CYBER CRIME SOFT COPY

Views:
 
     
 

Presentation Description

No description available.

Comments

By: gsnagendra (116 month(s) ago)

NICE

By: YOBOY (121 month(s) ago)

nice one.

By: calijeffreena (122 month(s) ago)

send ur id angelen

By: shubhamchan (123 month(s) ago)

hey nice prwsentation

By: jiten_nigam (127 month(s) ago)

hi i m karan ...i like this presentation ..it's very helpful for me ..plz send it to my id karannigam482@gmail.com thanks...

See all

Presentation Transcript

Slide 1: 

PRESENTED BY Cali Jeffreena and Swetha II BSc.Computer Technology Sri Krishna Arts and Science College CYBER CRIME

Slide 2: 

Criminal activity involving Information technology infrastructure Illegal access Data interference Misuse of devices Forgery and Electronic fraud.

Slide 3: 

Capacity to store data in small space Easy to access Complex Negligence Loss of evidence REASONS FOR CYBER CRIME

Slide 4: 

Children and adolescents between the age group of 6 – 18 years Organised hackers Professional hackers / crackers Discontented employees Cyber Criminals

Slide 5: 

Unauthorized access to computer systems or networks / Hacking Theft of information contained in electronic form Email bombing Data diddling Salami attacks Denial of Service attack Virus / worm attacks Logic bombs Trojan attacks Internet time thefts Web jacking Modes and Manners of Cyber Crime

CLASSIFICATION : 

CLASSIFICATION Against Individuals  Against Individual Property Against Organization Against Society at large

Slide 7: 

Harassment via e-mails. Cyber-stalking. Dissemination of obscene material. Defamation. Unauthorized control/access over computer system. Indecent exposure Email spoofing Cheating & Fraud Against Individuals

Slide 8: 

Computer vandalism. Transmitting virus. Unauthorized control/access over computer system. Intellectual Property crimes Internet time thefts Against Individual Property

Slide 10: 

Unauthorized control/access over computer system Possession of unauthorized information. Cyber terrorism against the government organization. Distribution of pirated software etc. Against Organization

Slide 11: 

Pornography (basically child pornography).  Polluting the youth through indecent exposure.  Trafficking Financial crimes Sale of illegal articles Online gambling Forgery Against Society at large

Slide 14: 

STATUTORY PROVISONS

Slide 15: 

The hurry in which the legislation was passed, without sufficient public debate, did not  really serve the desired purpose Cyber laws, in their very preamble and aim, state that they are targeted at aiding e-commerce, and are not meant to regulate cybercrime Cyber torts Cyber crime in the Act is neither comprehensive nor exhaustive Ambiguity in the definitions Uniform law Lack of awareness Jurisdiction issues Extra territorial application Raising a cyber army Hesitation to report offences ANALYSIS OF THE STATUTORY PROVISONS

HOW TO DEAL WITH THIS PROBLEM : 

HOW TO DEAL WITH THIS PROBLEM International Agreements and Cooperation –Essential due to the Worldwide Nature of the Internet Software and Hardware defenses (e.g., antispam, antivirus software, firewalls) Other practical steps….

PRACTICAL STEPS FOR PREVENTION OF CYBERCRIME : 

PRACTICAL STEPS FOR PREVENTION OF CYBERCRIME Avoid disclosing any information pertaining to oneself. Avoid sending any photograph online particularly to strangers. Use latest and up date anti virus software. Keep back up volumes. Never send your credit card number to any site that is not secured. Use of firewalls may be beneficial.

CONCLUSION : 

CONCLUSION The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime.

authorStream Live Help