Cyber Crime Presentation

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 20

Chehak Chadha - 87006 61014

CYBER CRIME

Why youth should worry?


By-Adv. Kiffy Aggarwal
CONTENT
 Introduction
 Types cybercrime
 What and how much do we know about cybercrime?
 Example of cybercrime
 Methods to prevent cybercrime
 Cybercrime laws
 Cyber security awareness
 Categories of cybercrime
 Why you should worry?
 Impact of cybercrime
 Cyber law of India
 Three major categories
 IT act 2000
 Need and importance of cyber law
 Safety methods for cyber crime
 Conclusion
Cyber crime – why youth should worry? 3

INTRODUCTION
Cybercrime refers to any criminal activity that involves the use of the internet,
computer systems, or other forms of technology. With the increasing use of
digital devices and online platforms, cybercrime has become a major concern
in the modern world.
The youth should be particularly worried about cybercrime because they are
the most active users of technology and the internet. They are also more likely
to engage in risky online behavior, such as sharing personal information
online, clicking on suspicious links, and downloading malicious software.
Moreover, young people often lack the necessary knowledge and skills to
protect themselves from cyber threats, making them more vulnerable to
cybercrime. This is why it is important for them to be aware of the dangers of
cybercrime and to take steps to protect themselves online. By being informed
and proactive, young people can avoid falling victim to cybercrime and help
create a safer online environment for themselves and others.
TYPES OF CYBER CRIMES

1. Hacking and Malware: This includes unauthorized access to computer systems or networks, spreading malware
like viruses, worms, and Trojans, and exploiting software vulnerabilities to gain access to sensitive information.
2.Identity Theft and Fraud: This includes stealing personal information such as Social Security numbers, credit card
information, or login credentials to gain access to financial accounts or commit other types of fraud.
3.Cyberbullying: This includes using digital technologies like social media platforms, email, or instant messaging to
harass, intimidate, or threaten someone online.
4.Online Scams: This includes fraudulent schemes such as phishing scams, investment fraud, and online auction
fraud, which aim to trick people into providing personal information or money.
5.Cyber Espionage: This includes using digital technologies to gain unauthorized access to sensitive information,
such as trade secrets, government intelligence, or military plans.
6.Child Exploitation: This includes using the internet to distribute, produce, or access child pornography or to
groom children for sexual exploitation.
7.Cyberstalking: This includes using digital technologies to monitor, harass, or threaten someone, often in a
persistent and menacing manner.
8.Denial of Service Attacks: This includes using computer networks to overwhelm a website or computer system
with traffic, rendering it unavailable to users.
These are just a few examples of the types of cybercrime that exist. Cybercrime is a constantly evolving threat, and new
types of cybercrime are emerging all the time.
CYBERCRIME
5

WHAT AND HOW MUCH DO WE KNOW ABOUT


CYBERCRIME?

The first cybercrime was committed in India, Japan, and China in 1820. One of the most important
problems is pornography, under section 67 of the information technology (IT) act. Cybercrime is estimated
to cost the global economy billions of dollars each year, and the number of cybercrime incidents is
increasing. In particular, the COVID-19 pandemic has led to a surge in cybercrime as more people are
working and socializing online. Cybercriminals use a wide range of tactics and techniques to carry out their
crimes, and they are constantly adapting to new technologies and security measures. As a result, our
understanding of cybercrime is always evolving as we learn about new threats and vulnerabilities. Many
cybercrime incidents are carried out by sophisticated criminal organizations that have significant resources
and expertise. These groups often operate across borders and can be difficult to track and prosecute.
Cybercrime can result in financial losses, reputational damage, and even physical harm. It can also lead to
the theft of sensitive information, such as personal data or trade secrets, which can have long-lasting effects.
The most effective way to prevent cybercrime is through effective cybersecurity measures, such as strong
passwords, regular software updates, and employee training on cybersecurity best practices.
CYBERCRIME
6

EXAMPLES OF CYBERCRIME
• In Bhopal, a youth was arrested for being a member of a WhatsApp group that shared videos of
child pornography, the crime branch found many messages sent in “code word” demanding child
pornography content from the accused.
• In Kolkata, the death of a young 17-year-old student due to cyberbullying might be an extreme case
but Cyber Crimes are on the rise in this city a recent TCS study has claimed that are addicted to
Facebook – a high of 85% of teens have an account there.
• In Delhi, Youth Flees With iPhone To Make TikTok Videos; A call center employee, who escaped
with an iPhone to make better quality TikTok videos, was arrested during a vehicle check at Vikas
Marg, the police said.
• In Hyderabad, a youth who works in a hotel and a student were arrested on Friday for uploading
nude videos and photos of a 23- year old woman on social media and harassing her seeking sexual
favors and money. The accused was in a relationship with the victim when they were pursuing a
hotel management course. The accused was arrested after he downloaded the victim’s videos and
photos of the victim. He uploaded it on another porn site established by Hyderabad police during
the investigation.
7


EVERY TIME WE CLICK ON A LINK, DOWNLOAD A FILE,
OR CONNECT TO A NETWORK, WE ARE POTENTIALLY
EXPOSING OURSELVES TO CYBERCRIME. IT'S UP TO US
TO BE VIGILANT AND TAKE THE NECESSARY STEPS TO
PROTECT OURSELVES.

James Comey, former director of


the FBI.
CYBERCRIME
8

METHODS TO PREVENT
CYBERCRIME
1.Use strong passwords: Use long, complex passwords or passphrases, and avoid using the same
password for multiple accounts. Consider using a password manager to generate and store your passwords
securely.
2.Keep software up to date: Regularly update your software, including your operating system, web
browser, and any other software you use. Software updates often include security patches that can protect
against known vulnerabilities.
3.Be cautious of suspicious emails: Be wary of unsolicited emails, particularly those that ask for
personal or sensitive information. Avoid clicking on links or downloading attachments from unknown
sources.
4.Use antivirus software: Install reputable antivirus software and keep it up to date. Antivirus software
can detect and prevent malware infections and other cyber threats.
5.Enable two-factor authentication: Two-factor authentication adds an extra layer of security by
requiring a second form of identification, such as a code sent to your phone, in addition to your password.
6.Backup your data: Regularly back up your important data to an external hard drive or cloud storage
service. This can help protect against data loss due to a cyber-attack or other disaster.
7.Educate yourself and your employees: Stay informed about the latest cyber threats and educate
yourself and your employees about best practices for cybersecurity, such as avoiding suspicious emails and
links, using strong passwords, and keeping software up to date.
CYBERCRIMES LAWS 9

• In India, the primary law governing cybercrime is the Information Technology Act, 2000 (IT Act). This
law was amended in 2008 to specifically address cybercrime and provide more comprehensive
provisions for cybercrime-related offenses. Here are some of the key provisions of the IT Act relating to
cybercrime.
• Unauthorized access to computer systems or networks – section 66 of the IT Act.
• Theft of data or information - Section 43(a) of the IT Act.
• Publishing or transmitting obscene material - Section 67 of the IT Act.
• Identity theft - Section 66C of the IT Act.
• Cyberstalking - Section 66E of the IT Act.
• Cyber terrorism - Section 66F of the IT Act.
CYBERSECURITY AWARENESS 10

1.Password security: Use strong and unique passwords or passphrases for all accounts, and avoid
reusing passwords. Enable two-factor authentication whenever possible.
2.Phishing: Be aware of phishing scams and never click on links or download attachments from
unknown sources. Verify the legitimacy of emails before responding or providing any sensitive
information.
3.Malware: Protect devices and networks from malware by installing reputable antivirus software
and keeping all software up to date.
4.Public Wi-Fi: Avoid using public Wi-Fi for sensitive activities, such as online banking or shopping.
If necessary, use a virtual private network (VPN) to encrypt your connection.
5.Social media: Be cautious about what personal information is shared on social media, and avoid
accepting friend requests or messages from unknown users.
6.Data backups: Regularly back up important data to an external hard drive or cloud storage service
to protect against data loss due to cyber attacks or other disasters.
7.Mobile device security: Protect mobile devices with passcodes or biometric authentication and
keep software up to date. Avoid downloading apps from unknown sources.
8.Cybersecurity policies and procedures: Organizations should have clear and comprehensive
cybersecurity policies and procedures in place to protect their networks, data, and employees from
cyber threats.
CATEGORIES OF CYBERCRIME 11

Data modification is a type of cybercrime that involves unauthorized access and modification of
electronic data or computer programs. In this type of cybercrime, an individual or a group of individuals
gain unauthorized access to a computer system or network and then modify, delete, or alter electronic data
or computer programs.

Data theft is a type of cybercrime that involves the unauthorized acquisition of sensitive or confidential
electronic data. In this type of cybercrime, an individual or a group of individuals gain unauthorized access
to a computer system or network and then steal electronic data, such as personal information, financial
records, intellectual property, or other sensitive information.

Network sabotage is a type of cybercrime that involves the intentional disruption or damage of
computer networks or systems. In this type of cybercrime, an individual or a group of individuals gain
unauthorized access to a computer system or network and then intentionally cause damage or disruption,
such as deleting data, installing malware, or shutting down network services.
WHY YOU SHOULD WORRY? 12

• Network sabotage is a type of • Online gaming has become very


cybercrime that involves the popular among young people, and
intentional disruption or damage of cybercriminals have started targeting
computer networks or systems. In this gamers to steal personal information,
type of cybercrime, an individual or a install malware, and extort money.
group of individuals gain unauthorized
• Youth who are not aware of the
access to a computer system or
consequences of cybercrime may
network and then intentionally cause
engage in online activities that could
damage or disruption, such as deleting
result in criminal records, limiting
data, installing malware, or shutting
their future career prospects.
down network services.
• Lack of Awareness can affect Many
young people who are not aware of the
potential dangers of cybercrime and
how to protect themselves online. This
lack of awareness can make them easy
targets for cybercriminals.
• Cyberbullying is a prevalent form of
cybercrime that affects many young
people. Cyberbullying can have serious
consequences, including depression,
anxiety, and even suicide.
CYBERCRIME
13

IMPACT OF CYBERCRIME
Crime as a bad social factor Since crimeless culture is a fallacy, crime is an all-pervading phenomenon, and a non-
separable element in societal life, the query "Why is there so much crime ado?" is irritating. There is nothing fresh
about criminality as one of the characteristics of every society that has been present to date, be it civilized or
undeveloped, and is one of the fundamental impulses of human behaviors. It is uncivilized and omnipresent and there
is no new thing about crime. However, the social anxiety over the high crime rates should be taken into account not
because of its origin but because of the potential disturbances that it causes to society. Moreover, several people are
specifically victims of violence. Anything that has a meaning may be lost to the survivor. Security, harmony, money,
and property can be fundamental virtues since they can satisfy several wishes. Cyber crime's effect on social and
environmental policy riders Crime is a complex and relative phenomenon conceptually and subject to relative socio-
political and economical shifts in current societal systems. As a result, no systematic understanding of all forms of
'crime' is available at any given period or can be applied to a single definition in any culture. It is affected by the
variations in the associated phenomena and value framework generated by these shifts with their dynamicity. A
definite increase in corruption-based crimes, in which societal moralization is small and the commission of a crime is
undermined by less social shame, is seen as obvious in today’s situation, where money is more important than ideals.
Economic crime is, however, at its height. This shows directly the crime interdepends on other societal phenomena,
economic processes, and political machines. Demographic is also one of the main variables that affect the impact of
crimes.
CYBER LAW OF INDIA ENCOMPASSES LAWS
RELATING TO:-

 CYBER CRIME
 ELECTRONIC AND DIGITAL SIGNATURE
 INTELLECTUAL PROPERTY
 DATA PROTECTION AND PRIVACY
CYBERCRIME
15

THREE MAJOR CATEGORIES

CYBERCRIME AGAINST CYBERCRIME AGAINST CYBERCRIME AGAINST


PERSON PROPERTY GOVERNMENT
• CYBER CRIME AGAINST • THESE CRIMES INCLUDE: • THIS CRIME MANIFESTS
PERSON INCLUDES • COMPUTER VANDALISM ITSELF INTO
(DESTRUCTION OF OTHER’S
VARIOUS CRIME LIKE TERRORISM WHEN AN
PROPERTY
TRANSMISSION OF •
INDIVIDUAL "CRACKS"
TRANSMISSION OF HARMFUL
CHILD, PORNOGRAPHY, PROGRAMMES INTO A GOVERNMENT
HARASSMENT OF ANY • SIPHONING OF FUNDS FROM OR MILITARY-
ONE WITH THE USE OF FINANCIAL INSTITUTION MAINTAINED WEBSITE.
COMPUTER SUCH AS E- • STEALING SECRET
MAIL. INFORMATION AND DATA
IT ACT 2000
 INFORMATION TECHNOLOGY ACT
CONSISTED OF 94 SECTIONS
SEGREGATED INTO 13 CHAPTERS.

 FOUR SCHEDULE FORM PART OF THE


ACT.

 CAME INTO EXISTENCE ON OCTOBER 17,


2000.

 INDIA IS THE 12TH NATION IN THE


WORLD TO ENACT A CYBER LAW.
CYBERCRIME
17

NEED AND IMPORTANCE OF


CYBER LAW
•TACKLING CYBERCRIME
•SUCCESSFUL AND SMOOTH FUNCTIONING OF E-
COMMERCE AND VIRTUAL COMMUNICATION
•NO JURISDICTIONAL BOUNDARIES
•INCREASING USE OF MOBILE BANKING AND
INTERNET BANKING
•CLOUD COMPUTING IS PROVING TO BE A MAJOR
THREAT
•ECONOMIC EFFICIENCY
CYBERCRIME
18

SAFETY METHODS FOR CYBERCRIME

RECOGNIZE REPORT CYBER AWARE OF THE KEEP THE STRONG


THE FACT THAT CRIME PEOPLE CHECK ON PASSWORDS
CYBER CRIME HOWEVER BIG AROUND YOU WEBSITES YOU ARE THE KEY
EXIST. OR SMALL IT IS. ABOUT CYBER USE. TO BEING SAFE
CRIMES. FROM CYBER
CRIMES.
CYBERCRIME 19

CONCLUSION
Cybercrime is a significant and growing threat in the digital age. Cybercriminals use sophisticated methods and
techniques to steal sensitive information, disrupt computer systems and networks, and cause harm to individuals
and organizations.
The consequences of cybercrime can be severe, including financial loss, reputational damage, legal consequences,
and even threats to national security. Therefore, it is essential to understand the types of cybercrime and take steps
to protect against them.
To protect against cybercrime, individuals and organizations must adopt proactive measures such as using strong
passwords, keeping software up-to-date, and implementing security software. Education and awareness programs
can also play a vital role in making people more aware of the risks and dangers of cybercrime.
Moreover, international cooperation is essential to combat cybercrime effectively. Cybercriminals operate across
borders, and it is essential for law enforcement agencies to collaborate and share information to catch and prosecute
offenders.
In conclusion, cybercrime is a complex and constantly evolving threat that affects us all. By understanding the types
of cybercrime, taking proactive measures to protect against it, and promoting international cooperation, we can help
to prevent cybercrime and its negative consequences. It is essential to be vigilant, informed, and proactive in the
fight against cybercrime to create a safer and more secure digital environment.
THANK YOU

Chehak Chadha - 87006 61014

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy