SlideShare a Scribd company logo
1 of 24
Presented by
Dheeraj Dani
7737401991
Contents:
 Introduction
 What is Cyber Crime?
 History of cyber crime
 Definition
 Categories of cyber crime
 CYBER ATTACKS STATISTICS 2013
 Cyber criminals
 What is IT Law and Cyber Law
 Phishing
 Botnet
 conclusion
INTRODUCTION
 The internet in India is growing rapidly. It has given

rise to new opportunities in every field we can think
of – be it entertainment, business, sports or
education.

 There are two sides to a coin. Internet also has its

own disadvantages. One of the major disadvantages
is Cyber crime – illegal activity committed on the
internet.
What is Cyber crime???
• Cyber crime is simply defined as crimes that are

directly related
computers.

• An

to

computers

and

using

increasing number of domestic and
international criminal activities are using the
Internet. Computers and other electronic
devices can be tools to commit crime or are
targeted by criminals. A personal computer
connected to the Internet without protection
may be infected with malicious software in
under a minute.
History of Cyber Crime
• In the early decades of modern information technology (IT),

computer crimes were largely committed
disgruntled and dishonest employees.

by

individual

• Physical damage to computer systems was a prominent threat

until the 1980s.

• Criminals often used unauthorized access to subvert security

systems as they modified data for financial gain or destroyed
data for revenge.

• As telecommunications technology spread throughout the IT

world, programmers began writing malicious software,
including self-replicating programs, to interfere with personal
computers.
DEFINING CYBER CRIME
 It’s an unlawful act wherein the computer is

either a tool or a target or both.

 Acts that are punishable by the Information

Technology Act.

 Cyber space is a virtual space that has become

as important as real space for business, politics,
and communities
CATEGORIES OF CIBER CRIME
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government
CYBER ATTACKS STATISTICS(2013)
CYBER CRIMINALS
Insider
Threats
Virus writers
(writes viruses to that
infect systems)

Information
warfare
(alternative to military
attacks)

Hactivists'

(teenage thrill-seekers to
sophisticated criminals)

(overloads e-mail servers
or hack web sites to send
political message)

Criminal
groups

Sensitive
intrusions

(attack systems &
steal password for
financial gain)

(employees)

Hackers

(sensitive information
is obtained via
computer intrusions)

Terrorists

Cyber
Warfare (attack by

(who have potential to
disrupt government
systems with computer
attacks)

sovereigns --- Crime or
Declaration of war)
What is IT Law and Cyber Law
 IT Law is a set of legal enactments, currently in

existence in several countries, which governs
the digital dissemination of both (digitalized)
information and software.

 Cyber law or Internet law is a term that

encapsulates the legal issues related to use of
the Internet. It is less a distinct field of law than
intellectual property or contract law, as it is a
domain covering many areas of law and
regulation. Some leading topics include internet
access and usage, privacy, freedom of
expression.
PHISHING
 A deception designed to steal valuable
personal data, such as credit card
numbers, passwords, account data, or other
information.
GLOBAL PHISHING SURVEY 2012
PEREVENTION
USE STRONG PASSWORDS
SECURE YOUR COMPUTER
1)

ACTIVATE YOUR FIREWALL

2)

USE ANTI-VIRUS

3)

BLOCK SPYWARE ATTACKS
 BE SOCIAL –MEDIA SAVVY
 SECURE YOUR MOBILR DEVICES.
 INSTALL LATEST OS.
 SECURE WIRELESS NETWORK.

 PROTECT YOUR E-IDENTITY
Why India?
A rapidly growing online
user base








121 Million Internet Users
65 Million Active Internet
Users, up by 28% from
51 million in 2010
50 Million users shop
online on Ecommerce and
Online Shopping Sites
46+ Million Social
Network Users
346 million mobile users
had subscribed to Data
Packages.
 The majority of cybercrimes are centered on fraud and








Phishing,
India is the third-most targeted country for Phishing attacks
after the US and the UK,
Social networks as well as ecommerce sites are major targets,
6.9 million bot-infected systems in 2010,
14,348 website defacements in 2010,
6,850 .in and 4,150 .com domains were defaced during 2011,
15,000 sites hacked in 2011,
India is the number 1 country in the world for generating
spam.
Botnets
 A network of compromised computers that have

been infected with malicious code, and can be
remotely-controlled through commands sent
via the Internet by a botmaster
 Used for making money! Who pays:

 Internet Advertising companies for downloading

adware onto vulnerable PCs
 Companies who send spam, viruses and other
malware
 Google (unintentionally, see Clickbot.A summary)

 Used for the heck of it
Botnet Threat
 Botnets are a major threat to the Internet
because:
 Consist of a large pool of compromised

computers that are organized by a master.
 a.k.a., Zombie Armies
 Carry out sophisticated attacks to disrupt, gather
sensitive data, or increase armies
 Armies are in the 1000’s to aggregate computing
power
 Communication network allows bots to evolve on
compromised hosts
Attacking Behaviors
 Infecting new hosts



Social engineering and distribution of malicious emails or
other electronic communications (i.e. Instant Messaging)
Example - Email sent with botnet diguised as a harmless
attachment.

 Stealing personal information


Keylogger and Network sniffer technology used on
compromised systems to spy on users and compile personal
information

 Phishing and spam proxy


Aggregated computing power and proxy capability make
allow spammers to impact larger groups without being
traced.

 Distributed Denial of Service (DDoS)


Impair or eliminate availability of a network to extort or
disrupt business
Communication Protocols
 In most cases botnets use well defined and

accepted Communication Protocols.
Understanding the communication protocols
used helps to:

Determine the origins of a botnet attack and the
software being used

Allow researchers to decode conversations
happening between the bots and the masters


 There are two main Communication Protocols

used for bot attacks:



IRC
HTTP
Conclusion
 Cybercrime

greatly

affects

individuals, businesses, and national security due to
the pervasiveness ofthe

Internet

Different countries should work together and use
legal, organizational, and technological approaches
to combat cybercrime
• To reduce the damage to critical infrastructures
• To protect the Internet from being abused
It act and cyber crime
It act and cyber crime

More Related Content

What's hot (20)

Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Current threats and trends
Current threats and trendsCurrent threats and trends
Current threats and trendsLive Tecnologies
 
DDoS Attacks, Russia, 2011- 2012: Patterns and Trends
DDoS Attacks, Russia, 2011- 2012: Patterns and TrendsDDoS Attacks, Russia, 2011- 2012: Patterns and Trends
DDoS Attacks, Russia, 2011- 2012: Patterns and TrendsHLL
 
Dowloading as Deviance
Dowloading as DevianceDowloading as Deviance
Dowloading as DevianceJason Rutter
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)Asish Verma
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and usechrispaul8676
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

Viewers also liked (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Current threats and trends
Current threats and trendsCurrent threats and trends
Current threats and trends
 
DDoS Attacks, Russia, 2011- 2012: Patterns and Trends
DDoS Attacks, Russia, 2011- 2012: Patterns and TrendsDDoS Attacks, Russia, 2011- 2012: Patterns and Trends
DDoS Attacks, Russia, 2011- 2012: Patterns and Trends
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Dowloading as Deviance
Dowloading as DevianceDowloading as Deviance
Dowloading as Deviance
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Arab spring
Arab springArab spring
Arab spring
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to It act and cyber crime

CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxVipinRawat52
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Internet
InternetInternet
InternetJodip
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technologyBinu p jayan
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 

Similar to It act and cyber crime (20)

CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Internet
InternetInternet
Internet
 
English in written
English in writtenEnglish in written
English in written
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technology
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 

Recently uploaded

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 

Recently uploaded (20)

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

It act and cyber crime

  • 2. Contents:  Introduction  What is Cyber Crime?  History of cyber crime  Definition  Categories of cyber crime  CYBER ATTACKS STATISTICS 2013  Cyber criminals  What is IT Law and Cyber Law  Phishing  Botnet  conclusion
  • 3. INTRODUCTION  The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education.  There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
  • 4. What is Cyber crime??? • Cyber crime is simply defined as crimes that are directly related computers. • An to computers and using increasing number of domestic and international criminal activities are using the Internet. Computers and other electronic devices can be tools to commit crime or are targeted by criminals. A personal computer connected to the Internet without protection may be infected with malicious software in under a minute.
  • 5. History of Cyber Crime • In the early decades of modern information technology (IT), computer crimes were largely committed disgruntled and dishonest employees. by individual • Physical damage to computer systems was a prominent threat until the 1980s. • Criminals often used unauthorized access to subvert security systems as they modified data for financial gain or destroyed data for revenge. • As telecommunications technology spread throughout the IT world, programmers began writing malicious software, including self-replicating programs, to interfere with personal computers.
  • 6. DEFINING CYBER CRIME  It’s an unlawful act wherein the computer is either a tool or a target or both.  Acts that are punishable by the Information Technology Act.  Cyber space is a virtual space that has become as important as real space for business, politics, and communities
  • 7. CATEGORIES OF CIBER CRIME 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government
  • 9. CYBER CRIMINALS Insider Threats Virus writers (writes viruses to that infect systems) Information warfare (alternative to military attacks) Hactivists' (teenage thrill-seekers to sophisticated criminals) (overloads e-mail servers or hack web sites to send political message) Criminal groups Sensitive intrusions (attack systems & steal password for financial gain) (employees) Hackers (sensitive information is obtained via computer intrusions) Terrorists Cyber Warfare (attack by (who have potential to disrupt government systems with computer attacks) sovereigns --- Crime or Declaration of war)
  • 10. What is IT Law and Cyber Law  IT Law is a set of legal enactments, currently in existence in several countries, which governs the digital dissemination of both (digitalized) information and software.  Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet. It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include internet access and usage, privacy, freedom of expression.
  • 11. PHISHING  A deception designed to steal valuable personal data, such as credit card numbers, passwords, account data, or other information.
  • 13.
  • 14. PEREVENTION USE STRONG PASSWORDS SECURE YOUR COMPUTER 1) ACTIVATE YOUR FIREWALL 2) USE ANTI-VIRUS 3) BLOCK SPYWARE ATTACKS
  • 15.  BE SOCIAL –MEDIA SAVVY  SECURE YOUR MOBILR DEVICES.  INSTALL LATEST OS.  SECURE WIRELESS NETWORK.  PROTECT YOUR E-IDENTITY
  • 16. Why India? A rapidly growing online user base      121 Million Internet Users 65 Million Active Internet Users, up by 28% from 51 million in 2010 50 Million users shop online on Ecommerce and Online Shopping Sites 46+ Million Social Network Users 346 million mobile users had subscribed to Data Packages.
  • 17.  The majority of cybercrimes are centered on fraud and        Phishing, India is the third-most targeted country for Phishing attacks after the US and the UK, Social networks as well as ecommerce sites are major targets, 6.9 million bot-infected systems in 2010, 14,348 website defacements in 2010, 6,850 .in and 4,150 .com domains were defaced during 2011, 15,000 sites hacked in 2011, India is the number 1 country in the world for generating spam.
  • 18. Botnets  A network of compromised computers that have been infected with malicious code, and can be remotely-controlled through commands sent via the Internet by a botmaster  Used for making money! Who pays:  Internet Advertising companies for downloading adware onto vulnerable PCs  Companies who send spam, viruses and other malware  Google (unintentionally, see Clickbot.A summary)  Used for the heck of it
  • 19. Botnet Threat  Botnets are a major threat to the Internet because:  Consist of a large pool of compromised computers that are organized by a master.  a.k.a., Zombie Armies  Carry out sophisticated attacks to disrupt, gather sensitive data, or increase armies  Armies are in the 1000’s to aggregate computing power  Communication network allows bots to evolve on compromised hosts
  • 20. Attacking Behaviors  Infecting new hosts   Social engineering and distribution of malicious emails or other electronic communications (i.e. Instant Messaging) Example - Email sent with botnet diguised as a harmless attachment.  Stealing personal information  Keylogger and Network sniffer technology used on compromised systems to spy on users and compile personal information  Phishing and spam proxy  Aggregated computing power and proxy capability make allow spammers to impact larger groups without being traced.  Distributed Denial of Service (DDoS)  Impair or eliminate availability of a network to extort or disrupt business
  • 21. Communication Protocols  In most cases botnets use well defined and accepted Communication Protocols. Understanding the communication protocols used helps to: Determine the origins of a botnet attack and the software being used  Allow researchers to decode conversations happening between the bots and the masters   There are two main Communication Protocols used for bot attacks:   IRC HTTP
  • 22. Conclusion  Cybercrime greatly affects individuals, businesses, and national security due to the pervasiveness ofthe Internet Different countries should work together and use legal, organizational, and technological approaches to combat cybercrime • To reduce the damage to critical infrastructures • To protect the Internet from being abused