This document provides an overview of cyber space and the opportunities and threats it presents. It discusses the evolution of cyber space and the internet. It defines internet of things (IoT) and provides examples of how IoT is used in daily life like e-governance services, social media, and mobile apps. It also outlines some of the threats in cyber space like cyber crimes, financial fraud, hacking, and piracy. It emphasizes that awareness is the best tool to avoid becoming a victim of cyber crimes.
Port of Visakhapatnam is known as the "Eastern Gateway of India". The document discusses cyber security awareness and defines key terms like computer, cyber security, data, electronic form, electronic record, digital signature, and intermediary. It explains why cyber security is important, defines privacy and security in the context of information, and outlines common cyber attacks like denial of service attacks, DNS attacks, router attacks, sniffers, firewalls, and vulnerability scanners. The document also discusses network-based attacks, web attacks like phishing and pharming, email attacks, social network attacks, and types of malware like spam, cookies, adware, and spyware.
The document discusses various types of cybercrimes including computer crimes, cybercrimes against individuals, property, organizations and society. It defines cybercrimes as crimes committed using computers and the internet. The first recorded cybercrime took place in 1820 involving sabotage of a new textile loom. Common cybercrimes discussed include hacking, cyberbullying, cyberstalking, cyberdefamation, cyberterrorism, cyberfraud, industrial espionage and more. The document also examines different types of cybercriminals and their motivations.
This document discusses various security threats to computers and networks such as viruses, worms, Trojan horses, spyware, malware, spam, and hackers/crackers. It provides details on what each threat is and how it can harm users. The document also recommends using antivirus tools, backing up important data, and following security best practices like not sharing passwords or downloading files from unknown sources to help maintain computer security.
Cyberspace refers to the virtual computer world facilitated by a global computer network using TCP/IP protocol. It contains threats like hacktivism, cybercrime, cyberespionage, and cyberterrorism. However, it also provides advantages such as access to informational resources, entertainment, and social networking. Some disadvantages include risks to personal information, exposure to pornography, and spamming. Users can help enhance security by using strong and unique passwords, installing firewalls and antivirus software, and adjusting privacy settings on social media profiles.
This document discusses legal and ethical aspects of computer security. It covers topics like cybercrime and types of computer crimes. It also discusses challenges in cybercrime law enforcement and profiles of cybercriminals and victims. Intellectual property issues related to software, algorithms, databases and digital content are examined. The document also covers privacy issues and common criteria for privacy classification. Finally, it discusses professional responsibilities and codes of conduct in computing.
A computer virus attaches to code or files and spreads when the infected software runs or is transferred. A worm replicates itself across a network without needing to be attached to other programs. A Trojan horse appears benign but hides malicious code. Security procedures include plans to respond to threats, updating for new risks, and testing weaknesses. Antivirus software detects and removes viruses, worms and Trojans, requiring frequent updates. Encryption, firewalls, and port protection help secure data and traffic entering computers.
Port of Visakhapatnam is known as the "Eastern Gateway of India". The document discusses cyber security awareness and defines key terms like computer, cyber security, data, electronic form, electronic record, digital signature, and intermediary. It explains why cyber security is important, defines privacy and security in the context of information, and outlines common cyber attacks like denial of service attacks, DNS attacks, router attacks, sniffers, firewalls, and vulnerability scanners. The document also discusses network-based attacks, web attacks like phishing and pharming, email attacks, social network attacks, and types of malware like spam, cookies, adware, and spyware.
The document discusses various types of cybercrimes including computer crimes, cybercrimes against individuals, property, organizations and society. It defines cybercrimes as crimes committed using computers and the internet. The first recorded cybercrime took place in 1820 involving sabotage of a new textile loom. Common cybercrimes discussed include hacking, cyberbullying, cyberstalking, cyberdefamation, cyberterrorism, cyberfraud, industrial espionage and more. The document also examines different types of cybercriminals and their motivations.
This document discusses various security threats to computers and networks such as viruses, worms, Trojan horses, spyware, malware, spam, and hackers/crackers. It provides details on what each threat is and how it can harm users. The document also recommends using antivirus tools, backing up important data, and following security best practices like not sharing passwords or downloading files from unknown sources to help maintain computer security.
Cyberspace refers to the virtual computer world facilitated by a global computer network using TCP/IP protocol. It contains threats like hacktivism, cybercrime, cyberespionage, and cyberterrorism. However, it also provides advantages such as access to informational resources, entertainment, and social networking. Some disadvantages include risks to personal information, exposure to pornography, and spamming. Users can help enhance security by using strong and unique passwords, installing firewalls and antivirus software, and adjusting privacy settings on social media profiles.
This document discusses legal and ethical aspects of computer security. It covers topics like cybercrime and types of computer crimes. It also discusses challenges in cybercrime law enforcement and profiles of cybercriminals and victims. Intellectual property issues related to software, algorithms, databases and digital content are examined. The document also covers privacy issues and common criteria for privacy classification. Finally, it discusses professional responsibilities and codes of conduct in computing.
A computer virus attaches to code or files and spreads when the infected software runs or is transferred. A worm replicates itself across a network without needing to be attached to other programs. A Trojan horse appears benign but hides malicious code. Security procedures include plans to respond to threats, updating for new risks, and testing weaknesses. Antivirus software detects and removes viruses, worms and Trojans, requiring frequent updates. Encryption, firewalls, and port protection help secure data and traffic entering computers.
This document discusses cyber crime and provides an overview of the topic. It defines cyber crime as illegal activities committed using computers and networks. The document then covers the history of cyber crime, types of cyber criminals, common types of cyber crimes like hacking and viruses, the rising issue of cyber crime in Pakistan, and concludes with recommendations for protecting computers like using antivirus software and strong passwords.
This document discusses cyber security issues and solutions in the modern world. It outlines growing cyber crimes like computer viruses, password cracking, and unauthorized network access. It then describes brute force attacks and software available to detect them. It discusses strong authentication and Snort centers used in US cyber security. The Radar Page and Nessus vulnerability scanner are presented as tools to monitor cyber crimes. Preventions like intrusion alerts, encryption, and network scanning are recommended.
The document defines cyber space as the global computer network formed by interconnected human beings through computers and telecommunications without physical boundaries. It originated in the 1960s when artists used computers creatively. Cyber space faces threats like cybercrime, hacking, cyber terrorism, and cyber espionage. Solutions include strong passwords, firewalls, and updated antivirus software. Advantages are unlimited communication, abundant information, easy sharing, and online services. Disadvantages include software and data vulnerabilities, privacy issues, remote access risks, lack of geographical boundaries enabling crime.
This document provides an overview and introduction to cyber laws in India, specifically the Information Technology Act 2000. Some key points:
- The IT Act was passed in 2000 and aimed to provide legal recognition for electronic records and transactions to facilitate e-commerce. It amended several other acts related to evidence and records.
- A major amendment was made in 2008 to address criticisms and keep up with technological changes. It focused on data privacy, information security, and added new cyber crimes like child pornography.
- The document discusses some notable Indian cases where sections of the IT Act like Section 66A were used, sometimes controversially, to arrest individuals for online speech or dissent.
- Other acts amended by the IT Act
Internet and computers have changed working, communication, meeting and business requirements and conditions all over globe. Due to this high profile technology, everyone can share any activity that was unexpected and unimaginable few decades back. It was the imagination of people that they will live their lives in this manner and do their business quickly and imagination and dream has come true with the introduction of internet only. Modern society is now associated with internet and related technologies, over a quarter of the world's population is wired into the net and this number is growing every day
Cybercrime involves using computers or the internet to commit crimes like identity theft, software piracy, or distributing viruses. The first recorded cybercrime took place in 1820. Computers can be the target of attacks or used as a weapon to enable real-world crimes. Common cyber attacks include financial fraud, network sabotage, proprietary information theft, and denial of service attacks. Cybersecurity aims to establish rules and measures to protect against internet attacks through tools like antivirus software, firewalls, and security updates.
Cyber security expert Vivek Agarwal presented on cyber security. His presentation covered internet security, types of cyber crimes like hacking, child pornography, virus dissemination and cyber terrorism. It also discussed primary online risks like cyberbullies, predators, viruses and identity theft. The presentation provided steps individuals can take to boost cyber security such as using firewalls, automatic updates, antivirus and antispyware software. It emphasized educating families on internet safety and managing personal information.
This document provides an overview of cyber security laws and guidelines in India under the Information Technology Act 2000. It discusses the motivation for having cyber security legislation, common cyber crimes, and ensures technology is used legally and ethically. The key learning objective is for participants to understand the adequate laws in place in India to deal with cyber security offenses. It covers various cyber crimes and offenses defined under the IT Act, including hacking, data theft, computer tampering. Sections 43, 65, and 66 which deal with penalties for computer damage, tampering with source code, and computer related offenses are explained in detail through case studies. The size and future of cyber crimes in India is also highlighted.
Cyber Security Awareness introduction. Why is Cyber Security important? What do I have to do to protect me from Cyber attacks? How to create a IT Security Awareness Plan ?
Ethics and privacy are important standards regarding how individuals should be treated. Privacy involves protecting an individual's personal space and control over their body, behavior, communications, and personal data. Personal data should not be shared without consent, and individuals have a right to access and control how their information is collected and used. Maintaining data privacy and ethics involves responsibly and appropriately handling people's private information according to their expectations and relevant laws and regulations.
Network security involves implementing physical and software measures to protect a network from unauthorized access and enable authorized access. It aims to maintain confidentiality of data, integrity of data, availability of resources, and privacy of personal data. Key aspects of network security include encryption to scramble data, firewalls to control access to networks, and securing wireless networks through standards like WPA2. Common security processes also involve backing up data regularly, using access controls like passwords, and encrypting data during storage and transmission.
This presentation includes 60+ slides that mainly deals with three Computer Security aspects i.e
1. Security Attacks and Threats
2. Security Services
3. Security Mechanisms
Along with that we've also includes Security Awareness and Security Policies
The document summarizes key aspects of policy enforcement for cyber security including critical infrastructure protection, e-governance initiatives, the roles and training frequencies for different user types, and an overview of India's National Cyber Security Policy from 2013. It discusses threats like the Target and Google incidents and how interconnectivity increases vulnerability which policy aims to address through awareness training tailored to roles like privileged users, normal users and administrators.
This document contains a summary of a seminar presentation on cyber crime and security given by Shishupal Nagar. The presentation defined cybercrime, discussed common types of cybercrimes like hacking and denial of service attacks. It covered cybercriminals and classifications of cybercrime. The presentation also provided safety tips for preventing cybercrime and outlined the advantages of cyber security.
Cyber security refers to protecting networks, devices, programs and data from attacks, damage or unauthorized access. It is important as more people and infrastructure rely on online systems. Major cyber security threats include viruses, malware, trojan horses, hackers and password cracking. To improve cyber security, strong passwords, antivirus software, firewalls and keeping systems updated can help prevent hacking and malware infections. Cyber security is a shared responsibility and India has seen increasing cyber crimes like ransomware attacks and an online bank robbery where over 94 crore rupees were stolen.
Cyber security is the process of protecting networks, devices, and data from digital threats. It involves using authentication mechanisms like usernames and passwords to verify users' identities. The history of cyber security dates back 50 years to the development of the internet, when computer viruses and network intrusions emerged. There are many types of cyber threats, including malware, phishing, and denial of service attacks. Cyber security faces ongoing challenges in securing confidential information from hackers while protecting critical infrastructure and users' privacy.
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
Basic Network Attacks
The active and passive attacks can be differentiated on the basis of what are they, how they are performed and how much extent of damage they cause to the system resources. But, majorly the active attack modifies the information and causes a lot of damage to the system resources and can affect its operation. Conversely, the passive attack does not make any changes to the system resources and therefore doesn’t causes any damage.
Cyber Crime, Cyber Space and Effects .pptxSahilMishra81
This document summarizes a presentation titled "CyberCrime,CyberSpaceandEffectsofCyberCrime..." The presentation contains sections on introduction, literature survey, problem statement, objectives and scope, system architecture, advantages and disadvantages, application, conclusion, and references.
The introduction defines cyber space as global domain of interconnected information systems and defines cybercrime as using computers for illegal acts like fraud and intellectual property theft. The literature survey section reviews previous work on the topic. The problem statement discusses issues with e-governance, social media, and online risks. The objectives aim to reduce cybercrime cases reported in media. The system architecture proposes best practices to avoid financial fraud and improve mobile and social media security.
Cyber Crime Cyber Space and Effects .pptxSahilMishra81
This document summarizes a presentation titled "CyberCrime,CyberSpaceandEffectsofCyberCrime..." The presentation includes sections on introduction, literature survey, problem statement, objectives and scope, system architecture, advantages and disadvantages, application, conclusion, and references.
The introduction defines cyber space, cyber crime, and discusses some common effects of cyber crimes like identity theft, ransomware, and data breaches. The literature survey section reviews the evolution of cyber space and internet connectivity. The problem statement discusses issues with e-governance, social media, and online risks. The objectives aim to reduce cyber cases reported in media. The advantages section outlines best security practices for passwords, Facebook, Gmail, and
This document discusses cyber crime and provides an overview of the topic. It defines cyber crime as illegal activities committed using computers and networks. The document then covers the history of cyber crime, types of cyber criminals, common types of cyber crimes like hacking and viruses, the rising issue of cyber crime in Pakistan, and concludes with recommendations for protecting computers like using antivirus software and strong passwords.
This document discusses cyber security issues and solutions in the modern world. It outlines growing cyber crimes like computer viruses, password cracking, and unauthorized network access. It then describes brute force attacks and software available to detect them. It discusses strong authentication and Snort centers used in US cyber security. The Radar Page and Nessus vulnerability scanner are presented as tools to monitor cyber crimes. Preventions like intrusion alerts, encryption, and network scanning are recommended.
The document defines cyber space as the global computer network formed by interconnected human beings through computers and telecommunications without physical boundaries. It originated in the 1960s when artists used computers creatively. Cyber space faces threats like cybercrime, hacking, cyber terrorism, and cyber espionage. Solutions include strong passwords, firewalls, and updated antivirus software. Advantages are unlimited communication, abundant information, easy sharing, and online services. Disadvantages include software and data vulnerabilities, privacy issues, remote access risks, lack of geographical boundaries enabling crime.
This document provides an overview and introduction to cyber laws in India, specifically the Information Technology Act 2000. Some key points:
- The IT Act was passed in 2000 and aimed to provide legal recognition for electronic records and transactions to facilitate e-commerce. It amended several other acts related to evidence and records.
- A major amendment was made in 2008 to address criticisms and keep up with technological changes. It focused on data privacy, information security, and added new cyber crimes like child pornography.
- The document discusses some notable Indian cases where sections of the IT Act like Section 66A were used, sometimes controversially, to arrest individuals for online speech or dissent.
- Other acts amended by the IT Act
Internet and computers have changed working, communication, meeting and business requirements and conditions all over globe. Due to this high profile technology, everyone can share any activity that was unexpected and unimaginable few decades back. It was the imagination of people that they will live their lives in this manner and do their business quickly and imagination and dream has come true with the introduction of internet only. Modern society is now associated with internet and related technologies, over a quarter of the world's population is wired into the net and this number is growing every day
Cybercrime involves using computers or the internet to commit crimes like identity theft, software piracy, or distributing viruses. The first recorded cybercrime took place in 1820. Computers can be the target of attacks or used as a weapon to enable real-world crimes. Common cyber attacks include financial fraud, network sabotage, proprietary information theft, and denial of service attacks. Cybersecurity aims to establish rules and measures to protect against internet attacks through tools like antivirus software, firewalls, and security updates.
Cyber security expert Vivek Agarwal presented on cyber security. His presentation covered internet security, types of cyber crimes like hacking, child pornography, virus dissemination and cyber terrorism. It also discussed primary online risks like cyberbullies, predators, viruses and identity theft. The presentation provided steps individuals can take to boost cyber security such as using firewalls, automatic updates, antivirus and antispyware software. It emphasized educating families on internet safety and managing personal information.
This document provides an overview of cyber security laws and guidelines in India under the Information Technology Act 2000. It discusses the motivation for having cyber security legislation, common cyber crimes, and ensures technology is used legally and ethically. The key learning objective is for participants to understand the adequate laws in place in India to deal with cyber security offenses. It covers various cyber crimes and offenses defined under the IT Act, including hacking, data theft, computer tampering. Sections 43, 65, and 66 which deal with penalties for computer damage, tampering with source code, and computer related offenses are explained in detail through case studies. The size and future of cyber crimes in India is also highlighted.
Cyber Security Awareness introduction. Why is Cyber Security important? What do I have to do to protect me from Cyber attacks? How to create a IT Security Awareness Plan ?
Ethics and privacy are important standards regarding how individuals should be treated. Privacy involves protecting an individual's personal space and control over their body, behavior, communications, and personal data. Personal data should not be shared without consent, and individuals have a right to access and control how their information is collected and used. Maintaining data privacy and ethics involves responsibly and appropriately handling people's private information according to their expectations and relevant laws and regulations.
Network security involves implementing physical and software measures to protect a network from unauthorized access and enable authorized access. It aims to maintain confidentiality of data, integrity of data, availability of resources, and privacy of personal data. Key aspects of network security include encryption to scramble data, firewalls to control access to networks, and securing wireless networks through standards like WPA2. Common security processes also involve backing up data regularly, using access controls like passwords, and encrypting data during storage and transmission.
This presentation includes 60+ slides that mainly deals with three Computer Security aspects i.e
1. Security Attacks and Threats
2. Security Services
3. Security Mechanisms
Along with that we've also includes Security Awareness and Security Policies
The document summarizes key aspects of policy enforcement for cyber security including critical infrastructure protection, e-governance initiatives, the roles and training frequencies for different user types, and an overview of India's National Cyber Security Policy from 2013. It discusses threats like the Target and Google incidents and how interconnectivity increases vulnerability which policy aims to address through awareness training tailored to roles like privileged users, normal users and administrators.
This document contains a summary of a seminar presentation on cyber crime and security given by Shishupal Nagar. The presentation defined cybercrime, discussed common types of cybercrimes like hacking and denial of service attacks. It covered cybercriminals and classifications of cybercrime. The presentation also provided safety tips for preventing cybercrime and outlined the advantages of cyber security.
Cyber security refers to protecting networks, devices, programs and data from attacks, damage or unauthorized access. It is important as more people and infrastructure rely on online systems. Major cyber security threats include viruses, malware, trojan horses, hackers and password cracking. To improve cyber security, strong passwords, antivirus software, firewalls and keeping systems updated can help prevent hacking and malware infections. Cyber security is a shared responsibility and India has seen increasing cyber crimes like ransomware attacks and an online bank robbery where over 94 crore rupees were stolen.
Cyber security is the process of protecting networks, devices, and data from digital threats. It involves using authentication mechanisms like usernames and passwords to verify users' identities. The history of cyber security dates back 50 years to the development of the internet, when computer viruses and network intrusions emerged. There are many types of cyber threats, including malware, phishing, and denial of service attacks. Cyber security faces ongoing challenges in securing confidential information from hackers while protecting critical infrastructure and users' privacy.
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
Basic Network Attacks
The active and passive attacks can be differentiated on the basis of what are they, how they are performed and how much extent of damage they cause to the system resources. But, majorly the active attack modifies the information and causes a lot of damage to the system resources and can affect its operation. Conversely, the passive attack does not make any changes to the system resources and therefore doesn’t causes any damage.
Cyber Crime, Cyber Space and Effects .pptxSahilMishra81
This document summarizes a presentation titled "CyberCrime,CyberSpaceandEffectsofCyberCrime..." The presentation contains sections on introduction, literature survey, problem statement, objectives and scope, system architecture, advantages and disadvantages, application, conclusion, and references.
The introduction defines cyber space as global domain of interconnected information systems and defines cybercrime as using computers for illegal acts like fraud and intellectual property theft. The literature survey section reviews previous work on the topic. The problem statement discusses issues with e-governance, social media, and online risks. The objectives aim to reduce cybercrime cases reported in media. The system architecture proposes best practices to avoid financial fraud and improve mobile and social media security.
Cyber Crime Cyber Space and Effects .pptxSahilMishra81
This document summarizes a presentation titled "CyberCrime,CyberSpaceandEffectsofCyberCrime..." The presentation includes sections on introduction, literature survey, problem statement, objectives and scope, system architecture, advantages and disadvantages, application, conclusion, and references.
The introduction defines cyber space, cyber crime, and discusses some common effects of cyber crimes like identity theft, ransomware, and data breaches. The literature survey section reviews the evolution of cyber space and internet connectivity. The problem statement discusses issues with e-governance, social media, and online risks. The objectives aim to reduce cyber cases reported in media. The advantages section outlines best security practices for passwords, Facebook, Gmail, and
Kandarp Shah has over 10 years of experience in information security consulting. The presentation aims to educate students about technology, internet, and cyber crimes as well as preventative measures. Cyber crime refers to criminal acts using computers and the internet. Motivations for cyber crimes include money, curiosity, revenge, and praise. Cyber crimes are increasing due to greater internet and smartphone use. Common cyber crimes discussed include cyber pornography, identity theft, email spoofing, intellectual property crimes, and cyber defamation.
This document discusses cybercrime and cyber laws in India. It defines cybercrime as crimes committed using computers and the internet, such as identity theft, hacking, and spreading viruses. The first recorded cybercrime took place in 1820 when employees sabotaged a new textile loom technology out of fear for their jobs. Common cybercrimes discussed include hacking, phishing, software piracy, and cyberbullying. The document also outlines key sections of India's Information Technology Act that pertains to cybercrime and establishes punishments such as fines and imprisonment. In recent years, India has experienced increasing cybercrime and is now ranked 4th globally for incidents.
This document provides an overview of cyber crime and security. It begins with an introduction that defines cyber crime and notes it is a prevalent crime in modern India. It then covers the history of cyber crime beginning with hackers illegally accessing computer networks. The document outlines several categories of cyber crime like identity theft, hacking, and cyber espionage. It discusses prevention methods and concludes with the 90 sections of the Indian IT Act that address various cyber crimes and penalties.
This PPt is very useful for any students , Law enforcement agencies, Cyber Forensic Experts. It includes Overview of Cyber Law in India which includes cyber offences and penalties. This ppt will help for the public to aware about cyber crime. This ppt covers Information Technology Act, 2000 and highlights on IT (Amendment) Act, 2008. This PPt also covers applicability of IT Act and Other Act's sections to Cyber crimes.
The document discusses various types of cyber crimes such as hacking, data theft, email spoofing, identity theft, child pornography, denial of service attacks, virus dissemination, computer vandalism, cyberterrorism, and software piracy. It provides details on the first recorded cyber crime in 1820, and categorizes cyber crimes as those using computers as targets or weapons. For each crime, it outlines the relevant Indian laws and punishments prescribed under the Information Technology Act and Indian Penal Code.
The document discusses various types of cybercrimes and email related crimes under Indian law. It provides examples and explanations of different cybercrimes like hacking, data theft, virus spreading, and intellectual property violations. It also examines specific email crimes such as lottery scams, sending malicious codes, email bombing, illegal email forwarding, threatening emails, and identity theft through email spoofing. The legal provisions in the Information Technology Act, 2000 and the Indian Penal Code dealing with these cybercrimes are outlined along with relevant case studies.
The document discusses various types of cybercrimes and email related crimes under Indian law. It provides examples and explanations of different cybercrimes like hacking, data theft, virus spreading, and intellectual property violations. It specifically examines email related crimes such as phishing, email spoofing and identity theft, email bombing, sending threatening emails, and spreading communal disharmony through emails. Relevant sections of the Indian Penal Code and Information Technology Act are referenced to explain the legal status of these crimes.
The document discusses various types of cybercrimes and email related crimes under Indian law. It provides examples and explanations of different cybercrimes like hacking, data theft, virus spreading, and intellectual property violations. It also examines specific email crimes such as phishing, spoofing, lottery scams, and sending threatening/explicit emails. For each crime, it summarizes the applicable Indian laws and sections along with examples of legal cases.
Cyber crimes can take many forms and involve using computers or the internet illegally. The document outlines several common types of cyber crimes including cyber stalking, pornography, hacking and cracking, and cyber terrorism. Cyber stalking involves harassing others online through means like sending threatening emails. Pornography crimes relate to distributing obscene or child pornography online. Hacking aims to gain unauthorized access to computer systems or networks, while cracking modifies data. Cyber terrorism uses the internet for political purposes to threaten unity or security. The document provides details on the nature and punishments for these cyber crimes under Indian law.
Cyber laws and cyber crimes are discussed. Cyber law refers to legal issues related to communications technology and the internet. The Information Technology Act was passed in 2000 in India to recognize electronic transactions and facilitate electronic filing. Cyber crimes include hacking, data theft, spreading viruses, identity theft, and email spoofing. The IT Act and Indian Penal Code sections apply to cyber crimes and outline punishments such as imprisonment and fines. Cyber laws are needed to tackle cyber crimes and protect intellectual property rights in today's internet-reliant world.
Cyber laws and cyber crimes are discussed. Cyber law refers to legal issues related to communications technology and the internet. The Information Technology Act was passed in 2000 in India to recognize electronic transactions and facilitate electronic filing. Cyber crimes include hacking, data theft, spreading viruses, identity theft, and email spoofing. The IT Act and Indian Penal Code sections apply to cyber crimes and outline punishments such as imprisonment and fines. Cyber laws are needed to tackle cyber crimes and protect intellectual property rights in today's internet-reliant world.
The Maharashtra government's official website was hacked on September 20, 2007. The website remained closed for the day. Cyber crimes have been occurring since the 1820s in France. Computers can be used as tools to commit crimes like forgery, threats, identity theft, or can be targets themselves through viruses, hacking, and software piracy. Legislation is needed to address crimes involving computers and the internet. Various types of cyber crimes include hacking, information theft, email bombing, denial of service attacks, and Trojan attacks. The document then provides examples and details on some of these crimes and discusses cyber security and privacy recommendations.
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
The document defines and discusses various types of cyber crimes. It begins by defining cybercrime as any unlawful act involving computers and networks. There are two main types - crimes that target computers directly through malware or denial of service attacks, and crimes that use computers to enable other illegal acts. Cybercrimes are further classified based on their targets, including individual, property, organizational, and societal crimes.
The document then lists and describes 16 specific types of cybercrimes such as child pornography, cyberbullying, cyberstalking, phishing, ransomware, and software piracy. It concludes by providing 7 tips for preventing cybercrimes, such as using security programs, safe online practices,
This document discusses cyber crimes and cyber law in India. It begins by defining cyber law and the Information Technology Act 2000. It then discusses the need for cyber law to prevent cyber crimes, recognize digital signatures, promote e-commerce, protect intellectual property, and protect data and privacy. Several common cyber crimes are described such as phishing, vishing, smishing, ATM skimming, hacking, privacy violations, cyber stalking, cyber defamation, child pornography, and identity theft. The document concludes with recommendations on investigating cyber crimes and tips for staying safe online and preventing cyber crimes.
This document discusses cyber crime and provides an overview presented by Dr. Soreingam Ragui. It defines cyber crime as any illegal activity committed using computers or networks. India ranks 11th globally for cyber crime, constituting 3% of total cyber crime. Reasons for India's high rates include a rapidly growing internet user base. Common cyber crimes include hacking, phishing, and intellectual property theft. The document also discusses Indian cyber law and acts like the Information Technology Act of 2000.
This document discusses high tech crimes and cybersecurity. It provides examples of different types of high tech crimes like data theft, hacking, identity theft, and cyberterrorism. It also discusses measures that can be taken to enhance cybersecurity, like using antivirus software, firewalls, strong passwords, and backing up data. Forensics procedures for investigating cybercrimes are also summarized.
This document provides an overview of cyber crime and forensics. It discusses the types of cyber crimes like hacking, phishing, software piracy and cyber stalking. It also outlines the steps of computer forensics which include acquisition, identification, evaluation and presentation of digital evidence. Common tools used in computer forensics are also mentioned.
1. Cyberbullying and online threats are common, with 2 in 5 kids being bullied online and 9 in 10 having their feelings hurt online. The consequences of online threats can sometimes be tragic.
2. Parents should monitor who their children are interacting with online and what types of content they are accessing and discussing to prevent risks.
3. Cyber ethics aim to establish moral principles for appropriate computer and internet use, covering issues like privacy, access rights, and avoiding harmful actions. Following cyber ethics can help people use the internet responsibly.
Similaire à Cyber Space Threats and Opportunities (20)
Financial Crime and Investigation- Finacial FraudsJayakumar PP
Financial Fraud and crime investigation to law enforcement agencies. This document will give complete picture on online payment methods in India, various payment schemes. precautionary measures while doing digital and online payments. Different types of financial frauds reported. How to mitigate financial frauds. Tips for investigating officers. Including Credit card and debit card and its scams. Cover various sections related with IPC and Information Technology section for taking action against fraudsters. Modus of operand for Financial Fraud. Internet and cyber space evolution. Internet connectivity evolution. IoT and its ecosystem.
Blockchain technology and logistics managementJayakumar PP
Basic understanding of Blockchain Technology. Give special focus to the application of blockchain in Logistics Management and Supply chain. It covers the following topics
Introduction to the blockchain, The current situation in the logistics industry, The Blockchain technology - the paradigm shifter in logistics, Block Chian Technology - Explain technology aspects and features, Basics on Blockchain security, Blockchain capabilities and its advantages to the logistics industry, Value-added to the industry, Implementation challenges, Finally with the conclusion and one best practice with ship chain company.
The document summarizes the Akshaya project in Kerala, India, which aimed to bridge the digital divide and bring IT access to rural communities. It discusses how the project was launched in 2002 in Malappuram district inspired by PURA, with the goal of making at least one person per family electronically literate. By 2004, Akshaya achieved this goal and expanded statewide. It established local e-centers run by entrepreneurs to provide services like bill payment, tax filing, and e-learning opportunities. Over time, Akshaya grew to become one of the world's largest telecenter networks and helped advance e-governance initiatives across Kerala.
Project planning is essential for software projects. It involves estimating the work, resources, and time required. Key planning activities include defining problems and requirements, developing solution strategies, and planning development processes. Requirements planning is especially important - it helps eliminate defects by gaining user involvement, understanding critical needs, and considering non-functional requirements. Empirical studies show most firms plan feasibility and costs, though risk management practices vary. Thorough early planning is needed to estimate schedules, efforts, people and resources needed for a project's success.
The document discusses various types of cyber crimes against individuals, organizations, and society. It explains that cyber crimes are increasing due to factors like global connectivity, easy access to hacking tools, numerous vulnerable targets, and anonymity online. Common cyber crimes include hacking, cyber stalking, pornography, email spoofing, cyber defamation, and financial crimes like online cheating. The document also outlines relevant sections of laws in India that pertain to cyber crimes.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Ready to Unlock the Power of Blockchain!Toptal Tech
Imagine a world where data flows freely, yet remains secure. A world where trust is built into the fabric of every transaction. This is the promise of blockchain, a revolutionary technology poised to reshape our digital landscape.
Toptal Tech is at the forefront of this innovation, connecting you with the brightest minds in blockchain development. Together, we can unlock the potential of this transformative technology, building a future of transparency, security, and endless possibilities.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
4. • The Internet of Things (IoT) is the network of physical
objects—devices, vehicles, buildings and other items
embedded with electronics, software, sensors, and
network connectivity—that enables these objects to
collect and exchange data.
What is IoT?
IOT?
In simple words, Internet of Things (IoT) is
an ecosystem of connected physical objects
that are accessible through the internet.
5. • 1969 – Jan 2 – ARPANET – Four centers
• India joined in the year 1995 –Aug 15
• Instant Communications, News Reference, Resea
Entertainment, Shopping, etc, etc..
• 1972 Ray Tomlinson invents eMail.
• 1983 Invents Internet Protocol
• 1989 first World Wide Web Developed
• 1994 First G-Web Browser Developed (Mosaic).
• 1995 Internet open for commercial purpose.
The Internet is a Great Place
13. • eGovernance
• Social Media site
• Micro Blogs
• Mobile Apps
• Web Sites
• Internet has: porn sites
– hate sites pirated software, music, movies
– viruses and malicious downloads, spyware
– scams and data collection sites
• Harassment and legal/financial risks
Things Around Us!!!
19. • www.classmates.com – 1995 Randy Conrads
• Facebook & Orkut in the year 2004
• Twitter in the year 2006
• Google plus in the year 2011
20. 1. Information Technology Act
2000
2. Indian Penal Code – 1860
3. Indian Copyright Act – 1957
• IT Act Applicable to all states of
India including Jammu & Kashmir
• It is applicable to any violation of the
provisions of this Act done by any
person anywhere in the world.
28. Mobile phone harrassment is also called
BULLYING, which is a general term to describe any
type of unwanted telephone calls or messages, or
picture messages, intended to cause upset and
grief !!! – Sec 499, 509 of IPC and 120(o) KP Act .
✓Word, gesture or act intended to insult the modesty of a
woman.
✓Shall be punished with simple imprisonment for a term
which may extend to one year, or with fine, or with both
31. Similarly, Section 419 of the IPC could also be
applied with the same qualification that it must
be making a pecuniary(financial) benefit to it.
Under Section 465 of the Act, a person committing
forgery shall be imprisoned for up to two years
and shall also liable to pay fine
➢ Section 499/500 IPC: When fake profile is posted with defamatory
content with an intention to defame other, the offence punishable
under Section 499/500 IPC (defamation) is attracted.
Details Required
➢ URL of the Suspect FB Account
➢ Screen Shot of FB Account – Two or more
➢ ID Proof & Photo of the Complainant
➢ URL & Screen Shot of the any post related with the
Social Media – Fake Profile
32. Making a fake account of another person
Section 66-D of Information Technology Act 2000, which was
subsequently amended in 2008, states that “whoever by
means of any communication device or computer
resource cheats by personating, shall be punished with
imprisonment of either description for a term which may
extend to three years and shall also be liable to fine which
may extend to one lakh rupees.”[1]
. The real face behind the fake profile can be traced through
IP address. Internet Protocol address (IP address) is a
numeric label – a set of four numbers (Eg. 202.54.30.1) –
that is assigned to every device (e.g., computer, printer)
participating on the internet
Social Media – Fake Account
33. Online Game
❖Addiction
❖Loss of interest
❖Underdeveloped physical condition
❖Decline in personal hygiene
❖Declining social activity
34. Roblox - popular with kids, teens and even adults, which allows users
to interact with one another in this virtual world, play games and also
engage in role play.
My Friend Cayla - smart toy looks like an innocent baby doll with
pretty features, lovely hair, a sweet smile, and an equally adorable outfit.
Blue Whale -This social media game dares its players to also
participate in a series of tasks which are detrimental to their health and can
also cause them great harm.
Fire Fairy - This online prank targets younger children and is
modelled after the animated series, It gives dangerous instructions to
unsuspecting kids on how they can become a magical “fire fairy”.
Cloud Pets -These innocent-looking smart toys which come as a
cuddly elephant, bear, cat, rabbit, dog or unicorn can record audio
messages via a mobile app and replay them for your child’s entertainment.
The Pass Out Challenge. The Salt and Ice Challenge
The Fire Challenge The Cutting Challenge
Dangerous Online Games
36. Details Required
❖ Card No (Credit/Debit)
❖ Bank & Account No
❖ Suspect Mobile Number (Call Received)
❖ Transaction details (Date, Time)
❖ Transaction ID(SMS), Amount, Wallet, Bank, etc.
Collect above details at the earliest and forward to
Cyber Cell
❖ Whatsapp 9497976000,9497981288,9847435193
❖ We can Collect, KYC, Mobile SDR & CDR, CAF
Online Financial Fradus
37.
38.
39.
40.
41. Unauthorized access of
❑Computer & Its resources
❑Telecommunication devices
❑Telecommunication media, etc.
Section 65 Tampering with computer Source
document.
Section 66 – Hacking with computer systems –
including all activities mentioned in the sec 43
Imprisonment up to three years, or with
fine which may extend up to two lakh
rupees, or with both
41
42. 42
Hacking : - Hacker can be used to denote a
computer expert engaged in solving complex
problems on computers or persons securing
unauthorized access, looks around , collects
information and leaves without a trace. Hacking
done with malicious intention is called cracker.
Phreaker:- is a person who manipulates and
disrupts telecomm systems. Today
telecommunication systems has also been
computerized.
43. 43
❖ The worst passwords to use are the ones
that come to mind first -- name, spouse's name,
maiden name, pets, children's name, even
street addresses, etc.
❖ The best passwords mix numbers with upper
and lowercase letters.
❖ A password that is not found in the dictionary
is even better. There are programs that will try
every word in the dictionary in an effort to crack
your security. Changing passwords regularly
❖
45. Trusted Friends
Trusted friends are friends you can reach out to if you
ever get locked out of your Facebook account .
Secure Browsing (https)
Your traffic (i.e. all of your activity) on Facebook
becomes encrypted
Login Notifications
Login Notifications are an opt-in security feature where
alerts are sent to you each time your account is
accessed from a new device. Add a Mobile Number.
Login Approvals : Similar to Login Notifications , but
need security code to login.
Password, Message & Links, Personal Information, Browser
Security & Computer Security
46. 1. Getting started with 2-step verification
2. Check the forwarding and delegation in mail
settings tab.
3. Update your secondary email address and your
security question, and provide a mobile phone for SMS-
based account recovery
4. Secure Browsing (https)
Your traffic (i.e. all of your activity) on Facebook
becomes encrypted
5. Check recent IP addresses accessing the account
6. Backup your Gmail Account- (Thunderbird, Outlook , Pocomail).
Password, Message & Links, Personal Information, Browser
Security & Computer Security
49. A person following another especially women and
continuously harassing through online
Cyber Stalking is generally considered as use of the
Internet, e-mail or other electronic communications
device to stalk or harass a person.
Sec. 499, 503,509 IPC & Section 120(o) of KP Act.
Punishable with simple imprisonment for a term which may extend to two
years, or with fine, or with both.
Sec 503 IPC Sending threatening messages by e-
mail
Sec 499 IPC Sending defamatory messages by e-
mail
50. • Sexual Harassment
• Obsession for love
• Revenge & Hate
• Ego & Power Trips
➢Their main targets are the mostly females,
children, emotionally weak or unstable, etc. It is
believed that Over 75% of the victims are female
51. • Publishing sexual activities in the form of
visuals, audio or through text to raise
erotic feelings rather than aesthetic.
✓ New concept called as SEXTING
✓ Sending sexually explicit pictures by cell phone or
Email
51
52. 52
Section 67 – Publishing of information which
is obscene in electronic form. 3 years or with fine
not exceeding 5 lakh
Sec 67 A - Punishment for publishing or transmitting of
material containing sexually explicit act, etc., in electronic
form. five years and with fine which may extend to ten lakh
rupees
Sec 119 of KP Act - Punishment for atrocities against
women. – (1) Any person who,—
(a) performs, in public places, any sexual gestures or acts
degrading the dignity of women; or
24(b) takes photographs or records videos or propagates them at
any place in a manner affecting the reasonable privacy of women.
Cases : Ramankari Teacher, Chengannur Beauty & Banlglore student,etc.
3 yrs imprisonment & Fine
53. • Put utmost care in selecting friends – All kinds of
Criminals are in this Social media.
• Don’t post family information publicly
• Don’t post, share and like defamatory comments
and contents.
• Don’t post dirty videos
• Don’t post live pictures while u r travelling.
• Note : Once u posted something, it will not taken
back from the Cyber World.
• Founders: Larry Page, Sergey Brin – 1998, 2004 -
Mark Zuckerberg, Dustin Moskovitz, W3C-Tim
Berners-Lee
54. • Fake Profiles – 499,500,509 IPC– 3 yrs + 2
lakhs.
• Defamatory posting – 3 yrs + Fine.
• Posting private parts of a person – Sec 66E -3
yrs. + 2 lakhs.
• Sexual messages & Audios – Sec 67 -3 yrs + 5
lakhs.
• Posting Sexual videos – Sec 67 A – 5 yrs + 10
lakh ( 7 yrs + 10 lakhs).
• Posting and downloading sexual videos of
children's – Sec 67 B - 5 yrs + 10 lakh ( 7 yrs +
10 lakhs).
55.
56.
57. Publishing statements lowering the
reputation of persons.
When someone publishes defamatory
matter about someone on a website or
sends e-mails, pictures, etc. containing
defamatory information to all of that
person's friends or on the internet.
Sec 499,500,503.
In case of sexual abuse against
women. Sec 509 & 354(a) IPC
63. ➢Criminal creates a “mirror” website that
looks like a legitimate website
➢They fool people into going to that site,
which transmits your username or
password to the them
➢Using pop-up windows to conceal the
real address in the victim’s address bar
➢“Pharming” victim redirected to a scam
website when the victim types in the
real address
71. Section 468. Forgery for purpose of cheating
Whoever commits forgery, intending that the
document or Electronic Record forged shall be used
for the purpose of cheating, shall be punished with
imprisonment of either description for a term which
may extend to seven years, and shall also be liable to
fine.
Section 420. Cheating and dishonestly inducing
delivery of property
shall be punished with imprisonment of either
description for a term which may extend to seven
years, and shall also be liable to fine.
72. ➢ Cyber Piracy is defined as art of making illegal
copies of Music, Books, software etc for the
purpose of sale.
➢ The major form of piracy on the net is violation
of copyrights and trade marks. A part of this piracy
had also been cyber squatting of domain names.
➢ Shall be punishable under section. 51, 63, 63B
of Indian Copyright Act.
73. • Where we stand
– Twentieth in top 20 pirating countries
– At 73%, behind China (92%), Vietnam (92%),
Indonesia (88%) and Russia (87%)
– Losses at $367 million
• Benefits of piracy control
– Reduction of piracy by 10% will
• Promote innovation
• Add $1.2 billion to GDP
• Create 48,000 jobs
• Add $92 million to tax revenues
75. Threat vs. Opportunity
• If misunderstood and misconfigured,
misused Technology poses risk to our data,
privacy, and safety
• If understood , secured, efficient use of
Technology will enhance communications,
lifestyle, and delivery of services
76. The Biggest Investment is
“Investment in as much of yourself as you can, you are
your own biggest by far.
✓ Are you wiser to day than yesterday, or last day , or last
year , or five years ago
✓ Are you taking good care to be physically and mentally
fit.
78. 78
“Awareness about Cyber-crime threats is the best
tool to avoid of being a victim”.
Jayakumar PP
9847435193
jkambala@gmail.com
https://www.facebook.com/jayakumar.purushan
https://www.linkedin.com/pub/jayakumar-pp/65/59b/773
http://www.slideshare.net/jayakumarpurushan