or unicorn can record audio messages via a mobile app
and replay them for your child's entertainment.
• The Pass Out Challenge. The Salt and Ice Challenge The Fire Challenge The
Cutting Challenge
25. Advantages and Disadvantages
1)Hacking
• Hacking: Hacker can be used to denote a computer expert engaged in
solving complex problems on computers or persons securing
unauthorized access, looks around, collects information and leaves
without a trace. Hacking done with malicious intention is called
cracker .
• Phreaker: is a person who manipulates and disrupts
telecommunication systems. Today telecommunication systems has
also been computerized.
26. Hacking
• Unauthorized access of Computer & Its resources Telecommunication
devices Telecommunication media, etc.
• Section 65 Tampering with computer Source document .
• Section 66 Hacking with computer systems - including all activities
mentioned in the sec 43
• Imprisonment up to three year or with fine which may extend up lakh
rupees, or with both.
27. 2)A Word On Passwords
• The worst passwords to use are the one is that come to mind first --
name, spouse's name, maiden name, pets, children's name, even
street addresses, etc.
• The best passwords mix numbers with upper and lowercase letters.
• A password that is not found in the dictionary is even better.
• There are programs that will try every word in the dictionary in an
effort to crack your security. Changing passwords regularly
28. 3)Facebook Security
• Trusted Friends Trusted friends are friends you can reach out to if you ever
get locked out of your Facebook account.
• Secure Browsing (https) Your traffic (i.e. all of your activity) on Facebook
becomes encrypted
• Login Notifications are an opt-in security feature where alerts are sent to
you each time your account is accessed from a new device. Add a Mobile
Number.
• Login Approvals: Similar to login notification, but need security code to
login.
• Password, Message & Links, Personal Information, Browser Security &
Computer Security
29. 4)Gmail Security
1. Getting started with 2-step verification
2. Check the forwarding and delegation in mail settings tab.
3. Update your secondary email address and your security question,
and provide a mobile phone for SMS based account recovery
4. Secure Browsing (https)Your traffic (i.e. all of your activity) on
Facebook becomes encrypted
5. Check recent IP addresses accessing the account
6. Backup your Gmail Account- (Thunderbird, Outlook,
Pocomail).Password, Message & Links, Personal Information,
BrowserSecurity & Computer Security
30. 5)Cyber Stalking
• A person following another especially women and continuously
harassing through online Cyber Stalking is generally considered as use
of the Internet, e-mail or other electronic communications device to
stalk or harass a person.
• Sec. 499, 503,509 IPC & Section 120(o) of KP Act.
• Punishable with simple imprisonment for a term which may extend to
two years, or with fine, or with both.
• Sec 503 IPC Sending threatening messages by email
• Sec 499 IPC Sending defamatory messages by email
31. What motivates a cyber Stalker?
• Sexual Harassment
• Obsession for love
• Revenge & Hate
• Ego & Power Trips
• Their main targets are the mostly females, children, emotionally weak
or unstable, etc. It is believed that Over 75% of the victims are female
32. THIS IS THE SITE WHERE PUNE PEOPLE CAN APPLY
COMPLAIN!!!! WEBSITE:-
PUNEPOLICE.GOV.IN
33. 6)Cyber Defamation
• Publishing statements Towering the reputation of persons.
• When someone publishes defamatory matter about someone on a
website or sends e-mails, pictures, etc. containing defamatory
information to all of that person's friends or on the internet. Sec
499,500,503.
• In case of sexual abuse against women. Sec 509 & 354(a) IPC
34. •Cybersecurity will require a significant workforce
with deep domain knowledge.
•Almost everything is hooked up to the internet in
some sort of form.
•Recent events have widened the eyes of many
security experts.
•The ability to gain access to high security
organizations, infrastructures or mainframes has
frightened many people.
•Could one click of the mouse start World War III?
Conclusion
35. REFERENCE
• [1] DamboItari, Ezimora Okezie Anthony, and Nwanyanwu Mercy (2017),
‘Cyber Space Technology: Cyber Crime, Cyber Security and Models of Cyber
Solution: A Case Study of Nigeria’, International Journal of Computer
Science and Mobile Computing, Vol-6, Issue11, pp. 94-113.
• [2]. Halder, D., &Jaishankar, K. (2011),‘Cybercrime and the Victimization of
Women: Laws, Rights, andRegulations’, Hershey, PA, USA: IGI Global. ISBN
978-1-60960-830-9.
• [3]. Esharenana E,&Igun ‘Combating cyber-crime in Nigeria’ Electronic
library, Vol-26, Delta, Emerald Grouppublishing Ltd, 2008, pp.717.
• [4]. Cameron S.D. Brown (2015), ‘Investigation and Prosecuting Cyber
Crime: Forensic Dependencies and Barriers to Justice’, International Journal
of Cyber Criminology, ISSN 0975-5089, Vol-9, Issue-1, pp. 55-119