SlideShare une entreprise Scribd logo
1  sur  17
CYBER CRIME &
Security
BY: HARENDRA SINGH
Content
• Introduction to Cyber Crime
• What exactly is Cyber Crime?
• History of Cyber Crime
• Types of Cyber Crime
• Who Commits a Cyber Crime?
• Introduction to Cyber Security
• Advantages of Cyber Security
• Safety tips to Cyber Crime
• Cyber law of India
• Conclusion
Cyber Crime
Cyber crime as any crime that is committed by
means of special knowledge or expert use of
computer technology.
What exactly is Cyber Crime?
The Internet – or Cyber Space as it s
sometimes called, is a borderless environment
unlike a brick and mortar world. Even though
it is indispensable as a knowledge bank, it is
an ideal tool for someone with a criminal bent
of mind, who can use this environment to his/
her maximum advantage.
History of Cyber Crime
• The first recorded cyber crime took place in
1820.
• The first spam email took place in 1976 when
it was sent out over the ARPA NET.
• The first virus was installed on an Apple
computer in 1982 when a high school student,
Rich skrenta, developed the EIK Cloner.
Types of Cyber Crime
• Cyber Stalking - Cyber Stalking is a crime in which the
attacker harasses a victim using electronic
communication, such as e-mail or instant messaging
(IM), or messages posted to a Web site or a discussion
group.
• Denial of Service - This is an act by the criminals who
floods the bandwidth of the victims network or fills his
E-mail box with spam mail depriving him of the service
he is entitled to access or provide. Many DOS attacks,
such as the ping of death and Tear drop attacks.
Types of Cyber Crime
• Hackers - Hacker is a term used by some to mean
"a clever programmer" and by others, especially
those in popular media, to mean "someone who
tries to break into computer systems.
• Online Fraud - The use of Internet services or
software with Internet access to defraud victims
or to otherwise take advantage of them; for
example, by stealing personal information, which
can even lead to identity theft.
Types of Cyber Crime
• Child Pornography
• Software Piracy - Software piracy is the illegal copying,
distribution, or use of software. According to the
Business Software Alliance (BSA), about 36% of
all software in current use is stolen.
• Spoofing - Spoofing, in general, is a fraudulent or
malicious practice in which communication is sent from
an unknown source disguised as a source known to the
receiver.
Types of Cyber Crime
• Usenet Newsgroup - A Usenet newsgroup is a
repository usually within the Usenet system, for
messages posted from many users in different
locations. Despite the name, newsgroups are
discussion groups, and are not devoted to
publishing news.
• Virus Dissemination - Malicious software that
attaches itself to other software. VIRUS ,
WORMS, TROJAN HORSE ,WEB JACKING, E-MAIL
BOMBING etc.
Who Commits a Cyber Crime?
• Insiders
• Hackers
• Virus Writers
• Foreign Intelligence: - Use cyber tools as part
of their Services
• Terrorists
Cyber Security
Cyber Security involves protection of sensitive
personal and business information through
prevention, detection and response to different
online attacks. Cyber security actually
preventing the attacks, cyber security.
Cyber Security
• Privacy Policy - Before submitting your name , e-
mail , address, on a website look for the sites
privacy policy.
• Keep Software Up to Date - If the seller reduces
patches for the software operating system your
device ,install them as soon as possible .Installing
them will prevent attackers form being able to
take advantage. Use good password which will be
difficult for thieves to guess. Do not choose
option that allows your computer to remember
your passwords.
Advantages of Cyber Security
• The cyber security will defend us from critical
attacks.
• It helps us to browse the site, website.
• Internet Security process all the incoming and
outgoing data on your computer.
• It will defend us from hacks and virus.
• Application of cyber security used in our PC
needs update every week
Safety tips to Cyber Crime
• Use antivirus Software
• Insert Firewalls
• Uninstall unnecessary software
• Maintain backup
• Check security settings
Cyber law of India
Cyber crime can involve criminal activities that
are traditional in nature, such as theft, fraud,
deformation and mischief, all of which are
subjected to the India Penal code. In simple way
we can say that cyber crime is unlawful acts
where in the computer is either a tool or both.
The abuse of computer has also given birth of
new age crime that are addressed by the
Information Technology Act, 2000.
Conclusion
Cybercrime is indeed getting the recognition it
deserves. However, it is not going to restricted
that easily . In fact , it is highly likely that cyber
crime and its hackers will continue developing
and upgrading to stay ahead of the law.
So, to make us a safer we must need cyber
security.
Cyber crime

Contenu connexe

Tendances

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

Tendances (20)

presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 

En vedette (10)

Functions in C
Functions in CFunctions in C
Functions in C
 
Pointer in c++ part1
Pointer in c++ part1Pointer in c++ part1
Pointer in c++ part1
 
Pointers in c++
Pointers in c++Pointers in c++
Pointers in c++
 
Pointers in C
Pointers in CPointers in C
Pointers in C
 
Function in c
Function in cFunction in c
Function in c
 
C++ Pointers
C++ PointersC++ Pointers
C++ Pointers
 
Function in C
Function in CFunction in C
Function in C
 
Unit 6 pointers
Unit 6   pointersUnit 6   pointers
Unit 6 pointers
 
C Pointers
C PointersC Pointers
C Pointers
 
Function in C program
Function in C programFunction in C program
Function in C program
 

Similaire à Cyber crime

Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
Ashwini Awatare
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
hm5314581
 

Similaire à Cyber crime (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
E secuity
E secuityE secuity
E secuity
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber security
Cyber security        Cyber security
Cyber security
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 

Plus de Harendra Singh (6)

Google glass
Google glassGoogle glass
Google glass
 
Chromebook
ChromebookChromebook
Chromebook
 
User defined functions in C
User defined functions in CUser defined functions in C
User defined functions in C
 
Hacking
Hacking Hacking
Hacking
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
E-learning vs Classroom learning
E-learning vs Classroom learningE-learning vs Classroom learning
E-learning vs Classroom learning
 

Dernier

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 

Dernier (20)

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 

Cyber crime

  • 1. CYBER CRIME & Security BY: HARENDRA SINGH
  • 2. Content • Introduction to Cyber Crime • What exactly is Cyber Crime? • History of Cyber Crime • Types of Cyber Crime • Who Commits a Cyber Crime? • Introduction to Cyber Security • Advantages of Cyber Security • Safety tips to Cyber Crime • Cyber law of India • Conclusion
  • 3. Cyber Crime Cyber crime as any crime that is committed by means of special knowledge or expert use of computer technology.
  • 4. What exactly is Cyber Crime? The Internet – or Cyber Space as it s sometimes called, is a borderless environment unlike a brick and mortar world. Even though it is indispensable as a knowledge bank, it is an ideal tool for someone with a criminal bent of mind, who can use this environment to his/ her maximum advantage.
  • 5. History of Cyber Crime • The first recorded cyber crime took place in 1820. • The first spam email took place in 1976 when it was sent out over the ARPA NET. • The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
  • 6. Types of Cyber Crime • Cyber Stalking - Cyber Stalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group. • Denial of Service - This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide. Many DOS attacks, such as the ping of death and Tear drop attacks.
  • 7. Types of Cyber Crime • Hackers - Hacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems. • Online Fraud - The use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them; for example, by stealing personal information, which can even lead to identity theft.
  • 8. Types of Cyber Crime • Child Pornography • Software Piracy - Software piracy is the illegal copying, distribution, or use of software. According to the Business Software Alliance (BSA), about 36% of all software in current use is stolen. • Spoofing - Spoofing, in general, is a fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver.
  • 9. Types of Cyber Crime • Usenet Newsgroup - A Usenet newsgroup is a repository usually within the Usenet system, for messages posted from many users in different locations. Despite the name, newsgroups are discussion groups, and are not devoted to publishing news. • Virus Dissemination - Malicious software that attaches itself to other software. VIRUS , WORMS, TROJAN HORSE ,WEB JACKING, E-MAIL BOMBING etc.
  • 10. Who Commits a Cyber Crime? • Insiders • Hackers • Virus Writers • Foreign Intelligence: - Use cyber tools as part of their Services • Terrorists
  • 11. Cyber Security Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks. Cyber security actually preventing the attacks, cyber security.
  • 12. Cyber Security • Privacy Policy - Before submitting your name , e- mail , address, on a website look for the sites privacy policy. • Keep Software Up to Date - If the seller reduces patches for the software operating system your device ,install them as soon as possible .Installing them will prevent attackers form being able to take advantage. Use good password which will be difficult for thieves to guess. Do not choose option that allows your computer to remember your passwords.
  • 13. Advantages of Cyber Security • The cyber security will defend us from critical attacks. • It helps us to browse the site, website. • Internet Security process all the incoming and outgoing data on your computer. • It will defend us from hacks and virus. • Application of cyber security used in our PC needs update every week
  • 14. Safety tips to Cyber Crime • Use antivirus Software • Insert Firewalls • Uninstall unnecessary software • Maintain backup • Check security settings
  • 15. Cyber law of India Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code. In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both. The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act, 2000.
  • 16. Conclusion Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily . In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security.

Notes de l'éditeur

  1. It is not a surprise that Cyber Crimes like money cyber stalking, denial of service, e-mail abuse, chat abuse and other crimes are on the rise.  Cyber Terrorist and cyber mafia are emerging with great force, whose activities are going to threaten the sovereignty of nations and world order.