logging in or signing up cyber crime and cyber security amrit12661 Download Post to : URL : Related Presentations : Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Uploaded from authorPOINT lite Insert YouTube videos in PowerPont slides with aS Desktop Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 7456 Category: Science & Tech.. License: All Rights Reserved Like it (10) Dislike it (1) Added: May 15, 2010 This Presentation is Public Favorites: 12 Presentation Description No description available. Comments Posting comment... By: abhishekgupta35168780 (1 month(s) ago) please send me the ppt. I need to make a presentation on cyber security. and I think this might be helpful. firstname.lastname@example.org Saving..... Post Reply Close Saving..... Edit Comment Close By: sumitp567 (15 month(s) ago) hi plzzzzzzz send this ppt to me at email@example.com Saving..... Post Reply Close Saving..... Edit Comment Close By: rockermt52 (26 month(s) ago) plz send me this ppt on firstname.lastname@example.org Saving..... Post Reply Close Saving..... Edit Comment Close By: authorsu123 (27 month(s) ago) hi ,this is good.plz sent me this on email@example.com Saving..... Post Reply Close Saving..... Edit Comment Close By: DonikaPatel (31 month(s) ago) Hi!! hello there !!! Its very coolll ppt!! Can u please send it to me at firstname.lastname@example.org please!!!!!!!!!!!!!!! :) Saving..... Post Reply Close Saving..... Edit Comment Close loading.... See all Premium member Presentation Transcript CYBER-SECURITY : CYBER-SECURITY Slide 2: WHAT DOES CYBER MEANS? WHA T DOES SECURITY MEANS? Slide 3: WHAT IS INTERNET????????????? Cyber Crimes : Cyber Crimes HISTORY OF CYBER CRIME : HISTORY OF CYBER CRIME The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage We can categorize Cyber crimes in two ways : We can categorize Cyber crimes in two ways The Computer as a Target :-using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc The computer as a weapon :-using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.Cyber Crime regulated by Cyber Laws or Internet Laws. 1.HACKING : 1.HACKING Hacking in simple terms means an illegal intrusion into a computer system and/or network. It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage Motive Behind The Crimecalled HACKING : Motive Behind The Crimecalled HACKING Greed Power Publicity Revenge Adventure Desire to access forbidden information Destructive mindset Wants to sell n/w security services 2.CHILD PORNOGRAPHY : 2.CHILD PORNOGRAPHY The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. . As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles How do they Operate : How do they Operate Pedophiles use false identity to trap the children/teenagers Pedophiles contact children/teens in various chat rooms which are used by children/teen to interact with other children/teen Befriend the child/teen. Extract personal information from the child/teen by winning his confidence. Gets the e-mail address of the child/teen and starts making contacts on the victimâ€™s e-mail address as well. Starts sending pornographic images/text to the victim including child pornographic images in order to help child/teen shed his inhibitions so that a feeling is created in the mind of the victim that what is being fed to him is normal and that everybody does it. Extract personal information from child/teen At the end of it, the pedophile set up a meeting with the child/teen out of the house and then drag him into the net to further sexually assault him or to use him as a sex object 3.DENIAL OF SERVICE ATTACK : 3.DENIAL OF SERVICE ATTACK This is an act by the criminal, who floods the bandwidth of the victimâ€™s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide . Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCp/IP protocols. 4.VIRUS DISSEMINITION : 4.VIRUS DISSEMINITION Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious 5.SOFTWARE PIRACY : 5.SOFTWARE PIRACY Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. CYBERCRIMES THREATENS NATIONAL SECURITY IN “INDIA” : CYBERCRIMES THREATENS NATIONAL SECURITY IN “INDIA” Slide 16: Ex.Union Home Minister Shivraj Patil said that the rising level of cyber crime is an indication of an enormous threat to national security. In today’s age when everything from, small gadgets to nuclear plants is being operated through computers, cyber crime has assumed threatening ramifications. cyber crimes are capable of breaching the security in the information systems of vital installations. on Google’s social networking site, Orkut, have been perplexing authorities. Fan clubs of underworld dons like Dawood Ibrahim and Chota Shakeel and other wanted underworld dons are also doing the rounds on Orkut. There is huge potential for damage to national security through cyber attacks. The internet is a means for money laundering and funding terrorist attacks in an organized manner. F.A.q.s releted to cyber crime : F.A.q.s releted to cyber crime What are e-mail headers? How to extract e-mail headers? What is an I.P. Address? What information is required to lodge a complaint? What are the basic precautions I should take while accessing the Internet? As a parent, what should I do to ensure that my child does not access objectionable websites? What are the different kinds of online scams, and what should the public do to avoid falling prey to them? Cyber crime has become a big menace. What is the most common one among these, and how can I keep myself from becoming a victim? Are people actually coming forward to lodge complaints? CYBER-SECURITY : CYBER-SECURITY Slide 20: 1.What is cyber security? A method to avoid any sort of descripencies in the proper functioning of any task in the desired direction developed through internet and cyber world Slide 21: 2.What are the risks? Drug trafficking Extortion Money laundry Cricket bookee Terroristic activities(26/11 in india,and 9/11 in USA) Slide 22: 3.What can we do? Cordeal relation and awarnes Proper implimentation of IT act 2000 Media should come up All the govt. and private firms shold take initiatives More laws should be discussed and passed in parliament Slide 24: Cybersecurity in India: An Ignored World Slide 26: India is on the verge of a technology revolution and the driving force behind the same is the acceptance and adoption of Information and Communication Technology (ICT) and its benefits. This technology revolution may, however, fail to bring the desired and much needed result if we do not adopt a sound and country oriented e-governance policy I. Introduction1.it is a double edge sword2.benign or vice intentionII. Cyber Forensics1.it finds out the loopholes in the adopted method2.has given new dimension to criminals laws specially the evidence lawIII. The need of Cyber Forensics1.traditional methods are inadequate(india is 12th country to have its own cyber laws)2.changing face of crime and criminals(use of internet as the platform for illegal activities)IV. Conclusion1.use of ICT can’t be ignored in todays progressive world hence cyber forensic not only help in preventive but also curative : I. Introduction1.it is a double edge sword2.benign or vice intentionII. Cyber Forensics1.it finds out the loopholes in the adopted method2.has given new dimension to criminals laws specially the evidence lawIII. The need of Cyber Forensics1.traditional methods are inadequate(india is 12th country to have its own cyber laws)2.changing face of crime and criminals(use of internet as the platform for illegal activities)IV. Conclusion1.use of ICT can’t be ignored in todays progressive world hence cyber forensic not only help in preventive but also curative CYBER LAW OF INDIA : CYBER LAW OF INDIA Slide 29: In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool or a target or both . The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000. THANK-YOU : THANK-YOU Presented by: AMRIT RAJ RANJAN & RAJEEV RANJAN KUMAR Supported by: Ashish Ranjan Manish Kumar Ruchi Rani & Saumya Hemant You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.