SlideShare a Scribd company logo
• Rubber Technology
• Semester :- 5th
• Cyber Security
• Topic :- Cyber Crime & Law
Group 4
Name Enrollment No.
 Ravi Bhikhadiya 140280126001
 Akshay Kavar 140280126007
 Nilesh Dudhat 140280126014
 Dhruvik Pipaliya 140280126017
 Ravikumar Sardhara 140280126022
 Chirag Zalawadiya 140280126029
Cyber Crime & its Law
 Introduction (Cyber Crime)
 Types of Cyber Crime
 Hacking
 Malware
 Cyber Space
 Digital Forensics
 Cyber Security
 Cyber Law (IT Act)
Cyber Crime
 Cyber crime (Computer Crime) is a crime that involves
a computer and a network.
 The computer may have been used in the commission
of a crime, or it may be the target.
Cyber crime & law
Cyber crime is an activity
done using computers and
internet. We can say that it
is an unlawful acts wherein
the computer either a tool
or target or both.
Types of Cyber Crime
 Cyber crimes can be basically divided into 3 major
categories:
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government.
1. Cyber Crimes against Persons
 Cybercrimes committed against persons include
various crimes like transmission of child pornography,
Harassment of any one with the use of a computer,
message, e-mails etc…
 Harassment can be racial, religious, or other.
2. Cyber Crimes against property
These crimes include
 Computer vandalism (destruction of others' property),
 Transmission of harmful programs,
 Unauthorized trespassing through cyber space,
 Unauthorized possession of computer information.
3. Cyber Crimes against
government
 Cyber terrorism is one distinct kind of crime in this
category.
 The growth of internet has shown that the medium of
Cyberspace is being used by individuals and groups to
threaten the international governments as also to
terrorize the citizens of a country.
Modification of a conventional crime by
using computers.
 Financial crimes
 Cyber pornography
 Sale of illegal articles
 Online gambling
 Email spoofing
 Virus / worm attacks
 Logic bombs
 Trojan attacks
 Theft of computer system
Hacking
 The Process of attempting to gain or successfully
gaining, unauthorized access to computer or technical
resources is called Hacking.
 In the computer security context, a hacker is
someone who seeks and exploits weaknesses in a
computer system or computer network.
 The term hacker is reclaimed by computer
programmers who argue that someone breaking into
computers is better called a cracker.
Malware
 Malware, short for malicious (or malevolent) software,
is software used or programmed by attackers to disrupt
computer operation, gather sensitive information, or
gain access to private computer systems.
 It can appear in the form of code, scripts, active
content, and other software.
 Malware' is a general term used to refer to a variety of
forms of hostile or intrusive software
Denial-of-service attack (DoS attack)
In computing, a denial-of-service attack (DoS attack) or
distributed denial-of-service attack (DDoS attack) is an
attempt to make a machine or network resource
unavailable to its intended users.
Although the means to carry out, motives for, and
targets of a DoS attack may vary,
It generally consists of the efforts of one or more people
to temporarily or indefinitely interrupt or suspend
services of a host connected to the Internet.
Cyber Space
 Cyberspace is "the notional environment in which
communication over computer networks occurs.“
 The word became popular in the 1990s when the
uses of the Internet, networking, and digital
communication were all growing dramatically and
the term "cyberspace" was able to represent the
many new ideas and phenomena that were
emerging.
 Cyberspace is a domain characterized by the use of
electronics and the electromagnetic spectrum to
store, modify, and exchange data via networked
systems.
Threats in Cyberspace
1. Hacktivism
2. Cybercrime
3. Cyberespionage
4. Cyberwar
5. Cyberterrorism
 Digital Forensics is the preservation,
identification, extraction, interpretation and
documentation of computer evidence which can
be used in the court of law.
 Branches of Digital Forensics include:
 Network Forensics
 Firewall Forensics
 Database Forensics
 Mobile Device forensics
 Digital Forensics help to protect from and solve
cases involving:
 Theft of intellectual property
Financial Fraud
Distribution and execution of viruses and worms
Hacker system penetration
Cyber crime & law
Cyber Security
 Cyber Security involves protection of sensitive
personal and business information through
prevention, detection and response to different online
attacks.
 Cyber security actually preventing the attacks, cyber
world.
 Privacy Policy :
Before submitting your name , e-mail , address, on a
website look for the sites privacy policy.
 Keep Software Up to Date:
If the seller reduces patches for the software operating
system your device ,install them as soon as possible
.Installing them will prevent attackers form being able to
take advantage. Do not choose option that allows your
computer to remember your passwords.
 DISABLE REMOTE CONNECTIVITY :
Some PDA’s and phones are equipped with wireless
technologies, such as Bluetooth, that can be used to
connect to other devices or computers. You should
disable these features when they are not in use.
Cybersecurity is a young field.Cyber security is a highly educated and aging field.
Advantages of CYBER SECURITY
 The cyber security will defend us from critical attacks.
 It helps us to browse the site, website.
 Internet Security process all the incoming and
outgoing data on your computer.
 It will defend us from hacks and virus.
 Application of cyber security used in our PC needs
update every week
Safety Tips for CYBER CRIME
 Use antivirus Software
 Insert Firewalls
 Uninstall unnecessary software
 Maintain backup
 Check security settings
Cyber Law of India (IT Act 2000)
 Cyber crime can involve criminal activities that are
traditional in nature, such as theft, fraud, deformation
and mischief, all of which are subjected to the India
Penal code.
 In simple way we can say that cyber crime is unlawful
acts where in the computer is either a tool or both.
 The abuse of computer has also given birth of new age
crime that are addressed by the Information
Technology Act, 2000.
CONCLUSION
 Cybercrime is indeed getting the recognition it
deserves.
 However, it is not going to restricted that easily .
 In fact , it is highly likely that cyber crime and its
hackers will continue developing and upgrading to
stay ahead of the law.
 So, to make us a safer we must need cyber security.
We are currently in a talent shortaThere is a talent shortage.
THANK YOU.

More Related Content

PPTX
PPTX
Cyber crime ppt
PPTX
cyber crime
PPTX
PPT
Cyber crime & security final tapan
PPTX
Cyber crime
PPTX
Cybercrime a growing threat of 21 st century !!!
PPTX
cyber crime
Cyber crime ppt
cyber crime
Cyber crime & security final tapan
Cyber crime
Cybercrime a growing threat of 21 st century !!!
cyber crime

What's hot (20)

PPTX
Cyber Crime
PPTX
CYBER CRIME( DU PRESENTATION FOR FYUP)
PPT
Cyber Crime
PPTX
Introduction to cybercrime
PPT
Cyber crime in the digital age
PPTX
Cyber crime - What is and types.
PPTX
It act and cyber crime
PPTX
Cyber crime.ppt
PPT
CYBER CRIME
PPTX
Cyber crime-140128140443-phpapp02 (1)
PPTX
Cyber Crime
PPT
CYBERCRIMES AND DUE DILIGENCE
PPTX
Cyber crime.pptx
PPTX
Final cyber crime and security
PPTX
Cyber security and privacy
PPTX
CyberCrimes
PPT
cyber crime and privacy issues by varun call for assistence 8003498888
PPT
Cybercrime the emerging threat
PPTX
Cyber crime ✔
ODP
Cyber crime
Cyber Crime
CYBER CRIME( DU PRESENTATION FOR FYUP)
Cyber Crime
Introduction to cybercrime
Cyber crime in the digital age
Cyber crime - What is and types.
It act and cyber crime
Cyber crime.ppt
CYBER CRIME
Cyber crime-140128140443-phpapp02 (1)
Cyber Crime
CYBERCRIMES AND DUE DILIGENCE
Cyber crime.pptx
Final cyber crime and security
Cyber security and privacy
CyberCrimes
cyber crime and privacy issues by varun call for assistence 8003498888
Cybercrime the emerging threat
Cyber crime ✔
Cyber crime
Ad

Viewers also liked (20)

PPTX
Cyber-crime PPT
PPTX
cyber crime & cyber law
PPTX
Cybercrime.ppt
PPTX
Cyber crime and security ppt
PDF
Cyber crime
PPT
Seminar on Cyber Crime
PPTX
Cyber Crime And Security
PPTX
Cyber security presentation
PPTX
CYBER CRIME
PDF
wireless communication
PPT
PPTX
Cyber crime
PPTX
Asis Verma cyber crime ppt
DOC
Assignment of cyber crimes for oumh1203
DOCX
PPSX
Cyber crime and cyber security
PDF
Cyberlaw and Cybercrime
PDF
Construct a Lean Content Marketing Machine in 7 Steps
PDF
Cyber crime
PPT
History and future cybercrime
Cyber-crime PPT
cyber crime & cyber law
Cybercrime.ppt
Cyber crime and security ppt
Cyber crime
Seminar on Cyber Crime
Cyber Crime And Security
Cyber security presentation
CYBER CRIME
wireless communication
Cyber crime
Asis Verma cyber crime ppt
Assignment of cyber crimes for oumh1203
Cyber crime and cyber security
Cyberlaw and Cybercrime
Construct a Lean Content Marketing Machine in 7 Steps
Cyber crime
History and future cybercrime
Ad

Similar to Cyber crime & law (20)

PPTX
Cyber crime ppt
PPTX
CYBER CRIME - A Threat To Internet Users
PDF
cybercrime-131020055545-phpapp02.pdf
PPTX
Cybercrime 131020055545-phpapp02
PPTX
Cybercrime 131020055545-phpapp02
PPT
Cyber crime and forensic
PPTX
computer security and its relationship to computer forensic
PPTX
Cyber crime
PPTX
cyber security and its importance .pptx
PPTX
cyber crime
DOCX
Research paper on cyber security.
PPTX
Cyber crime and Security
PDF
Cyber Crime and Security ppt by Neeraj Ahirwar
PDF
Cyber Security
PPTX
Cyber crimes and its security
PPTX
Cyber crimes and its security
PPTX
Cyber crime perspective, definition types, various forms of cyber crime
PPTX
Cyber crime and security
PDF
Module 1 Introduction to cryptography...
PPTX
Cyber crime
Cyber crime ppt
CYBER CRIME - A Threat To Internet Users
cybercrime-131020055545-phpapp02.pdf
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
Cyber crime and forensic
computer security and its relationship to computer forensic
Cyber crime
cyber security and its importance .pptx
cyber crime
Research paper on cyber security.
Cyber crime and Security
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Security
Cyber crimes and its security
Cyber crimes and its security
Cyber crime perspective, definition types, various forms of cyber crime
Cyber crime and security
Module 1 Introduction to cryptography...
Cyber crime

Recently uploaded (20)

PPTX
Digital Literacy And Online Safety on internet
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPTX
ppt for upby gurvinder singh padamload.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
ENCOR_Chapter_10 - OSPFv3 Attribution.pptx
PPTX
innovation process that make everything different.pptx
PPTX
Introduction to Information and Communication Technology
DOCX
Unit-3 cyber security network security of internet system
PPTX
Internet___Basics___Styled_ presentation
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
PPTX
CSharp_Syntax_Basics.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxx
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Behind the Smile Unmasking Ken Childs and the Quiet Trail of Deceit Left in H...
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
www-codemechsolutions-com-whatwedo-cloud-application-migration-services.pdf
Digital Literacy And Online Safety on internet
Paper PDF World Game (s) Great Redesign.pdf
Triggering QUIC, presented by Geoff Huston at IETF 123
QR Codes Qr codecodecodecodecocodedecodecode
ppt for upby gurvinder singh padamload.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
ENCOR_Chapter_10 - OSPFv3 Attribution.pptx
innovation process that make everything different.pptx
Introduction to Information and Communication Technology
Unit-3 cyber security network security of internet system
Internet___Basics___Styled_ presentation
WebRTC in SignalWire - troubleshooting media negotiation
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
CSharp_Syntax_Basics.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxx
The Internet -By the Numbers, Sri Lanka Edition
Behind the Smile Unmasking Ken Childs and the Quiet Trail of Deceit Left in H...
Decoding a Decade: 10 Years of Applied CTI Discipline
An introduction to the IFRS (ISSB) Stndards.pdf
international classification of diseases ICD-10 review PPT.pptx
www-codemechsolutions-com-whatwedo-cloud-application-migration-services.pdf

Cyber crime & law

  • 1. • Rubber Technology • Semester :- 5th • Cyber Security • Topic :- Cyber Crime & Law
  • 2. Group 4 Name Enrollment No.  Ravi Bhikhadiya 140280126001  Akshay Kavar 140280126007  Nilesh Dudhat 140280126014  Dhruvik Pipaliya 140280126017  Ravikumar Sardhara 140280126022  Chirag Zalawadiya 140280126029
  • 3. Cyber Crime & its Law  Introduction (Cyber Crime)  Types of Cyber Crime  Hacking  Malware  Cyber Space  Digital Forensics  Cyber Security  Cyber Law (IT Act)
  • 4. Cyber Crime  Cyber crime (Computer Crime) is a crime that involves a computer and a network.  The computer may have been used in the commission of a crime, or it may be the target.
  • 6. Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 7. Types of Cyber Crime  Cyber crimes can be basically divided into 3 major categories: 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government.
  • 8. 1. Cyber Crimes against Persons  Cybercrimes committed against persons include various crimes like transmission of child pornography, Harassment of any one with the use of a computer, message, e-mails etc…  Harassment can be racial, religious, or other.
  • 9. 2. Cyber Crimes against property These crimes include  Computer vandalism (destruction of others' property),  Transmission of harmful programs,  Unauthorized trespassing through cyber space,  Unauthorized possession of computer information.
  • 10. 3. Cyber Crimes against government  Cyber terrorism is one distinct kind of crime in this category.  The growth of internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.
  • 11. Modification of a conventional crime by using computers.  Financial crimes  Cyber pornography  Sale of illegal articles  Online gambling  Email spoofing  Virus / worm attacks  Logic bombs  Trojan attacks  Theft of computer system
  • 12. Hacking  The Process of attempting to gain or successfully gaining, unauthorized access to computer or technical resources is called Hacking.  In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.  The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
  • 13. Malware  Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.  It can appear in the form of code, scripts, active content, and other software.  Malware' is a general term used to refer to a variety of forms of hostile or intrusive software
  • 14. Denial-of-service attack (DoS attack) In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, It generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
  • 15. Cyber Space  Cyberspace is "the notional environment in which communication over computer networks occurs.“  The word became popular in the 1990s when the uses of the Internet, networking, and digital communication were all growing dramatically and the term "cyberspace" was able to represent the many new ideas and phenomena that were emerging.  Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems.
  • 16. Threats in Cyberspace 1. Hacktivism 2. Cybercrime 3. Cyberespionage 4. Cyberwar 5. Cyberterrorism
  • 17.  Digital Forensics is the preservation, identification, extraction, interpretation and documentation of computer evidence which can be used in the court of law.  Branches of Digital Forensics include:  Network Forensics  Firewall Forensics  Database Forensics  Mobile Device forensics
  • 18.  Digital Forensics help to protect from and solve cases involving:  Theft of intellectual property Financial Fraud Distribution and execution of viruses and worms Hacker system penetration
  • 20. Cyber Security  Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks.  Cyber security actually preventing the attacks, cyber world.
  • 21.  Privacy Policy : Before submitting your name , e-mail , address, on a website look for the sites privacy policy.  Keep Software Up to Date: If the seller reduces patches for the software operating system your device ,install them as soon as possible .Installing them will prevent attackers form being able to take advantage. Do not choose option that allows your computer to remember your passwords.  DISABLE REMOTE CONNECTIVITY : Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use.
  • 22. Cybersecurity is a young field.Cyber security is a highly educated and aging field.
  • 23. Advantages of CYBER SECURITY  The cyber security will defend us from critical attacks.  It helps us to browse the site, website.  Internet Security process all the incoming and outgoing data on your computer.  It will defend us from hacks and virus.  Application of cyber security used in our PC needs update every week
  • 24. Safety Tips for CYBER CRIME  Use antivirus Software  Insert Firewalls  Uninstall unnecessary software  Maintain backup  Check security settings
  • 25. Cyber Law of India (IT Act 2000)  Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code.  In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both.  The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act, 2000.
  • 26. CONCLUSION  Cybercrime is indeed getting the recognition it deserves.  However, it is not going to restricted that easily .  In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law.  So, to make us a safer we must need cyber security.
  • 27. We are currently in a talent shortaThere is a talent shortage.

Editor's Notes

  • #18: Digital Forensics is the preservation, identification, extraction, interpretation and documentation of computer evidence which can be used in the court of law.