SlideShare une entreprise Scribd logo
Cyber Space
Opportunities & Threat
Awareness
Class
Jayakumar PP
9847435193
Evolution of Cyber space
Computerisation
WHAT IS IOT?
• The Internet of Things (IoT) is the network of physical
objects—devices, vehicles, buildings and other items
embedded with electronics, software, sensors, and
network connectivity—that enables these objects to
collect and exchange data.
What is IoT?
IOT?
In simple words, Internet of Things (IoT) is
an ecosystem of connected physical objects
that are accessible through the internet.
• 1969 – Jan 2 – ARPANET – Four centers
• India joined in the year 1995 –Aug 15
• Instant Communications, News Reference, Resea
Entertainment, Shopping, etc, etc..
• 1972 Ray Tomlinson invents eMail.
• 1983 Invents Internet Protocol
• 1989 first World Wide Web Developed
• 1994 First G-Web Browser Developed (Mosaic).
• 1995 Internet open for commercial purpose.
The Internet is a Great Place
Evolution of Internet connectivity
IOT IN DAILY LIFE…
• eGovernance
• Social Media site
• Micro Blogs
• Mobile Apps
• Web Sites
• Internet has: porn sites
– hate sites pirated software, music, movies
– viruses and malicious downloads, spyware
– scams and data collection sites
• Harassment and legal/financial risks
Things Around Us!!!
e-Governance & Citizen Centric
Service Delivery
e-Governance
Services………..
Examples of e-Services – G2C
• Birth Certificate
• Health Care
• School Admission
• Scholarships
• e-Learning
• Examination Results
• Employment Services
• Vehicle Registration
• Driver’s License
• Passport/Visa
• Agriculture
• Land Record
• Property Registration
• Marriage Certificates
• Taxes
• Utility Services
• Municipality Services
• Pensions
• Insurance
• Health Care
• Death Certificate
from Cradle to Grave……
Threats in Cyber Space
• www.classmates.com – 1995 Randy Conrads
• Facebook & Orkut in the year 2004
• Twitter in the year 2006
• Google plus in the year 2011
1. Information Technology Act
2000
2. Indian Penal Code – 1860
3. Indian Copyright Act – 1957
• IT Act Applicable to all states of
India including Jammu & Kashmir
• It is applicable to any violation of the
provisions of this Act done by any
person anywhere in the world.
Cyber Crime Against
Women
BULLYING
Pornography
Morphing
Email
Spoofing
Defamation
Online Game
Online
Grooming
Threats Against Women & Children in Cyber Space
Police Contact and Help Line Numbers
Cyber Crime Reporting Portal
Cyber Bullying
Mobile phone harrassment is also called
BULLYING, which is a general term to describe any
type of unwanted telephone calls or messages, or
picture messages, intended to cause upset and
grief !!! – Sec 499, 509 of IPC and 120(o) KP Act .
✓Word, gesture or act intended to insult the modesty of a
woman.
✓Shall be punished with simple imprisonment for a term
which may extend to one year, or with fine, or with both
Cyber Grooming
Similarly, Section 419 of the IPC could also be
applied with the same qualification that it must
be making a pecuniary(financial) benefit to it.
Under Section 465 of the Act, a person committing
forgery shall be imprisoned for up to two years
and shall also liable to pay fine
➢ Section 499/500 IPC: When fake profile is posted with defamatory
content with an intention to defame other, the offence punishable
under Section 499/500 IPC (defamation) is attracted.
Details Required
➢ URL of the Suspect FB Account
➢ Screen Shot of FB Account – Two or more
➢ ID Proof & Photo of the Complainant
➢ URL & Screen Shot of the any post related with the
Social Media – Fake Profile
Making a fake account of another person
Section 66-D of Information Technology Act 2000, which was
subsequently amended in 2008, states that “whoever by
means of any communication device or computer
resource cheats by personating, shall be punished with
imprisonment of either description for a term which may
extend to three years and shall also be liable to fine which
may extend to one lakh rupees.”[1]
. The real face behind the fake profile can be traced through
IP address. Internet Protocol address (IP address) is a
numeric label – a set of four numbers (Eg. 202.54.30.1) –
that is assigned to every device (e.g., computer, printer)
participating on the internet
Social Media – Fake Account
Online Game
❖Addiction
❖Loss of interest
❖Underdeveloped physical condition
❖Decline in personal hygiene
❖Declining social activity
Roblox - popular with kids, teens and even adults, which allows users
to interact with one another in this virtual world, play games and also
engage in role play.
My Friend Cayla - smart toy looks like an innocent baby doll with
pretty features, lovely hair, a sweet smile, and an equally adorable outfit.
Blue Whale -This social media game dares its players to also
participate in a series of tasks which are detrimental to their health and can
also cause them great harm.
Fire Fairy - This online prank targets younger children and is
modelled after the animated series, It gives dangerous instructions to
unsuspecting kids on how they can become a magical “fire fairy”.
Cloud Pets -These innocent-looking smart toys which come as a
cuddly elephant, bear, cat, rabbit, dog or unicorn can record audio
messages via a mobile app and replay them for your child’s entertainment.
The Pass Out Challenge. The Salt and Ice Challenge
The Fire Challenge The Cutting Challenge
Dangerous Online Games
Online Financial Fradus
Details Required
❖ Card No (Credit/Debit)
❖ Bank & Account No
❖ Suspect Mobile Number (Call Received)
❖ Transaction details (Date, Time)
❖ Transaction ID(SMS), Amount, Wallet, Bank, etc.
Collect above details at the earliest and forward to
Cyber Cell
❖ Whatsapp 9497976000,9497981288,9847435193
❖ We can Collect, KYC, Mobile SDR & CDR, CAF
Online Financial Fradus
Unauthorized access of
❑Computer & Its resources
❑Telecommunication devices
❑Telecommunication media, etc.
Section 65 Tampering with computer Source
document.
Section 66 – Hacking with computer systems –
including all activities mentioned in the sec 43
Imprisonment up to three years, or with
fine which may extend up to two lakh
rupees, or with both
41
42
Hacking : - Hacker can be used to denote a
computer expert engaged in solving complex
problems on computers or persons securing
unauthorized access, looks around , collects
information and leaves without a trace. Hacking
done with malicious intention is called cracker.
Phreaker:- is a person who manipulates and
disrupts telecomm systems. Today
telecommunication systems has also been
computerized.
43
❖ The worst passwords to use are the ones
that come to mind first -- name, spouse's name,
maiden name, pets, children's name, even
street addresses, etc.
❖ The best passwords mix numbers with upper
and lowercase letters.
❖ A password that is not found in the dictionary
is even better. There are programs that will try
every word in the dictionary in an effort to crack
your security. Changing passwords regularly
❖
Password Breaking!!!
Trusted Friends
Trusted friends are friends you can reach out to if you
ever get locked out of your Facebook account .
Secure Browsing (https)
Your traffic (i.e. all of your activity) on Facebook
becomes encrypted
Login Notifications
Login Notifications are an opt-in security feature where
alerts are sent to you each time your account is
accessed from a new device. Add a Mobile Number.
Login Approvals : Similar to Login Notifications , but
need security code to login.
Password, Message & Links, Personal Information, Browser
Security & Computer Security
1. Getting started with 2-step verification
2. Check the forwarding and delegation in mail
settings tab.
3. Update your secondary email address and your
security question, and provide a mobile phone for SMS-
based account recovery
4. Secure Browsing (https)
Your traffic (i.e. all of your activity) on Facebook
becomes encrypted
5. Check recent IP addresses accessing the account
6. Backup your Gmail Account- (Thunderbird, Outlook , Pocomail).
Password, Message & Links, Personal Information, Browser
Security & Computer Security
47
True Caller
UC Browser
Shareit
Clean Master
A person following another especially women and
continuously harassing through online
Cyber Stalking is generally considered as use of the
Internet, e-mail or other electronic communications
device to stalk or harass a person.
Sec. 499, 503,509 IPC & Section 120(o) of KP Act.
Punishable with simple imprisonment for a term which may extend to two
years, or with fine, or with both.
Sec 503 IPC Sending threatening messages by e-
mail
Sec 499 IPC Sending defamatory messages by e-
mail
• Sexual Harassment
• Obsession for love
• Revenge & Hate
• Ego & Power Trips
➢Their main targets are the mostly females,
children, emotionally weak or unstable, etc. It is
believed that Over 75% of the victims are female
• Publishing sexual activities in the form of
visuals, audio or through text to raise
erotic feelings rather than aesthetic.
✓ New concept called as SEXTING
✓ Sending sexually explicit pictures by cell phone or
Email
51
52
Section 67 – Publishing of information which
is obscene in electronic form. 3 years or with fine
not exceeding 5 lakh
Sec 67 A - Punishment for publishing or transmitting of
material containing sexually explicit act, etc., in electronic
form. five years and with fine which may extend to ten lakh
rupees
Sec 119 of KP Act - Punishment for atrocities against
women. – (1) Any person who,—
(a) performs, in public places, any sexual gestures or acts
degrading the dignity of women; or
24(b) takes photographs or records videos or propagates them at
any place in a manner affecting the reasonable privacy of women.
Cases : Ramankari Teacher, Chengannur Beauty & Banlglore student,etc.
3 yrs imprisonment & Fine
• Put utmost care in selecting friends – All kinds of
Criminals are in this Social media.
• Don’t post family information publicly
• Don’t post, share and like defamatory comments
and contents.
• Don’t post dirty videos
• Don’t post live pictures while u r travelling.
• Note : Once u posted something, it will not taken
back from the Cyber World.
• Founders: Larry Page, Sergey Brin – 1998, 2004 -
Mark Zuckerberg, Dustin Moskovitz, W3C-Tim
Berners-Lee
• Fake Profiles – 499,500,509 IPC– 3 yrs + 2
lakhs.
• Defamatory posting – 3 yrs + Fine.
• Posting private parts of a person – Sec 66E -3
yrs. + 2 lakhs.
• Sexual messages & Audios – Sec 67 -3 yrs + 5
lakhs.
• Posting Sexual videos – Sec 67 A – 5 yrs + 10
lakh ( 7 yrs + 10 lakhs).
• Posting and downloading sexual videos of
children's – Sec 67 B - 5 yrs + 10 lakh ( 7 yrs +
10 lakhs).
Publishing statements lowering the
reputation of persons.
When someone publishes defamatory
matter about someone on a website or
sends e-mails, pictures, etc. containing
defamatory information to all of that
person's friends or on the internet.
Sec 499,500,503.
In case of sexual abuse against
women. Sec 509 & 354(a) IPC
Social Media & Cyber Crime
Ph : 0477 -2230804 Email : cybrcelalpy.pol@kerala.gov.in
Ph : 0477 -2230804 Email : cybrcelalpy.pol@kerala.gov.in
Phishing – Facebook Page
➢Criminal creates a “mirror” website that
looks like a legitimate website
➢They fool people into going to that site,
which transmits your username or
password to the them
➢Using pop-up windows to conceal the
real address in the victim’s address bar
➢“Pharming” victim redirected to a scam
website when the victim types in the
real address
Deceptive Login Page
➢Online Lottery Scam
➢Online Job Offers
➢ATM Fraud
➢Phishing
➢Russian Wife Scam
Appointment Letter
January 23, 2015
January 23, 2015 HI TECH CRIME ENQUIRY CELL
January 23, 2015 HI TECH CRIME ENQUIRY CELL
VISA
January 23, 2015 HI TECH CRIME ENQUIRY CELL
Section 468. Forgery for purpose of cheating
Whoever commits forgery, intending that the
document or Electronic Record forged shall be used
for the purpose of cheating, shall be punished with
imprisonment of either description for a term which
may extend to seven years, and shall also be liable to
fine.
Section 420. Cheating and dishonestly inducing
delivery of property
shall be punished with imprisonment of either
description for a term which may extend to seven
years, and shall also be liable to fine.
➢ Cyber Piracy is defined as art of making illegal
copies of Music, Books, software etc for the
purpose of sale.
➢ The major form of piracy on the net is violation
of copyrights and trade marks. A part of this piracy
had also been cyber squatting of domain names.
➢ Shall be punishable under section. 51, 63, 63B
of Indian Copyright Act.
• Where we stand
– Twentieth in top 20 pirating countries
– At 73%, behind China (92%), Vietnam (92%),
Indonesia (88%) and Russia (87%)
– Losses at $367 million
• Benefits of piracy control
– Reduction of piracy by 10% will
• Promote innovation
• Add $1.2 billion to GDP
• Create 48,000 jobs
• Add $92 million to tax revenues
IOT CHALLENGES..
Threat vs. Opportunity
• If misunderstood and misconfigured,
misused Technology poses risk to our data,
privacy, and safety
• If understood , secured, efficient use of
Technology will enhance communications,
lifestyle, and delivery of services
The Biggest Investment is
“Investment in as much of yourself as you can, you are
your own biggest by far.
✓ Are you wiser to day than yesterday, or last day , or last
year , or five years ago
✓ Are you taking good care to be physically and mentally
fit.
Jayakumar PP
Ethical Hacker
78
“Awareness about Cyber-crime threats is the best
tool to avoid of being a victim”.
Jayakumar PP
9847435193
jkambala@gmail.com
https://www.facebook.com/jayakumar.purushan
https://www.linkedin.com/pub/jayakumar-pp/65/59b/773
http://www.slideshare.net/jayakumarpurushan

Contenu connexe

Tendances

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Muhammad Irfan
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
Mandar Pathrikar
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
DINESH KAMBLE
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
Adv Prashant Mali
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
Nikhil Naren
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
Assignment Studio
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Sahil Vashishtha
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
Integral university, India
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Cyber Security
Cyber SecurityCyber Security
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
Shishupal Nagar
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
PrabhatChoudhary11
 
Cyber Security
Cyber SecurityCyber Security
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Network attacks
Network attacksNetwork attacks
Network attacks
Manjushree Mashal
 

Tendances (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 
Network security
Network securityNetwork security
Network security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network attacks
Network attacksNetwork attacks
Network attacks
 

Similaire à Cyber Space Threats and Opportunities

Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
SahilMishra81
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
SahilMishra81
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
Aman Bhargava
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
Rahul Bharati
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
infantemiliya
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
Adv Prashant Mali
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
Adv Prashant Mali
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Adv Prashant Mali
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
DINESH KAMBLE
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
Rahul Rathod
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Nitin Kanaujia
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
Aalbert Albert
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
atuljaybhaye
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Accenture
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
SANTANU KUMAR DAS
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
Alomgir Hossain
 

Similaire à Cyber Space Threats and Opportunities (20)

Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 

Plus de Jayakumar PP

Financial Crime and Investigation- Finacial Frauds
Financial Crime and Investigation- Finacial FraudsFinancial Crime and Investigation- Finacial Frauds
Financial Crime and Investigation- Finacial Frauds
Jayakumar PP
 
Blockchain technology and logistics management
Blockchain technology and logistics managementBlockchain technology and logistics management
Blockchain technology and logistics management
Jayakumar PP
 
Akshaya Banking Kiosk
Akshaya Banking KioskAkshaya Banking Kiosk
Akshaya Banking Kiosk
Jayakumar PP
 
Akshaya Project of Government of Kerala
Akshaya Project of Government of KeralaAkshaya Project of Government of Kerala
Akshaya Project of Government of Kerala
Jayakumar PP
 
Akshaya down the years
Akshaya down the yearsAkshaya down the years
Akshaya down the years
Jayakumar PP
 
IT to IOT Evolution
IT to IOT EvolutionIT to IOT Evolution
IT to IOT Evolution
Jayakumar PP
 
CCTNS
CCTNS CCTNS
CCTNS
Jayakumar PP
 
Planning in Software Projects
Planning in Software ProjectsPlanning in Software Projects
Planning in Software Projects
Jayakumar PP
 
Class on cyber crime
Class on cyber crimeClass on cyber crime
Class on cyber crime
Jayakumar PP
 

Plus de Jayakumar PP (9)

Financial Crime and Investigation- Finacial Frauds
Financial Crime and Investigation- Finacial FraudsFinancial Crime and Investigation- Finacial Frauds
Financial Crime and Investigation- Finacial Frauds
 
Blockchain technology and logistics management
Blockchain technology and logistics managementBlockchain technology and logistics management
Blockchain technology and logistics management
 
Akshaya Banking Kiosk
Akshaya Banking KioskAkshaya Banking Kiosk
Akshaya Banking Kiosk
 
Akshaya Project of Government of Kerala
Akshaya Project of Government of KeralaAkshaya Project of Government of Kerala
Akshaya Project of Government of Kerala
 
Akshaya down the years
Akshaya down the yearsAkshaya down the years
Akshaya down the years
 
IT to IOT Evolution
IT to IOT EvolutionIT to IOT Evolution
IT to IOT Evolution
 
CCTNS
CCTNS CCTNS
CCTNS
 
Planning in Software Projects
Planning in Software ProjectsPlanning in Software Projects
Planning in Software Projects
 
Class on cyber crime
Class on cyber crimeClass on cyber crime
Class on cyber crime
 

Dernier

Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 

Dernier (19)

Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 

Cyber Space Threats and Opportunities

  • 1. Cyber Space Opportunities & Threat Awareness Class Jayakumar PP 9847435193
  • 2. Evolution of Cyber space Computerisation
  • 4. • The Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity—that enables these objects to collect and exchange data. What is IoT? IOT? In simple words, Internet of Things (IoT) is an ecosystem of connected physical objects that are accessible through the internet.
  • 5. • 1969 – Jan 2 – ARPANET – Four centers • India joined in the year 1995 –Aug 15 • Instant Communications, News Reference, Resea Entertainment, Shopping, etc, etc.. • 1972 Ray Tomlinson invents eMail. • 1983 Invents Internet Protocol • 1989 first World Wide Web Developed • 1994 First G-Web Browser Developed (Mosaic). • 1995 Internet open for commercial purpose. The Internet is a Great Place
  • 6. Evolution of Internet connectivity
  • 7.
  • 8.
  • 9. IOT IN DAILY LIFE…
  • 10.
  • 11.
  • 12.
  • 13. • eGovernance • Social Media site • Micro Blogs • Mobile Apps • Web Sites • Internet has: porn sites – hate sites pirated software, music, movies – viruses and malicious downloads, spyware – scams and data collection sites • Harassment and legal/financial risks Things Around Us!!!
  • 14. e-Governance & Citizen Centric Service Delivery
  • 16. Examples of e-Services – G2C • Birth Certificate • Health Care • School Admission • Scholarships • e-Learning • Examination Results • Employment Services • Vehicle Registration • Driver’s License • Passport/Visa • Agriculture • Land Record • Property Registration • Marriage Certificates • Taxes • Utility Services • Municipality Services • Pensions • Insurance • Health Care • Death Certificate from Cradle to Grave……
  • 18.
  • 19. • www.classmates.com – 1995 Randy Conrads • Facebook & Orkut in the year 2004 • Twitter in the year 2006 • Google plus in the year 2011
  • 20. 1. Information Technology Act 2000 2. Indian Penal Code – 1860 3. Indian Copyright Act – 1957 • IT Act Applicable to all states of India including Jammu & Kashmir • It is applicable to any violation of the provisions of this Act done by any person anywhere in the world.
  • 21.
  • 22. Cyber Crime Against Women BULLYING Pornography Morphing Email Spoofing Defamation Online Game Online Grooming Threats Against Women & Children in Cyber Space
  • 23.
  • 24.
  • 25. Police Contact and Help Line Numbers
  • 28. Mobile phone harrassment is also called BULLYING, which is a general term to describe any type of unwanted telephone calls or messages, or picture messages, intended to cause upset and grief !!! – Sec 499, 509 of IPC and 120(o) KP Act . ✓Word, gesture or act intended to insult the modesty of a woman. ✓Shall be punished with simple imprisonment for a term which may extend to one year, or with fine, or with both
  • 30.
  • 31. Similarly, Section 419 of the IPC could also be applied with the same qualification that it must be making a pecuniary(financial) benefit to it. Under Section 465 of the Act, a person committing forgery shall be imprisoned for up to two years and shall also liable to pay fine ➢ Section 499/500 IPC: When fake profile is posted with defamatory content with an intention to defame other, the offence punishable under Section 499/500 IPC (defamation) is attracted. Details Required ➢ URL of the Suspect FB Account ➢ Screen Shot of FB Account – Two or more ➢ ID Proof & Photo of the Complainant ➢ URL & Screen Shot of the any post related with the Social Media – Fake Profile
  • 32. Making a fake account of another person Section 66-D of Information Technology Act 2000, which was subsequently amended in 2008, states that “whoever by means of any communication device or computer resource cheats by personating, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.”[1] . The real face behind the fake profile can be traced through IP address. Internet Protocol address (IP address) is a numeric label – a set of four numbers (Eg. 202.54.30.1) – that is assigned to every device (e.g., computer, printer) participating on the internet Social Media – Fake Account
  • 33. Online Game ❖Addiction ❖Loss of interest ❖Underdeveloped physical condition ❖Decline in personal hygiene ❖Declining social activity
  • 34. Roblox - popular with kids, teens and even adults, which allows users to interact with one another in this virtual world, play games and also engage in role play. My Friend Cayla - smart toy looks like an innocent baby doll with pretty features, lovely hair, a sweet smile, and an equally adorable outfit. Blue Whale -This social media game dares its players to also participate in a series of tasks which are detrimental to their health and can also cause them great harm. Fire Fairy - This online prank targets younger children and is modelled after the animated series, It gives dangerous instructions to unsuspecting kids on how they can become a magical “fire fairy”. Cloud Pets -These innocent-looking smart toys which come as a cuddly elephant, bear, cat, rabbit, dog or unicorn can record audio messages via a mobile app and replay them for your child’s entertainment. The Pass Out Challenge. The Salt and Ice Challenge The Fire Challenge The Cutting Challenge Dangerous Online Games
  • 36. Details Required ❖ Card No (Credit/Debit) ❖ Bank & Account No ❖ Suspect Mobile Number (Call Received) ❖ Transaction details (Date, Time) ❖ Transaction ID(SMS), Amount, Wallet, Bank, etc. Collect above details at the earliest and forward to Cyber Cell ❖ Whatsapp 9497976000,9497981288,9847435193 ❖ We can Collect, KYC, Mobile SDR & CDR, CAF Online Financial Fradus
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. Unauthorized access of ❑Computer & Its resources ❑Telecommunication devices ❑Telecommunication media, etc. Section 65 Tampering with computer Source document. Section 66 – Hacking with computer systems – including all activities mentioned in the sec 43 Imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both 41
  • 42. 42 Hacking : - Hacker can be used to denote a computer expert engaged in solving complex problems on computers or persons securing unauthorized access, looks around , collects information and leaves without a trace. Hacking done with malicious intention is called cracker. Phreaker:- is a person who manipulates and disrupts telecomm systems. Today telecommunication systems has also been computerized.
  • 43. 43 ❖ The worst passwords to use are the ones that come to mind first -- name, spouse's name, maiden name, pets, children's name, even street addresses, etc. ❖ The best passwords mix numbers with upper and lowercase letters. ❖ A password that is not found in the dictionary is even better. There are programs that will try every word in the dictionary in an effort to crack your security. Changing passwords regularly ❖
  • 45. Trusted Friends Trusted friends are friends you can reach out to if you ever get locked out of your Facebook account . Secure Browsing (https) Your traffic (i.e. all of your activity) on Facebook becomes encrypted Login Notifications Login Notifications are an opt-in security feature where alerts are sent to you each time your account is accessed from a new device. Add a Mobile Number. Login Approvals : Similar to Login Notifications , but need security code to login. Password, Message & Links, Personal Information, Browser Security & Computer Security
  • 46. 1. Getting started with 2-step verification 2. Check the forwarding and delegation in mail settings tab. 3. Update your secondary email address and your security question, and provide a mobile phone for SMS- based account recovery 4. Secure Browsing (https) Your traffic (i.e. all of your activity) on Facebook becomes encrypted 5. Check recent IP addresses accessing the account 6. Backup your Gmail Account- (Thunderbird, Outlook , Pocomail). Password, Message & Links, Personal Information, Browser Security & Computer Security
  • 47. 47
  • 49. A person following another especially women and continuously harassing through online Cyber Stalking is generally considered as use of the Internet, e-mail or other electronic communications device to stalk or harass a person. Sec. 499, 503,509 IPC & Section 120(o) of KP Act. Punishable with simple imprisonment for a term which may extend to two years, or with fine, or with both. Sec 503 IPC Sending threatening messages by e- mail Sec 499 IPC Sending defamatory messages by e- mail
  • 50. • Sexual Harassment • Obsession for love • Revenge & Hate • Ego & Power Trips ➢Their main targets are the mostly females, children, emotionally weak or unstable, etc. It is believed that Over 75% of the victims are female
  • 51. • Publishing sexual activities in the form of visuals, audio or through text to raise erotic feelings rather than aesthetic. ✓ New concept called as SEXTING ✓ Sending sexually explicit pictures by cell phone or Email 51
  • 52. 52 Section 67 – Publishing of information which is obscene in electronic form. 3 years or with fine not exceeding 5 lakh Sec 67 A - Punishment for publishing or transmitting of material containing sexually explicit act, etc., in electronic form. five years and with fine which may extend to ten lakh rupees Sec 119 of KP Act - Punishment for atrocities against women. – (1) Any person who,— (a) performs, in public places, any sexual gestures or acts degrading the dignity of women; or 24(b) takes photographs or records videos or propagates them at any place in a manner affecting the reasonable privacy of women. Cases : Ramankari Teacher, Chengannur Beauty & Banlglore student,etc. 3 yrs imprisonment & Fine
  • 53. • Put utmost care in selecting friends – All kinds of Criminals are in this Social media. • Don’t post family information publicly • Don’t post, share and like defamatory comments and contents. • Don’t post dirty videos • Don’t post live pictures while u r travelling. • Note : Once u posted something, it will not taken back from the Cyber World. • Founders: Larry Page, Sergey Brin – 1998, 2004 - Mark Zuckerberg, Dustin Moskovitz, W3C-Tim Berners-Lee
  • 54. • Fake Profiles – 499,500,509 IPC– 3 yrs + 2 lakhs. • Defamatory posting – 3 yrs + Fine. • Posting private parts of a person – Sec 66E -3 yrs. + 2 lakhs. • Sexual messages & Audios – Sec 67 -3 yrs + 5 lakhs. • Posting Sexual videos – Sec 67 A – 5 yrs + 10 lakh ( 7 yrs + 10 lakhs). • Posting and downloading sexual videos of children's – Sec 67 B - 5 yrs + 10 lakh ( 7 yrs + 10 lakhs).
  • 55.
  • 56.
  • 57. Publishing statements lowering the reputation of persons. When someone publishes defamatory matter about someone on a website or sends e-mails, pictures, etc. containing defamatory information to all of that person's friends or on the internet. Sec 499,500,503. In case of sexual abuse against women. Sec 509 & 354(a) IPC
  • 58. Social Media & Cyber Crime
  • 59. Ph : 0477 -2230804 Email : cybrcelalpy.pol@kerala.gov.in
  • 60. Ph : 0477 -2230804 Email : cybrcelalpy.pol@kerala.gov.in
  • 62.
  • 63. ➢Criminal creates a “mirror” website that looks like a legitimate website ➢They fool people into going to that site, which transmits your username or password to the them ➢Using pop-up windows to conceal the real address in the victim’s address bar ➢“Pharming” victim redirected to a scam website when the victim types in the real address
  • 64.
  • 66. ➢Online Lottery Scam ➢Online Job Offers ➢ATM Fraud ➢Phishing ➢Russian Wife Scam
  • 68. January 23, 2015 HI TECH CRIME ENQUIRY CELL
  • 69. January 23, 2015 HI TECH CRIME ENQUIRY CELL VISA
  • 70. January 23, 2015 HI TECH CRIME ENQUIRY CELL
  • 71. Section 468. Forgery for purpose of cheating Whoever commits forgery, intending that the document or Electronic Record forged shall be used for the purpose of cheating, shall be punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine. Section 420. Cheating and dishonestly inducing delivery of property shall be punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine.
  • 72. ➢ Cyber Piracy is defined as art of making illegal copies of Music, Books, software etc for the purpose of sale. ➢ The major form of piracy on the net is violation of copyrights and trade marks. A part of this piracy had also been cyber squatting of domain names. ➢ Shall be punishable under section. 51, 63, 63B of Indian Copyright Act.
  • 73. • Where we stand – Twentieth in top 20 pirating countries – At 73%, behind China (92%), Vietnam (92%), Indonesia (88%) and Russia (87%) – Losses at $367 million • Benefits of piracy control – Reduction of piracy by 10% will • Promote innovation • Add $1.2 billion to GDP • Create 48,000 jobs • Add $92 million to tax revenues
  • 75. Threat vs. Opportunity • If misunderstood and misconfigured, misused Technology poses risk to our data, privacy, and safety • If understood , secured, efficient use of Technology will enhance communications, lifestyle, and delivery of services
  • 76. The Biggest Investment is “Investment in as much of yourself as you can, you are your own biggest by far. ✓ Are you wiser to day than yesterday, or last day , or last year , or five years ago ✓ Are you taking good care to be physically and mentally fit.
  • 78. 78 “Awareness about Cyber-crime threats is the best tool to avoid of being a victim”. Jayakumar PP 9847435193 jkambala@gmail.com https://www.facebook.com/jayakumar.purushan https://www.linkedin.com/pub/jayakumar-pp/65/59b/773 http://www.slideshare.net/jayakumarpurushan