SlideShare une entreprise Scribd logo
1  sur  18
Seminar on
CYBER-CRIME
Presented By:
Vaibhav Gaur
B.Tech IV Year/VIII Sem/CSE
CHARTERED INSTITUTE OF TECHNOLOGY
TRANSFORMING EDUCATION WITH GENERATION
JOIN ME ON :https://www.facebook.com/vaibh.gaur
INTRODUCTION
 As the use of internet is increasing day by day,
traditional concepts & methods of crime have
taken new dimensions.
 The development in information technology has
given rise to more number of cyber attacks like
hacking, phishing, data theft etc.
 A country like India has seen a growing number
of cyber assaults, witnessed the misuse of social
media & internet that brought home the threat of
CYBER-CRIME.
WHAT IS CYBER-CRIME ??
 Cyber-Crime can be defined as the intentional
use of computer, networks & public internets to
cause destruction & harm for personal objectives.
EXAMPLES OF CYBER-CRIME
 Hacking into computer systems.
 Introducing viruses to vulnerable networks.
 Website Defacing.
 Denial-of-Service(DoS) attacks.
 Terrorists threats made via e-mail.
CORE CHARACTERISTICS
Cyber Crime has some universal characteristics, which are as follows:
 It is done to convey a particular destructive or disruptive message to
the government.
 There are various methods to convey this message, viz., through
denial of services, sending threatening emails, defacing of
government websites, hacking and cracking of crucial governmental
systems or ‘protected systems’, disrupting the civil amenities through
destroying the proper working of the digital information systems, etc.
 It could affect the computers and the networks as a whole, it could
also affect the governing system, and it could affect the population of
target area to create threat.
 Computer and digital communication technology are used as main
tool to achieve extremist purposes.
 The whole act could be motivated by religious, social or political
ideologies.
COMMERCIAL SECTOR, A KEY TARGET
 Communication System:
News Organizations
Telephony suppliers
 Corporations:
Component suppliers(boots, foods, radios etc)
Civilian consulting companies
 Financial Institutions
Government funds tied up in commercial banks
 Health Care Industry
Pharmacies, hospitals, clinics
Drug companies(vaccines, antibiotics)
MOST COMMON ATTACKS !!
 Hackin With Computer System
 Data Theft
 Spreading Virus or Worms
 Identity Theft
HACKING WITH COMPUTER
SYSTEM
 Hacking means unauthorized attempts to bypass the security mechanisms
of an information system or network. Also, in simple words Hacking is the
unauthorized access to a computer system, programs, data and network
resources.
 LAWS :-Under section 66 of IT ACT 2008 & Section 43(A),IPC Section
379 and 406.
 PUNISHMENT:-Imprisonment upto 3 years or fine upto 5 lakh or
Both.
DATA THEFT
 If any person without permission of the owner or any other person, who is
incharge of a computer, computer system of computer network -
downloads, copies or extracts any data, computer data base or information
from such computer,computer system including information or data held
orstored in any removable storage medium.
 LAWS :-Under section 43(B) & Section 66 (E),67(C) of IT ACT 2008 &
IPC Section 379,405 and 420 &copyright.
 PUNISHMENT:-Imprisonment upto 3 years or fine upto 2 lakh or
Both.
SPREADING VIRUS OR WORM
 Viruses can do any amount of damage, the creator intends them to
do. They can send your data to a third party and then delete your
data from your computer. They can also ruin/mess up your system
and render it unusable without a re-installation of the operating
system.
 LAWS :-Under section 43(C) & Section 43 (E),66.
 PUNISHMENT:- Spreading of Virus offence is cognizable, bailable,
compoundable with permission of the court before which the prosecution
of such offence is pending and triable by any magistrate.
IDENTITY THEFT
 Identity theft is a form of fraud or cheating of another person’s identity in
which someone pretends to be someone else by assuming that person’s
identity, typically in order to access resources or obtain credit and other
benefits in that person’s name.
 LAWS :-Under section 66(C) & IPC Section 419.
 PUNISHMENT:- Imprisonment upto 3 years or fine upto 1 lakh or
Both.
CASE STUDIES
 9/11 attack
 Ahmadabad bomb blast
 26/11 Mumbai attack
9/11 TWIN TOWERS ATTACK
 Launched by Islamic terrorist group of Al-Qaeda
upon the United States in New York city & the
Washington D.C. metropolitan area.
 4 passengers airlines were hijacked by 19 Al-
Qaeda terrorists.
 Almost 3000 people died in the attack.
AHMADABAD BOMB BLAST(26-07-08)
 A mail with id alarbi_gujrat@yahoo.com was
being sent by a group of terrorists.
 Person named Kenneth Haywood’s unsecured
WiFi router in his house was being misused by
terrorists.
 56 people were killed & over 200 people were
injured.
26/11 MUMBAI ATTACK
 By the members of Lashkar-e-Taiba.
 Ajmal Kasab, the only attacker who was captured
alive, later confessed upon interrogation that the
attacks were conducted with the support of Pakistan.
 Major places of attacks were: Chhatrapati Shivaji
Terminus, the Taj Mahal Palace & tower, the Metro
Cinema etc.
 257 people were killed & 700 were injured.
WHAT DO WE NEED TO DO ??
 Maintain high alert & vigilance
 Update OS & applications regularly
 Enforce strong passwords
 “Lock down” systems
 Keep anti-virus software installed & up-to-date
 Employ intrusion detection systems & firewalls
CONCLUSION
 Cyber-Crime is a scary concept for many reasons.
It can do possible serious damage to various
aspects of our lives. It is difficult to catch & track
& prosecute.
 The information ago has brought us many good
things, but along with those good things came
some bad things too.
 All we can do as citizens is to protect ourselves by
protecting our information, who we give it to &
how much we give it out.
Cyber crime presentation By Vaibhav Gaur

Contenu connexe

Tendances

CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
Siddharth Anand
 
Information security management
Information security managementInformation security management
Information security management
UMaine
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

Tendances (20)

History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information security management
Information security managementInformation security management
Information security management
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Network security
Network securityNetwork security
Network security
 

En vedette (8)

Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Software Security
Software SecuritySoftware Security
Software Security
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
System security
System securitySystem security
System security
 

Similaire à Cyber crime presentation By Vaibhav Gaur

Similaire à Cyber crime presentation By Vaibhav Gaur (20)

CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 

Dernier

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Dernier (20)

Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 

Cyber crime presentation By Vaibhav Gaur

  • 1. Seminar on CYBER-CRIME Presented By: Vaibhav Gaur B.Tech IV Year/VIII Sem/CSE CHARTERED INSTITUTE OF TECHNOLOGY TRANSFORMING EDUCATION WITH GENERATION JOIN ME ON :https://www.facebook.com/vaibh.gaur
  • 2. INTRODUCTION  As the use of internet is increasing day by day, traditional concepts & methods of crime have taken new dimensions.  The development in information technology has given rise to more number of cyber attacks like hacking, phishing, data theft etc.  A country like India has seen a growing number of cyber assaults, witnessed the misuse of social media & internet that brought home the threat of CYBER-CRIME.
  • 3. WHAT IS CYBER-CRIME ??  Cyber-Crime can be defined as the intentional use of computer, networks & public internets to cause destruction & harm for personal objectives.
  • 4. EXAMPLES OF CYBER-CRIME  Hacking into computer systems.  Introducing viruses to vulnerable networks.  Website Defacing.  Denial-of-Service(DoS) attacks.  Terrorists threats made via e-mail.
  • 5. CORE CHARACTERISTICS Cyber Crime has some universal characteristics, which are as follows:  It is done to convey a particular destructive or disruptive message to the government.  There are various methods to convey this message, viz., through denial of services, sending threatening emails, defacing of government websites, hacking and cracking of crucial governmental systems or ‘protected systems’, disrupting the civil amenities through destroying the proper working of the digital information systems, etc.  It could affect the computers and the networks as a whole, it could also affect the governing system, and it could affect the population of target area to create threat.  Computer and digital communication technology are used as main tool to achieve extremist purposes.  The whole act could be motivated by religious, social or political ideologies.
  • 6. COMMERCIAL SECTOR, A KEY TARGET  Communication System: News Organizations Telephony suppliers  Corporations: Component suppliers(boots, foods, radios etc) Civilian consulting companies  Financial Institutions Government funds tied up in commercial banks  Health Care Industry Pharmacies, hospitals, clinics Drug companies(vaccines, antibiotics)
  • 7. MOST COMMON ATTACKS !!  Hackin With Computer System  Data Theft  Spreading Virus or Worms  Identity Theft
  • 8. HACKING WITH COMPUTER SYSTEM  Hacking means unauthorized attempts to bypass the security mechanisms of an information system or network. Also, in simple words Hacking is the unauthorized access to a computer system, programs, data and network resources.  LAWS :-Under section 66 of IT ACT 2008 & Section 43(A),IPC Section 379 and 406.  PUNISHMENT:-Imprisonment upto 3 years or fine upto 5 lakh or Both.
  • 9. DATA THEFT  If any person without permission of the owner or any other person, who is incharge of a computer, computer system of computer network - downloads, copies or extracts any data, computer data base or information from such computer,computer system including information or data held orstored in any removable storage medium.  LAWS :-Under section 43(B) & Section 66 (E),67(C) of IT ACT 2008 & IPC Section 379,405 and 420 &copyright.  PUNISHMENT:-Imprisonment upto 3 years or fine upto 2 lakh or Both.
  • 10. SPREADING VIRUS OR WORM  Viruses can do any amount of damage, the creator intends them to do. They can send your data to a third party and then delete your data from your computer. They can also ruin/mess up your system and render it unusable without a re-installation of the operating system.  LAWS :-Under section 43(C) & Section 43 (E),66.  PUNISHMENT:- Spreading of Virus offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.
  • 11. IDENTITY THEFT  Identity theft is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name.  LAWS :-Under section 66(C) & IPC Section 419.  PUNISHMENT:- Imprisonment upto 3 years or fine upto 1 lakh or Both.
  • 12. CASE STUDIES  9/11 attack  Ahmadabad bomb blast  26/11 Mumbai attack
  • 13. 9/11 TWIN TOWERS ATTACK  Launched by Islamic terrorist group of Al-Qaeda upon the United States in New York city & the Washington D.C. metropolitan area.  4 passengers airlines were hijacked by 19 Al- Qaeda terrorists.  Almost 3000 people died in the attack.
  • 14. AHMADABAD BOMB BLAST(26-07-08)  A mail with id alarbi_gujrat@yahoo.com was being sent by a group of terrorists.  Person named Kenneth Haywood’s unsecured WiFi router in his house was being misused by terrorists.  56 people were killed & over 200 people were injured.
  • 15. 26/11 MUMBAI ATTACK  By the members of Lashkar-e-Taiba.  Ajmal Kasab, the only attacker who was captured alive, later confessed upon interrogation that the attacks were conducted with the support of Pakistan.  Major places of attacks were: Chhatrapati Shivaji Terminus, the Taj Mahal Palace & tower, the Metro Cinema etc.  257 people were killed & 700 were injured.
  • 16. WHAT DO WE NEED TO DO ??  Maintain high alert & vigilance  Update OS & applications regularly  Enforce strong passwords  “Lock down” systems  Keep anti-virus software installed & up-to-date  Employ intrusion detection systems & firewalls
  • 17. CONCLUSION  Cyber-Crime is a scary concept for many reasons. It can do possible serious damage to various aspects of our lives. It is difficult to catch & track & prosecute.  The information ago has brought us many good things, but along with those good things came some bad things too.  All we can do as citizens is to protect ourselves by protecting our information, who we give it to & how much we give it out.