Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Offences under Cyber Space Law, Slides of Cybercrime, Cybersecurity and Data Privacy

An overview of cyber crime in India, including types of cyber crime, statistics on internet usage, and relevant laws. It discusses the various forms of cyber crime, such as hacking, cyber stalking, and vishing, and highlights the need for individuals to protect themselves from cyber crime. The document also emphasizes the importance of law enforcement agencies staying up-to-date with changing technology and laws. Overall, the document serves as an introduction to the topic of cyber crime in India.

Typology: Slides

2021/2022

Available from 09/23/2023

avishek-1
avishek-1 🇮🇳

4 documents

1 / 17

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
HACKING ON THE CYBERSPACE
AND INTERNET,OTHER
OFFENCES-COMPUTER
RESOURCES,VOILATION OF THE
RIGHT OF PRIVACY ON
CYBERSPACE/INTERNET
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff

Partial preview of the text

Download Offences under Cyber Space Law and more Slides Cybercrime, Cybersecurity and Data Privacy in PDF only on Docsity!

HACKING ON THE CYBERSPACE

AND INTERNET,OTHER

OFFENCES-COMPUTER

RESOURCES,VOILATION OF THE

RIGHT OF PRIVACY ON

CYBERSPACE/INTERNET

🞂 “Cyber crime” is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. 🞂 Cyber crime mainly consists of unauthorized access to computer system data alteration, data destruction, theft of intellectual properly. 🞂 Cyber crime in the context of national security may involve hacking, traditional espionage, or information warfare and related activities. CYBER CRIME

🞂 The majority of cyber are centered on fraud and phishing. 🞂 India is the 3 rd most targeted country for phishing attacks after the us and uk. 🞂 Social networks as well as ecommerce sites are major targets. 🞂 India is the no.1 country for generating spam. CYBER CRIME IN INDIA

🞂 A rapidly growing online user base 🞂 121 million internet users. 🞂 65 million active internet users 🞂 50 million users shop online on economic and online shopping sites. 🞂 46+ million social networks users. 🞂 Huge population. WHY INDIA

🞂 Sale of illegal articles weapons, wildlife, narcotics. 🞂 Online gambling. 🞂 Cyber stalking. 🞂 Phishing. 🞂 Vulnerability 🞂 Cyber terrorism. 🞂 Intellectual property crimes. 🞂 Cyber defamation TYPES OF THE CYBER CRIME

🞂 HACKING :- Hacking is a crime which includes cracking system and gaining unauthorized access to the data stored in them. 🞂 Cyber Squatting:- “ Cyber squatting is the act of registering a famous domain name and then selling it in future. This is an issues that has not been tackled in IT Act 2000. CYBER CRIME VARIANTS

🞂 Cyber stalking is use of the internet or other electronic means to stalk someone. 🞂 This term is used interchangeably with online harassment and online abuse. 🞂 Stalking generally involves harassing pr threatening behavior that an individual engages in repeatedly. 🞂 Such as following a person, appearing at person’s home or place of business, making harassing phone calls ,leaving written messages or objects. CYBER STALKING

🞂 Vishing is the criminal practice of using social engineering and voice over IP to gain access to private personal and information from the public for the purpose of financial reward. 🞂 The term is a combination of “voice and phishing “. Vishing exploits the public’s trust in landline telephone services. 🞂 Vishing is typically used to steal credit card numbers or other information used in identify theft schemes from individuals. VISHING

🞂 Section 66A^ : punishment for sending offensive message through communication service, etc 🞂 Section 66C^ : punishment for identity theft 🞂 Section 66D : punishment for cheating by personation by using computer resource. 🞂 Section 66E : punishment for violation of privacy. IT AMENDMENT ACT 2008

🞂 Anti virus and spyware software : 🞂 Anti virus software consists of computer programs that attempt to identity and eliminate computer virus and other malware software. 🞂 Anti spyware are used to restrict backdoor program 🞂 Firewalls: 🞂 A firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs or a combination of two. PREVENTIONS OF CYBERCRIME

🞂 Indian laws are well drafted and capable of handling all kind of challenges as posed by cyber criminal, however the enforment agenies are required to be well reversed with the changing technological and laws. 🞂 As internet technology advances sp does the threat of cyber crime. 🞂 In times likes these we must protect ourselves from cyber crime. 🞂 Antivirus software , firewall and security patches are just the beginning. 🞂 Never open suspicious emails and olny navigate ton trusted sites. CONCLUSION

THANK YOU