SlideShare une entreprise Scribd logo
1  sur  36
AJEENKYA D.Y.PATIL SCHOOL OF ENGINEERING, PUNE
DEPARTMENT OF COMPUTER ENGINEERING
title
“CyberCrime,CyberSpaceandEffectsofCyberCrime…”
PRESENTED BY:
SAHIL MISHRA Roll No 72158457J
UNDER THE GUIDANCE OF:
Prof. NEHA SHARMA
Introduction
Literature Survey
Problem Statement
Objectives & Scope
System Architecture
Advantages and Disadvantages
Application
Conclusion
References
INDEX
INTRODUCTION
• CYBER SPACE:-A global domain within the information environment consisting of the
interdependent network of information systems infrastructures including the Internet,
telecommunications networks, computer systems, and embedded processors and
controllers.
• CYBER CRIME:-cybercrime, also called computer crime, the use of a computer as an
instrument to further illegal ends, such as committing fraud, trafficking in child
pornography and intellectual property, stealing identities, or violating privacy.
• EFFECT OF CYBER CRIME:-Some of the most commonly known cybercrimes include
identity theft, ransomware, cyber extortion, phishing, data breach, online shopping scams,
etc. The ill effects of cybercrimes often lead to extreme financial ruin and reputation
loss to both businesses and individuals.
EVOLUTIONOFCYBERSPACE
BEFORE 2000
AFTER2000
What is IOT ??
What is IOT ??
• The Internet of Things (IoT) is the network of physical objects-devices,
vehicles, buildings and other items embedded with electronics,
software, sensors, and network connectivity-that enables these
objects to collect and exchange data.
• In simple words, Internet of Things (IoT) is an ecosystem of connected
physical objects that are accessible through the internet.
THINK / FIND GET A SOLUTION
EVOLUTIONOFinternetconnectivity
AS WE HAVE LEARN PAN, LAN, WAN, MAN IN COMPUTER NETWORKING…..
IOT IN DAILY LIFE
The global human population will reach 8.0
billion alive in 2022. This is the percentage
that represent the IOT devices used and
creating a cyber-space
Literature Survey
Problem Statement …..!!!!!
• E Governance
• Social Media site
• Micro Blogs
• Mobile Apps
• Web Sites
• Internet has: porn sites- hate sites pirated software, music, movies -
viruses and malicious downloads, spyware - and data collection sites
Harassment and legal/financial risks
Objectives andscope
To reduce CYBERCASES IN MEDIA…!!!
IMPORTANTACT AGAINST CYBER CRIME……!!!!!!
• Information act –2000
• Indian penal code –1860
• Indian Copyright Act – 1957IT Act
Applicable to all states of India including Jammu & Kashmir It is
applicable to any violation of the provisions of this Act done by any
person anywhere in the world.
NATIONAL CYBER CRIME REPORTING PORTAL….!!!
WEBSITE :-
https://cybercrime.gov.in/
CYBER BULLYING….!!!
• Cyber bullying is one of the common cyber
threats being faced by children and young
people. Though cyber bullying can impact
anyone yet due to limited understanding
about cyber threats, children become easy
victims of cyber bullying .
• Cyber bullying means using internet or
mobile technology to intentionally harass or
bully someone by sending rude, mean or
hurtful messages, comments and
images/videos. A cyber bully can use text
messages, emails, social media platforms,
web pages, chat rooms, etc. to bully others.
MOBILE PHONE HARASSMENT….!!!
• Mobile phone harassment is Word, gesture or
act intended to insult the modesty of also
called BULLYING, which is a general term to
describe any type of unwanted telephone
calls or messages, or picture messages,
intended to cause upset and grief!!! - Sec 499,
509 of IPC and 120(0) KP Act . woman. Shall
be punished with simple imprisonment for a
term which may extend to one year, or with
fine, or with both
CYBER GROOMING….!!!
• Cyber Grooming is growing as one of the
major cyber threats faced by children and
teenagers. It is a practice where someone
builds an emotional bond with children
through social media or messaging platforms
with an objective of gaining their trust for
sexually abusing or exploiting them. The cyber
groomers can use gaming websites, social
media, email , chat rooms, instant messaging,
etc. by creating a fake account and pretending
to be a child or having same interests as of
the child.
BE AWARE OF THE VIDEO CHAT….!!!
“THIS IS A REAL LIFE ACCIDENT THAT HAVE BEEN WITH MY
BROTHER ALSO SO TAKE SOME NOTES……!!!!”
He is Manohar. He is in a
NGO and trying to make the
general public aware of the
money trap call and threat.
About shareing some private
pics and video with your
relatives and friends.
SOCIAL MEDIA (FAKE ACCOUNT)
• Similarly, Section 419 of the IPC could also be applied
with the same qualification that it must be making a
pecuniary(financial) benefit to it . Under Section 465 of
the Act, a person committing forgery shall be
imprisoned for up to two years and shall also liable to
pay fine Section 499/500 IPC. When fake profile is
posted with defamatory content with an intention to
defame other the offence punishable under Section
490/S001PC (defamation) is attracted Details Required
URL of the Suspect FB Account Screen Shot of FB
Account - Two or more ID Proof & Photo of the
Complainant URL & Screen Shot of the any post related
with the complainant .
SOCIAL MEDIA (FAKE ACCOUNT)
• Making a fake account of another person Section 66-
D of Information Technology Act 2000, which was
subsequently amended in 2008, states that
"whoever by means of any communication device or
computer resource cheats by personating, shall be
punished with imprisonment of either description
for a term which may extend to three years and shall
also be liable to fine which may extend to one lakh
rupees . "The real face behind the fake profile can be
traced through IP address, Internet Protocol address
(IP address) is a numeric label-a set of four numbers
(Eg. 202.54.30.1) that is assigned to every device
(e.g., computer, printer) participating on the internet
CAUSE OF ONLINE GAMES
• Addiction
• Loss of interest
• Underdeveloped physical condition
• Decline in personal hygiene
• Declining social activity
DANGEROUS ONLINE GAMES….!!!!
• Roblox popular with kids, teens and even add which losers to interact with one
another in this virtual world, play games and also engage in role play.
• My Friend Cayla - smart toy looks like an innocent baby doll with pretty
features, lovely hair, a sweet smile, and an equally adorable outfit.
• Blue Whale -This social media game dares its players to also Participate in a
series of tasks which are detrimental to their health and can also cause them
great harm.
• Fire Fairy This online prank targets younger children and is modelled after the
animated series, It gives dangerous instructions to unsuspecting kids on how
they can become a magical "fire fairy".
• Cloud Pets -These innocent-looking smart toys which come as cuddly elephant,
bear, cat, rabbit, dog or unicorn can record audio messages via a mobile app
and replay them for your child's entertainment.
• The Pass Out Challenge. The Salt and Ice Challenge The Fire Challenge The
Cutting Challenge
System Architecture
BEST PRACTICES TO AVOIDFINANCIALFRAUD
MOBILE APPLICATION SECURITY
Advantages and Disadvantages
1)Hacking
• Hacking: Hacker can be used to denote a computer expert engaged in
solving complex problems on computers or persons securing
unauthorized access, looks around, collects information and leaves
without a trace. Hacking done with malicious intention is called
cracker .
• Phreaker: is a person who manipulates and disrupts
telecommunication systems. Today telecommunication systems has
also been computerized.
Hacking
• Unauthorized access of Computer & Its resources Telecommunication
devices Telecommunication media, etc.
• Section 65 Tampering with computer Source document .
• Section 66 Hacking with computer systems - including all activities
mentioned in the sec 43
• Imprisonment up to three year or with fine which may extend up lakh
rupees, or with both.
2)A Word On Passwords
• The worst passwords to use are the one is that come to mind first --
name, spouse's name, maiden name, pets, children's name, even
street addresses, etc.
• The best passwords mix numbers with upper and lowercase letters.
• A password that is not found in the dictionary is even better.
• There are programs that will try every word in the dictionary in an
effort to crack your security. Changing passwords regularly
3)Facebook Security
• Trusted Friends Trusted friends are friends you can reach out to if you ever
get locked out of your Facebook account.
• Secure Browsing (https) Your traffic (i.e. all of your activity) on Facebook
becomes encrypted
• Login Notifications are an opt-in security feature where alerts are sent to
you each time your account is accessed from a new device. Add a Mobile
Number.
• Login Approvals: Similar to login notification, but need security code to
login.
• Password, Message & Links, Personal Information, Browser Security &
Computer Security
4)Gmail Security
1. Getting started with 2-step verification
2. Check the forwarding and delegation in mail settings tab.
3. Update your secondary email address and your security question,
and provide a mobile phone for SMS based account recovery
4. Secure Browsing (https)Your traffic (i.e. all of your activity) on
Facebook becomes encrypted
5. Check recent IP addresses accessing the account
6. Backup your Gmail Account- (Thunderbird, Outlook,
Pocomail).Password, Message & Links, Personal Information,
BrowserSecurity & Computer Security
5)Cyber Stalking
• A person following another especially women and continuously
harassing through online Cyber Stalking is generally considered as use
of the Internet, e-mail or other electronic communications device to
stalk or harass a person.
• Sec. 499, 503,509 IPC & Section 120(o) of KP Act.
• Punishable with simple imprisonment for a term which may extend to
two years, or with fine, or with both.
• Sec 503 IPC Sending threatening messages by email
• Sec 499 IPC Sending defamatory messages by email
What motivates a cyber Stalker?
• Sexual Harassment
• Obsession for love
• Revenge & Hate
• Ego & Power Trips
• Their main targets are the mostly females, children, emotionally weak
or unstable, etc. It is believed that Over 75% of the victims are female
THIS IS THE SITE WHERE PUNE PEOPLE CAN APPLY
COMPLAIN!!!! WEBSITE:-
PUNEPOLICE.GOV.IN
6)Cyber Defamation
• Publishing statements Towering the reputation of persons.
• When someone publishes defamatory matter about someone on a
website or sends e-mails, pictures, etc. containing defamatory
information to all of that person's friends or on the internet. Sec
499,500,503.
• In case of sexual abuse against women. Sec 509 & 354(a) IPC
•Cybersecurity will require a significant workforce
with deep domain knowledge.
•Almost everything is hooked up to the internet in
some sort of form.
•Recent events have widened the eyes of many
security experts.
•The ability to gain access to high security
organizations, infrastructures or mainframes has
frightened many people.
•Could one click of the mouse start World War III?
Conclusion
REFERENCE
• [1] DamboItari, Ezimora Okezie Anthony, and Nwanyanwu Mercy (2017),
‘Cyber Space Technology: Cyber Crime, Cyber Security and Models of Cyber
Solution: A Case Study of Nigeria’, International Journal of Computer
Science and Mobile Computing, Vol-6, Issue11, pp. 94-113.
• [2]. Halder, D., &Jaishankar, K. (2011),‘Cybercrime and the Victimization of
Women: Laws, Rights, andRegulations’, Hershey, PA, USA: IGI Global. ISBN
978-1-60960-830-9.
• [3]. Esharenana E,&Igun ‘Combating cyber-crime in Nigeria’ Electronic
library, Vol-26, Delta, Emerald Grouppublishing Ltd, 2008, pp.717.
• [4]. Cameron S.D. Brown (2015), ‘Investigation and Prosecuting Cyber
Crime: Forensic Dependencies and Barriers to Justice’, International Journal
of Cyber Criminology, ISSN 0975-5089, Vol-9, Issue-1, pp. 55-119
Thank you!

Contenu connexe

Similaire à Cybercrime and its Effects on Society

HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHINGsanthuana sg
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptxClichesin
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and securityDheeraj Kumar Tiwari
 

Similaire à Cybercrime and its Effects on Society (20)

HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber.ppt
Cyber.pptCyber.ppt
Cyber.ppt
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 

Dernier

Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 

Dernier (20)

Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 

Cybercrime and its Effects on Society

  • 1. AJEENKYA D.Y.PATIL SCHOOL OF ENGINEERING, PUNE DEPARTMENT OF COMPUTER ENGINEERING title “CyberCrime,CyberSpaceandEffectsofCyberCrime…” PRESENTED BY: SAHIL MISHRA Roll No 72158457J UNDER THE GUIDANCE OF: Prof. NEHA SHARMA
  • 2. Introduction Literature Survey Problem Statement Objectives & Scope System Architecture Advantages and Disadvantages Application Conclusion References INDEX
  • 3. INTRODUCTION • CYBER SPACE:-A global domain within the information environment consisting of the interdependent network of information systems infrastructures including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. • CYBER CRIME:-cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. • EFFECT OF CYBER CRIME:-Some of the most commonly known cybercrimes include identity theft, ransomware, cyber extortion, phishing, data breach, online shopping scams, etc. The ill effects of cybercrimes often lead to extreme financial ruin and reputation loss to both businesses and individuals.
  • 6. What is IOT ?? • The Internet of Things (IoT) is the network of physical objects-devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity-that enables these objects to collect and exchange data. • In simple words, Internet of Things (IoT) is an ecosystem of connected physical objects that are accessible through the internet. THINK / FIND GET A SOLUTION
  • 7. EVOLUTIONOFinternetconnectivity AS WE HAVE LEARN PAN, LAN, WAN, MAN IN COMPUTER NETWORKING…..
  • 9. The global human population will reach 8.0 billion alive in 2022. This is the percentage that represent the IOT devices used and creating a cyber-space
  • 11. Problem Statement …..!!!!! • E Governance • Social Media site • Micro Blogs • Mobile Apps • Web Sites • Internet has: porn sites- hate sites pirated software, music, movies - viruses and malicious downloads, spyware - and data collection sites Harassment and legal/financial risks
  • 12. Objectives andscope To reduce CYBERCASES IN MEDIA…!!!
  • 13. IMPORTANTACT AGAINST CYBER CRIME……!!!!!! • Information act –2000 • Indian penal code –1860 • Indian Copyright Act – 1957IT Act Applicable to all states of India including Jammu & Kashmir It is applicable to any violation of the provisions of this Act done by any person anywhere in the world.
  • 14. NATIONAL CYBER CRIME REPORTING PORTAL….!!! WEBSITE :- https://cybercrime.gov.in/
  • 15. CYBER BULLYING….!!! • Cyber bullying is one of the common cyber threats being faced by children and young people. Though cyber bullying can impact anyone yet due to limited understanding about cyber threats, children become easy victims of cyber bullying . • Cyber bullying means using internet or mobile technology to intentionally harass or bully someone by sending rude, mean or hurtful messages, comments and images/videos. A cyber bully can use text messages, emails, social media platforms, web pages, chat rooms, etc. to bully others.
  • 16. MOBILE PHONE HARASSMENT….!!! • Mobile phone harassment is Word, gesture or act intended to insult the modesty of also called BULLYING, which is a general term to describe any type of unwanted telephone calls or messages, or picture messages, intended to cause upset and grief!!! - Sec 499, 509 of IPC and 120(0) KP Act . woman. Shall be punished with simple imprisonment for a term which may extend to one year, or with fine, or with both
  • 17. CYBER GROOMING….!!! • Cyber Grooming is growing as one of the major cyber threats faced by children and teenagers. It is a practice where someone builds an emotional bond with children through social media or messaging platforms with an objective of gaining their trust for sexually abusing or exploiting them. The cyber groomers can use gaming websites, social media, email , chat rooms, instant messaging, etc. by creating a fake account and pretending to be a child or having same interests as of the child.
  • 18. BE AWARE OF THE VIDEO CHAT….!!! “THIS IS A REAL LIFE ACCIDENT THAT HAVE BEEN WITH MY BROTHER ALSO SO TAKE SOME NOTES……!!!!” He is Manohar. He is in a NGO and trying to make the general public aware of the money trap call and threat. About shareing some private pics and video with your relatives and friends.
  • 19. SOCIAL MEDIA (FAKE ACCOUNT) • Similarly, Section 419 of the IPC could also be applied with the same qualification that it must be making a pecuniary(financial) benefit to it . Under Section 465 of the Act, a person committing forgery shall be imprisoned for up to two years and shall also liable to pay fine Section 499/500 IPC. When fake profile is posted with defamatory content with an intention to defame other the offence punishable under Section 490/S001PC (defamation) is attracted Details Required URL of the Suspect FB Account Screen Shot of FB Account - Two or more ID Proof & Photo of the Complainant URL & Screen Shot of the any post related with the complainant .
  • 20. SOCIAL MEDIA (FAKE ACCOUNT) • Making a fake account of another person Section 66- D of Information Technology Act 2000, which was subsequently amended in 2008, states that "whoever by means of any communication device or computer resource cheats by personating, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees . "The real face behind the fake profile can be traced through IP address, Internet Protocol address (IP address) is a numeric label-a set of four numbers (Eg. 202.54.30.1) that is assigned to every device (e.g., computer, printer) participating on the internet
  • 21. CAUSE OF ONLINE GAMES • Addiction • Loss of interest • Underdeveloped physical condition • Decline in personal hygiene • Declining social activity
  • 22. DANGEROUS ONLINE GAMES….!!!! • Roblox popular with kids, teens and even add which losers to interact with one another in this virtual world, play games and also engage in role play. • My Friend Cayla - smart toy looks like an innocent baby doll with pretty features, lovely hair, a sweet smile, and an equally adorable outfit. • Blue Whale -This social media game dares its players to also Participate in a series of tasks which are detrimental to their health and can also cause them great harm. • Fire Fairy This online prank targets younger children and is modelled after the animated series, It gives dangerous instructions to unsuspecting kids on how they can become a magical "fire fairy". • Cloud Pets -These innocent-looking smart toys which come as cuddly elephant, bear, cat, rabbit, dog or unicorn can record audio messages via a mobile app and replay them for your child's entertainment. • The Pass Out Challenge. The Salt and Ice Challenge The Fire Challenge The Cutting Challenge
  • 23. System Architecture BEST PRACTICES TO AVOIDFINANCIALFRAUD
  • 25. Advantages and Disadvantages 1)Hacking • Hacking: Hacker can be used to denote a computer expert engaged in solving complex problems on computers or persons securing unauthorized access, looks around, collects information and leaves without a trace. Hacking done with malicious intention is called cracker . • Phreaker: is a person who manipulates and disrupts telecommunication systems. Today telecommunication systems has also been computerized.
  • 26. Hacking • Unauthorized access of Computer & Its resources Telecommunication devices Telecommunication media, etc. • Section 65 Tampering with computer Source document . • Section 66 Hacking with computer systems - including all activities mentioned in the sec 43 • Imprisonment up to three year or with fine which may extend up lakh rupees, or with both.
  • 27. 2)A Word On Passwords • The worst passwords to use are the one is that come to mind first -- name, spouse's name, maiden name, pets, children's name, even street addresses, etc. • The best passwords mix numbers with upper and lowercase letters. • A password that is not found in the dictionary is even better. • There are programs that will try every word in the dictionary in an effort to crack your security. Changing passwords regularly
  • 28. 3)Facebook Security • Trusted Friends Trusted friends are friends you can reach out to if you ever get locked out of your Facebook account. • Secure Browsing (https) Your traffic (i.e. all of your activity) on Facebook becomes encrypted • Login Notifications are an opt-in security feature where alerts are sent to you each time your account is accessed from a new device. Add a Mobile Number. • Login Approvals: Similar to login notification, but need security code to login. • Password, Message & Links, Personal Information, Browser Security & Computer Security
  • 29. 4)Gmail Security 1. Getting started with 2-step verification 2. Check the forwarding and delegation in mail settings tab. 3. Update your secondary email address and your security question, and provide a mobile phone for SMS based account recovery 4. Secure Browsing (https)Your traffic (i.e. all of your activity) on Facebook becomes encrypted 5. Check recent IP addresses accessing the account 6. Backup your Gmail Account- (Thunderbird, Outlook, Pocomail).Password, Message & Links, Personal Information, BrowserSecurity & Computer Security
  • 30. 5)Cyber Stalking • A person following another especially women and continuously harassing through online Cyber Stalking is generally considered as use of the Internet, e-mail or other electronic communications device to stalk or harass a person. • Sec. 499, 503,509 IPC & Section 120(o) of KP Act. • Punishable with simple imprisonment for a term which may extend to two years, or with fine, or with both. • Sec 503 IPC Sending threatening messages by email • Sec 499 IPC Sending defamatory messages by email
  • 31. What motivates a cyber Stalker? • Sexual Harassment • Obsession for love • Revenge & Hate • Ego & Power Trips • Their main targets are the mostly females, children, emotionally weak or unstable, etc. It is believed that Over 75% of the victims are female
  • 32. THIS IS THE SITE WHERE PUNE PEOPLE CAN APPLY COMPLAIN!!!! WEBSITE:- PUNEPOLICE.GOV.IN
  • 33. 6)Cyber Defamation • Publishing statements Towering the reputation of persons. • When someone publishes defamatory matter about someone on a website or sends e-mails, pictures, etc. containing defamatory information to all of that person's friends or on the internet. Sec 499,500,503. • In case of sexual abuse against women. Sec 509 & 354(a) IPC
  • 34. •Cybersecurity will require a significant workforce with deep domain knowledge. •Almost everything is hooked up to the internet in some sort of form. •Recent events have widened the eyes of many security experts. •The ability to gain access to high security organizations, infrastructures or mainframes has frightened many people. •Could one click of the mouse start World War III? Conclusion
  • 35. REFERENCE • [1] DamboItari, Ezimora Okezie Anthony, and Nwanyanwu Mercy (2017), ‘Cyber Space Technology: Cyber Crime, Cyber Security and Models of Cyber Solution: A Case Study of Nigeria’, International Journal of Computer Science and Mobile Computing, Vol-6, Issue11, pp. 94-113. • [2]. Halder, D., &Jaishankar, K. (2011),‘Cybercrime and the Victimization of Women: Laws, Rights, andRegulations’, Hershey, PA, USA: IGI Global. ISBN 978-1-60960-830-9. • [3]. Esharenana E,&Igun ‘Combating cyber-crime in Nigeria’ Electronic library, Vol-26, Delta, Emerald Grouppublishing Ltd, 2008, pp.717. • [4]. Cameron S.D. Brown (2015), ‘Investigation and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice’, International Journal of Cyber Criminology, ISSN 0975-5089, Vol-9, Issue-1, pp. 55-119