This document discusses cyber safety and cyber crimes. It begins by introducing the objectives of educating students about safe internet use and cyber crimes. It then describes how people are connected to the cyber world through social media, banking, shopping, and browsing online. Several types of cyber crimes are outlined, including those committed against individuals, property, and government. Specific cyber crimes like hacking, child pornography, viruses, and software piracy are defined. The document concludes by offering tips for internet safety like using antivirus software, firewalls, and being anonymous online.
Cyber crime involves using computers or networks to commit crimes like identity theft, hacking, or spreading viruses. The document discusses definitions of cyber crimes according to Nepali law and examples like hacking, child pornography, and phishing. It provides tips for internet security including using antivirus software, firewalls, and being cautious of emails or websites from unknown sources. Nepal has laws and organizations in place to address cyber crimes and improve cyber security in the country.
Cyber crime refers to criminal acts involving computers and networks. The document discusses various types of cyber crimes such as hacking, phishing, and cyber stalking. It outlines categories of cyber crimes including those against persons, property, and government. The document also provides details on cyber criminals, precautions to prevent cyber crime, and the advantages and disadvantages of cyber space.
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
This document discusses cyber crimes and privacy issues. It begins by defining cyber crime and categorizing it into crimes using computers as targets and as weapons. It then discusses common cyber criminals and various modes of cyber crimes like unauthorized access, hacking, Trojan attacks, and email bombing. The document also categorizes cyber crimes against persons, individual property, and governments. It provides examples like cyber stalking, email spoofing, computer vandalism, and cyber terrorism. The document concludes by discussing how to protect against cyber crimes through software updates, passwords, antivirus software, firewalls, and being cautious of suspicious emails and websites.
Short Presentation On Cyber Crime And Security which includes Cyber crime introduction and types , Hacking and its types, different Threats , and in last Prevention for Hacks and Threats.
The document provides an overview of cybercrime, including its history, types, and how to protect against it. It discusses how the internet has led to new opportunities but also new crimes like identity theft. Various types of cybercrime are outlined such as hacking, phishing, and cyberbullying. The document also discusses cybercrime in Nepal and provides safety tips like using antivirus software and strong passwords. It emphasizes that awareness is key to avoiding becoming a victim of cybercrime.
This document outlines the syllabus for a course on cybercrime. The 5 units cover: 1) an introduction to cybercrime, 2) cyber offenses and tools, 3) phishing and identity theft, 4) computer forensics. Each unit lists learning objectives and topics that will be covered. The course aims to explain cybercrime terms, describe offenses and botnets, illustrate cybercrime tools and methods, and justify the need for computer forensics. The document provides context on defining cybercrime, types of cybercriminals and their motives, and classifications of cybercrimes.
This document discusses cybercrime, including what it is, why we should be aware of it, and how to protect ourselves. It defines cybercrime as illegal activities involving computers and networks, such as hacking, viruses, and identity theft. The document outlines different types of cybercrimes and their impacts, describing how financial losses from data breaches are rising. It also discusses Indian laws related to cybercrime and provides tips for security measures like using strong, unique passwords and updating software. The document concludes by emphasizing the importance of awareness in protecting oneself from cybercrime.
This document provides an introduction to cybercrime, including definitions of key terms, classifications of cybercrimes, and descriptions of common cybercrime activities. It defines cybercrime as illegal activities that target computer systems and data. Cybercrimes are categorized as those against individuals, property, organizations, and society. Examples include phishing, spamming, hacking, software piracy, and cyberterrorism. Cybercriminals are also classified as those seeking recognition, financial gain, or insider revenge.
Cyber crime involves unlawful acts where computers are used as tools or targets. Some common cyber crimes include illegal access of systems, data interference, fraud, and denial of service attacks. Early instances of cyber crimes include the first spam email in 1978 and first computer virus in 1982. Cyber crimes can be committed through hacking, virus/worm attacks, email spoofing, spamming, and web jacking. Protecting against cyber crimes requires keeping software updated, using strong passwords, backing up data, and educating users about secure practices.
This document discusses cybercrime, including its history, types, causes, categories, and impact on national security. It begins by defining cybercrime as criminal activities carried out through computers or the internet. Some key types discussed are hacking, theft, cyber stalking, and identity theft. The document also outlines categories of cybercrime against individuals, property, and governments. It notes that cybercrime is a growing threat in India and discusses some case studies and laws related to cybercrime in the country. In conclusion, it stresses the importance of educating students about cybercrime and taking precautions online.
This document discusses cyber crime. It defines cyber crime as any illegal criminal activity that uses a computer as a tool, target, or means of perpetrating crime. Cyber crimes can range from security breaches and identity theft to cyber stalking and child exploitation. The document outlines several types of cyber crimes such as hacking, email spoofing, computer vandalism, and cyber terrorism. It also discusses reasons for cyber crimes and how to avoid becoming a victim.
PRESENTATION REPORT ON CYBER CRIME
1. INTRODUCTION
2. DIFFERENT TYPES OF CYBER CRIME
3.THE FIRST NATIONAL CONFERENCE ON NATIONAL CRIME INVESTIGATION AND CRIME FORENSICS
4.CYBER CRIME AWARENESS
5.CYBER SECURITY
6.CONCLUSION
7.FAQ
This document discusses cyber crime and security. It defines cyber crime as illegal activity committed on the internet. It then covers various topics related to cyber crime such as definitions, history, categories and types of cyber crimes including hacking, denial of service attacks and computer vandalism. The document also discusses cyber security and provides safety tips to prevent cyber crime such as using antivirus software and firewalls. It notes that technology alone is not destructive and depends on how people use it.
This document provides an overview of cyber security and cyber crimes. It defines cybercrime as any illegal act involving computers or networks, and outlines several types of cybercrimes including those against individuals, property, society, and organizations. The document also discusses who commits cybercrimes, including hobby hackers, financially motivated hackers, and disgruntled employees. It covers topics such as cyber terrorism, cyberbullying, hacking, and the motivation and classification of different cyber crimes.
Cybercrime is on the rise as more transactions move online. The document discusses several types of cybercrimes such as hacking, computer viruses, software piracy, pornography, credit card fraud, spamming, phishing, spoofing, denial of service attacks, cyber stalking, cyber defamation, threatening, and salami attacks. Victims range from individuals to businesses. The document provides statistics on identity theft and recommends steps people can take to better protect themselves such as using firewalls and antivirus software, being wary of unsolicited emails and files, and not sharing sensitive information online.
This document discusses cyber crimes and provides information on the topic in several sections. It begins with an introduction that defines cyber crime as unlawful acts using computers as tools or targets. Next, it discusses the history of cyber crimes from the 1990s with hacking to gain information and later causing networks to slow with malicious software. It then defines cyber crime and provides examples. Several types of cyber crimes are outlined such as hacking, cyber terrorism, email spoofing, phishing, software piracy, and child abuse. Prevention methods and categories of cyber crimes are also summarized.
This document defines and discusses cyber crimes. It begins by defining cyber crimes as illegal activities involving computers and the internet, where computers can be the target, tool, or incidental to the crime. It then discusses the causes of cyber crimes, types of cyber crimes including hacking and phishing, who commits cyber crimes such as hackers and terrorists, and challenges and ways to prevent cyber crimes.
Cyber Crimes Overview with special focus on Cyber crimes in India. Discussion related to some different types of Cyber Crimes. The presentation states the act about the growing concerns of Cyber Crime and also shows Statistical Data.
This document discusses online safety, security, ethics and etiquette. It outlines learning competencies around applying appropriate online safety standards, discerning deceptive information, and understanding implications of sharing information publicly. Topics covered include online safety measures, types of online threats like phishing and malware, maintaining privacy, and principles of netiquette and computer ethics. Students will learn to identify different types of online threats, protect their personal information, and behave appropriately online.
The document provides an overview of cyber crime, including its history, categories, types, and prevention. It discusses how the first recorded cyber crime took place in 1820 involving sabotage of new textile manufacturing technology. Cyber crimes are categorized as those against persons, property, government, and society. Common types of cyber crimes include hacking, phishing, viruses, and intellectual property theft. The document also provides cyber crime statistics and discusses cyber laws and prevention best practices like using antivirus software and firewalls.
Cyber crime involves illegal activities using computers and the internet. It can include hacking, fraud, stalking, and identity theft. The first recorded cyber crimes occurred in the 1820s, but cyber crime grew with the rise of email in 1976 and computer viruses in 1982. There are many types of cyber crimes, and they are committed by insiders, hackers, virus writers, foreign intelligence, and terrorists. Cyber security works to prevent cyber crimes by keeping software updated, using strong passwords, firewalls, and antivirus software. The cyber laws of India address both traditional crimes that use computers as well as new crimes defined in the Information Technology Act of 2000. Cyber crime will likely continue to evolve, so cyber security remains important.
The Fluke 925 is a vane anemometer, a handheld device designed to measure wind speed, air flow (volume), and temperature. It features a separate sensor and display unit, allowing greater flexibility and ease of use in tight or hard-to-reach spaces. The Fluke 925 is particularly suitable for HVAC (heating, ventilation, and air conditioning) maintenance in both residential and commercial buildings, offering a durable and cost-effective solution for routine airflow diagnostics.
Fluid mechanics is the branch of physics concerned with the mechanics of fluids (liquids, gases, and plasmas) and the forces on them. Originally applied to water (hydromechanics), it found applications in a wide range of disciplines, including mechanical, aerospace, civil, chemical, and biomedical engineering, as well as geophysics, oceanography, meteorology, astrophysics, and biology.
It can be divided into fluid statics, the study of various fluids at rest, and fluid dynamics.
Fluid statics, also known as hydrostatics, is the study of fluids at rest, specifically when there's no relative motion between fluid particles. It focuses on the conditions under which fluids are in stable equilibrium and doesn't involve fluid motion.
Fluid kinematics is the branch of fluid mechanics that focuses on describing and analyzing the motion of fluids, such as liquids and gases, without considering the forces that cause the motion. It deals with the geometrical and temporal aspects of fluid flow, including velocity and acceleration. Fluid dynamics, on the other hand, considers the forces acting on the fluid.
Fluid dynamics is the study of the effect of forces on fluid motion. It is a branch of continuum mechanics, a subject which models matter without using the information that it is made out of atoms; that is, it models matter from a macroscopic viewpoint rather than from microscopic.
Fluid mechanics, especially fluid dynamics, is an active field of research, typically mathematically complex. Many problems are partly or wholly unsolved and are best addressed by numerical methods, typically using computers. A modern discipline, called computational fluid dynamics (CFD), is devoted to this approach. Particle image velocimetry, an experimental method for visualizing and analyzing fluid flow, also takes advantage of the highly visual nature of fluid flow.
Fundamentally, every fluid mechanical system is assumed to obey the basic laws :
Conservation of mass
Conservation of energy
Conservation of momentum
The continuum assumption
For example, the assumption that mass is conserved means that for any fixed control volume (for example, a spherical volume)—enclosed by a control surface—the rate of change of the mass contained in that volume is equal to the rate at which mass is passing through the surface from outside to inside, minus the rate at which mass is passing from inside to outside. This can be expressed as an equation in integral form over the control volume.
The continuum assumption is an idealization of continuum mechanics under which fluids can be treated as continuous, even though, on a microscopic scale, they are composed of molecules. Under the continuum assumption, macroscopic (observed/measurable) properties such as density, pressure, temperature, and bulk velocity are taken to be well-defined at "infinitesimal" volume elements—small in comparison to the characteristic length scale of the system, but large in comparison to molecular length scale
More Related Content
Similar to Cyber Security PPT and how to be aware from hackers (20)
This document outlines the syllabus for a course on cybercrime. The 5 units cover: 1) an introduction to cybercrime, 2) cyber offenses and tools, 3) phishing and identity theft, 4) computer forensics. Each unit lists learning objectives and topics that will be covered. The course aims to explain cybercrime terms, describe offenses and botnets, illustrate cybercrime tools and methods, and justify the need for computer forensics. The document provides context on defining cybercrime, types of cybercriminals and their motives, and classifications of cybercrimes.
This document discusses cybercrime, including what it is, why we should be aware of it, and how to protect ourselves. It defines cybercrime as illegal activities involving computers and networks, such as hacking, viruses, and identity theft. The document outlines different types of cybercrimes and their impacts, describing how financial losses from data breaches are rising. It also discusses Indian laws related to cybercrime and provides tips for security measures like using strong, unique passwords and updating software. The document concludes by emphasizing the importance of awareness in protecting oneself from cybercrime.
This document provides an introduction to cybercrime, including definitions of key terms, classifications of cybercrimes, and descriptions of common cybercrime activities. It defines cybercrime as illegal activities that target computer systems and data. Cybercrimes are categorized as those against individuals, property, organizations, and society. Examples include phishing, spamming, hacking, software piracy, and cyberterrorism. Cybercriminals are also classified as those seeking recognition, financial gain, or insider revenge.
Cyber crime involves unlawful acts where computers are used as tools or targets. Some common cyber crimes include illegal access of systems, data interference, fraud, and denial of service attacks. Early instances of cyber crimes include the first spam email in 1978 and first computer virus in 1982. Cyber crimes can be committed through hacking, virus/worm attacks, email spoofing, spamming, and web jacking. Protecting against cyber crimes requires keeping software updated, using strong passwords, backing up data, and educating users about secure practices.
This document discusses cybercrime, including its history, types, causes, categories, and impact on national security. It begins by defining cybercrime as criminal activities carried out through computers or the internet. Some key types discussed are hacking, theft, cyber stalking, and identity theft. The document also outlines categories of cybercrime against individuals, property, and governments. It notes that cybercrime is a growing threat in India and discusses some case studies and laws related to cybercrime in the country. In conclusion, it stresses the importance of educating students about cybercrime and taking precautions online.
This document discusses cyber crime. It defines cyber crime as any illegal criminal activity that uses a computer as a tool, target, or means of perpetrating crime. Cyber crimes can range from security breaches and identity theft to cyber stalking and child exploitation. The document outlines several types of cyber crimes such as hacking, email spoofing, computer vandalism, and cyber terrorism. It also discusses reasons for cyber crimes and how to avoid becoming a victim.
PRESENTATION REPORT ON CYBER CRIME
1. INTRODUCTION
2. DIFFERENT TYPES OF CYBER CRIME
3.THE FIRST NATIONAL CONFERENCE ON NATIONAL CRIME INVESTIGATION AND CRIME FORENSICS
4.CYBER CRIME AWARENESS
5.CYBER SECURITY
6.CONCLUSION
7.FAQ
This document discusses cyber crime and security. It defines cyber crime as illegal activity committed on the internet. It then covers various topics related to cyber crime such as definitions, history, categories and types of cyber crimes including hacking, denial of service attacks and computer vandalism. The document also discusses cyber security and provides safety tips to prevent cyber crime such as using antivirus software and firewalls. It notes that technology alone is not destructive and depends on how people use it.
This document provides an overview of cyber security and cyber crimes. It defines cybercrime as any illegal act involving computers or networks, and outlines several types of cybercrimes including those against individuals, property, society, and organizations. The document also discusses who commits cybercrimes, including hobby hackers, financially motivated hackers, and disgruntled employees. It covers topics such as cyber terrorism, cyberbullying, hacking, and the motivation and classification of different cyber crimes.
Cybercrime is on the rise as more transactions move online. The document discusses several types of cybercrimes such as hacking, computer viruses, software piracy, pornography, credit card fraud, spamming, phishing, spoofing, denial of service attacks, cyber stalking, cyber defamation, threatening, and salami attacks. Victims range from individuals to businesses. The document provides statistics on identity theft and recommends steps people can take to better protect themselves such as using firewalls and antivirus software, being wary of unsolicited emails and files, and not sharing sensitive information online.
This document discusses cyber crimes and provides information on the topic in several sections. It begins with an introduction that defines cyber crime as unlawful acts using computers as tools or targets. Next, it discusses the history of cyber crimes from the 1990s with hacking to gain information and later causing networks to slow with malicious software. It then defines cyber crime and provides examples. Several types of cyber crimes are outlined such as hacking, cyber terrorism, email spoofing, phishing, software piracy, and child abuse. Prevention methods and categories of cyber crimes are also summarized.
This document defines and discusses cyber crimes. It begins by defining cyber crimes as illegal activities involving computers and the internet, where computers can be the target, tool, or incidental to the crime. It then discusses the causes of cyber crimes, types of cyber crimes including hacking and phishing, who commits cyber crimes such as hackers and terrorists, and challenges and ways to prevent cyber crimes.
Cyber Crimes Overview with special focus on Cyber crimes in India. Discussion related to some different types of Cyber Crimes. The presentation states the act about the growing concerns of Cyber Crime and also shows Statistical Data.
This document discusses online safety, security, ethics and etiquette. It outlines learning competencies around applying appropriate online safety standards, discerning deceptive information, and understanding implications of sharing information publicly. Topics covered include online safety measures, types of online threats like phishing and malware, maintaining privacy, and principles of netiquette and computer ethics. Students will learn to identify different types of online threats, protect their personal information, and behave appropriately online.
The document provides an overview of cyber crime, including its history, categories, types, and prevention. It discusses how the first recorded cyber crime took place in 1820 involving sabotage of new textile manufacturing technology. Cyber crimes are categorized as those against persons, property, government, and society. Common types of cyber crimes include hacking, phishing, viruses, and intellectual property theft. The document also provides cyber crime statistics and discusses cyber laws and prevention best practices like using antivirus software and firewalls.
Cyber crime involves illegal activities using computers and the internet. It can include hacking, fraud, stalking, and identity theft. The first recorded cyber crimes occurred in the 1820s, but cyber crime grew with the rise of email in 1976 and computer viruses in 1982. There are many types of cyber crimes, and they are committed by insiders, hackers, virus writers, foreign intelligence, and terrorists. Cyber security works to prevent cyber crimes by keeping software updated, using strong passwords, firewalls, and antivirus software. The cyber laws of India address both traditional crimes that use computers as well as new crimes defined in the Information Technology Act of 2000. Cyber crime will likely continue to evolve, so cyber security remains important.
The Fluke 925 is a vane anemometer, a handheld device designed to measure wind speed, air flow (volume), and temperature. It features a separate sensor and display unit, allowing greater flexibility and ease of use in tight or hard-to-reach spaces. The Fluke 925 is particularly suitable for HVAC (heating, ventilation, and air conditioning) maintenance in both residential and commercial buildings, offering a durable and cost-effective solution for routine airflow diagnostics.
Fluid mechanics is the branch of physics concerned with the mechanics of fluids (liquids, gases, and plasmas) and the forces on them. Originally applied to water (hydromechanics), it found applications in a wide range of disciplines, including mechanical, aerospace, civil, chemical, and biomedical engineering, as well as geophysics, oceanography, meteorology, astrophysics, and biology.
It can be divided into fluid statics, the study of various fluids at rest, and fluid dynamics.
Fluid statics, also known as hydrostatics, is the study of fluids at rest, specifically when there's no relative motion between fluid particles. It focuses on the conditions under which fluids are in stable equilibrium and doesn't involve fluid motion.
Fluid kinematics is the branch of fluid mechanics that focuses on describing and analyzing the motion of fluids, such as liquids and gases, without considering the forces that cause the motion. It deals with the geometrical and temporal aspects of fluid flow, including velocity and acceleration. Fluid dynamics, on the other hand, considers the forces acting on the fluid.
Fluid dynamics is the study of the effect of forces on fluid motion. It is a branch of continuum mechanics, a subject which models matter without using the information that it is made out of atoms; that is, it models matter from a macroscopic viewpoint rather than from microscopic.
Fluid mechanics, especially fluid dynamics, is an active field of research, typically mathematically complex. Many problems are partly or wholly unsolved and are best addressed by numerical methods, typically using computers. A modern discipline, called computational fluid dynamics (CFD), is devoted to this approach. Particle image velocimetry, an experimental method for visualizing and analyzing fluid flow, also takes advantage of the highly visual nature of fluid flow.
Fundamentally, every fluid mechanical system is assumed to obey the basic laws :
Conservation of mass
Conservation of energy
Conservation of momentum
The continuum assumption
For example, the assumption that mass is conserved means that for any fixed control volume (for example, a spherical volume)—enclosed by a control surface—the rate of change of the mass contained in that volume is equal to the rate at which mass is passing through the surface from outside to inside, minus the rate at which mass is passing from inside to outside. This can be expressed as an equation in integral form over the control volume.
The continuum assumption is an idealization of continuum mechanics under which fluids can be treated as continuous, even though, on a microscopic scale, they are composed of molecules. Under the continuum assumption, macroscopic (observed/measurable) properties such as density, pressure, temperature, and bulk velocity are taken to be well-defined at "infinitesimal" volume elements—small in comparison to the characteristic length scale of the system, but large in comparison to molecular length scale
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxRishavKumar530754
LiDAR-Based System for Autonomous Cars
Autonomous Driving with LiDAR Tech
LiDAR Integration in Self-Driving Cars
Self-Driving Vehicles Using LiDAR
LiDAR Mapping for Driverless Cars
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITYijscai
With the increased use of Artificial Intelligence (AI) in malware analysis there is also an increased need to
understand the decisions models make when identifying malicious artifacts. Explainable AI (XAI) becomes
the answer to interpreting the decision-making process that AI malware analysis models use to determine
malicious benign samples to gain trust that in a production environment, the system is able to catch
malware. With any cyber innovation brings a new set of challenges and literature soon came out about XAI
as a new attack vector. Adversarial XAI (AdvXAI) is a relatively new concept but with AI applications in
many sectors, it is crucial to quickly respond to the attack surface that it creates. This paper seeks to
conceptualize a theoretical framework focused on addressing AdvXAI in malware analysis in an effort to
balance explainability with security. Following this framework, designing a machine with an AI malware
detection and analysis model will ensure that it can effectively analyze malware, explain how it came to its
decision, and be built securely to avoid adversarial attacks and manipulations. The framework focuses on
choosing malware datasets to train the model, choosing the AI model, choosing an XAI technique,
implementing AdvXAI defensive measures, and continually evaluating the model. This framework will
significantly contribute to automated malware detection and XAI efforts allowing for secure systems that
are resilient to adversarial attacks.
Sorting Order and Stability in Sorting.
Concept of Internal and External Sorting.
Bubble Sort,
Insertion Sort,
Selection Sort,
Quick Sort and
Merge Sort,
Radix Sort, and
Shell Sort,
External Sorting, Time complexity analysis of Sorting Algorithms.
International Journal of Distributed and Parallel systems (IJDPS)samueljackson3773
The growth of Internet and other web technologies requires the development of new
algorithms and architectures for parallel and distributed computing. International journal of
Distributed and parallel systems is a bimonthly open access peer-reviewed journal aims to
publish high quality scientific papers arising from original research and development from
the international community in the areas of parallel and distributed systems. IJDPS serves
as a platform for engineers and researchers to present new ideas and system technology,
with an interactive and friendly, but strongly professional atmosphere.
its all about Artificial Intelligence(Ai) and Machine Learning and not on advanced level you can study before the exam or can check for some information on Ai for project
Analysis of reinforced concrete deep beam is based on simplified approximate method due to the complexity of the exact analysis. The complexity is due to a number of parameters affecting its response. To evaluate some of this parameters, finite element study of the structural behavior of the reinforced self-compacting concrete deep beam was carried out using Abaqus finite element modeling tool. The model was validated against experimental data from the literature. The parametric effects of varied concrete compressive strength, vertical web reinforcement ratio and horizontal web reinforcement ratio on the beam were tested on eight (8) different specimens under four points loads. The results of the validation work showed good agreement with the experimental studies. The parametric study revealed that the concrete compressive strength most significantly influenced the specimens’ response with the average of 41.1% and 49 % increment in the diagonal cracking and ultimate load respectively due to doubling of concrete compressive strength. Although the increase in horizontal web reinforcement ratio from 0.31 % to 0.63 % lead to average of 6.24 % increment on the diagonal cracking load, it does not influence the ultimate strength and the load-deflection response of the beams. Similar variation in vertical web reinforcement ratio leads to an average of 2.4 % and 15 % increment in cracking and ultimate load respectively with no appreciable effect on the load-deflection response.
Passenger car unit (PCU) of a vehicle type depends on vehicular characteristics, stream characteristics, roadway characteristics, environmental factors, climate conditions and control conditions. Keeping in view various factors affecting PCU, a model was developed taking a volume to capacity ratio and percentage share of particular vehicle type as independent parameters. A microscopic traffic simulation model VISSIM has been used in present study for generating traffic flow data which some time very difficult to obtain from field survey. A comparison study was carried out with the purpose of verifying when the adaptive neuro-fuzzy inference system (ANFIS), artificial neural network (ANN) and multiple linear regression (MLR) models are appropriate for prediction of PCUs of different vehicle types. From the results observed that ANFIS model estimates were closer to the corresponding simulated PCU values compared to MLR and ANN models. It is concluded that the ANFIS model showed greater potential in predicting PCUs from v/c ratio and proportional share for all type of vehicles whereas MLR and ANN models did not perform well.
Raish Khanji GTU 8th sem Internship Report.pdfRaishKhanji
This report details the practical experiences gained during an internship at Indo German Tool
Room, Ahmedabad. The internship provided hands-on training in various manufacturing technologies, encompassing both conventional and advanced techniques. Significant emphasis was placed on machining processes, including operation and fundamental
understanding of lathe and milling machines. Furthermore, the internship incorporated
modern welding technology, notably through the application of an Augmented Reality (AR)
simulator, offering a safe and effective environment for skill development. Exposure to
industrial automation was achieved through practical exercises in Programmable Logic Controllers (PLCs) using Siemens TIA software and direct operation of industrial robots
utilizing teach pendants. The principles and practical aspects of Computer Numerical Control
(CNC) technology were also explored. Complementing these manufacturing processes, the
internship included extensive application of SolidWorks software for design and modeling tasks. This comprehensive practical training has provided a foundational understanding of
key aspects of modern manufacturing and design, enhancing the technical proficiency and readiness for future engineering endeavors.
ELectronics Boards & Product Testing_Shiju.pdfShiju Jacob
This presentation provides a high level insight about DFT analysis and test coverage calculation, finalizing test strategy, and types of tests at different levels of the product.
ELectronics Boards & Product Testing_Shiju.pdfShiju Jacob
Cyber Security PPT and how to be aware from hackers
1. Ms.Dipali A. Awasekar,
(Assistant Professor)
CSI Cyber Security Influencer Awardee
Walchand Institute of Technology , Solapur.
Maharashtra – India
Cyber Security Awareness:
Protecting Yourself in the Digital Age
2. Learning Objectives
End of this session, you will be able to:
• Learn what cybercrime is and appreciate the
importance of cybercrime as a topic.
• Understand the different types cybercrime.
• Understand the difference between cybercrime and
cyberfraud.
• Learn about different types of cybercriminals and the
motives behind them
• Get an overview of cybercrime scenario in India and
global
• Understand legal perspective on cybercrime.
3. 1.1 INTRODUCTION
• The internet in India is growing rapidly. It has
given rise to new opportunities in every field we
can think of be it entertainment, business, sports
or education.
• There’re two sides to a coin. Internet also has it’s
own disadvantages is Cyber crime- illegal activity
committed on the internet.
4. Alternative definitions for
cybercrime
• Any illegal act where a special knowledge of computer
technology is essential for its perpetration,
investigation or prosecution
• Any traditional crime that has acquired a new
dimension or order of magnitude through the aid of
a computer, and abuses that have come into being
because of computers
• Any financial dishonesty that takes place in a
computer environment.
• Any threats to the computer itself, such as theft of
hardware or software, sabotage and demands for
ransom
5. Another definition
• “Cybercrime (computer crime) is any illegal
behavior, directed by means of electronic
operations, that target the security of computer
systems and the data processed by them”.
• Hence cybercrime can sometimes be called as
computer-related crime, computer crime, E-crime,
Internet crime, High-tech crime….
6. • A crime committed using a computer and the
internet to steal a person’s identity(identity theft)
or sell contraband or stalk victims or disrupt
operations with malevolent programs.
• Crimes completed either on or with a computer
• Any illegal activity through the Internet or on the
computer.
• All criminal activities done using the medium of
computers, the Internet, cyberspace and the
WWW.
7. • Cybercrime refers to the act of performing a criminal act using
cyberspace as communication vehicle.
• Two types of attacks are common:
⚬Techno- crime : Active attack
■ Techno Crime is the term used by law enforcement agencies to denote criminal
activity which uses (computer) technology, not as a tool to commit the crime,
but as the subject of the crime itself. Techno Crime is usually pre-meditated and
results in the deletion, corruption, alteration, theft or copying of data on an
organization's systems.
■ Techno Criminals will usually probe their prey system for weaknesses and will
almost always leave an electronic 'calling card' to ensure that their pseudonym
identity is known.
⚬Techno – vandalism: Passive attack
■ Techno Vandalism is a term used to describe a hacker or cracker who breaks
into a computer system with the sole intent of defacing and or destroying its
contents.
■ Techno Vandals can deploy 'sniffers' on the Internet to locate soft (insecure)
targets and then execute a range of commands using a variety of protocols
towards a range of ports. If this sounds complex - it is! The best weapon against
such attacks is a firewall which will hide and disguise your organization's
presence on the Internet.
9. 1.3 Cybercrime and
information security
• Lack of information security give rise to
cybercrime
• Cybersecurity: means protecting information,
equipment, devices, computer, computer
resource, communication device and information
stored therein from unauthorized access, use,
disclosure, disruption, modification or
destruction.
10. 1.4 Who are
Cybercriminals?
• Are those who conduct acts such as:
⚬Child pornography
⚬Credit card fraud
⚬Cyberstalking
⚬Defaming another online
⚬Gaining unauthorized access to computer systems
⚬Ignoring copyrights
⚬Software licensing and trademark protection
⚬Overriding encryption to make illegal copies
⚬Software piracy
⚬Stealing another’s identity to perform criminal acts
11. Categorization of
Cybercriminals
• Type 1: Cybercriminals- hungry for recognition
⚬Hobby hackers
■ A person who enjoys exploring the limits of what is
possible, in a spirit of playful cleverness. May modify
hardware/ software
⚬IT professional(social engineering):
■ Ethical hacker
⚬Politically motivated hackers :
■ promotes the objectives of individuals, groups or nations
supporting a variety of causes such as : Anti globalization,
transnational conflicts and protest
⚬Terrorist organizations
■ Cyberterrorism
■ Use the internet attacks in terrorist activity
■ Large scale disruption of computer networks ,
personal computers attached to internet via viruses
12. Type 2: Cybercriminals- not
interested in recognition
⚬Psychological perverts
■ Express sexual desires, deviates from normal behavior
■ Poonam panday
⚬Financially motivated hackers
■ Make money from cyber attacks
■ Bots-for-hire : fraud through phishing, information theft, spam
and extortion
⚬State-sponsored hacking
■ Hacktivists
■ Extremely professional groups working for governments
■ Have ability to worm into the networks of the media, major
corporations, defense departments
13. Type 3: Cybercriminals- the
insiders
⚬Disgruntled or former employees seeking
revenge
⚬Competing companies using employees to
gain economic advantage through damage
and/ or theft.
14. Motives behind cybercrime
• Greed
• Desire to gain power
• Publicity
• Desire for revenge
• A sense of adventure
• Looking for thrill to access forbidden information
• Destructive mindset
• Desire to sell network security services
15. 1.5 Classification of
cybercrimes
• Cybercrime against an individual
• Cybercrime against property
• Cybercrime against organization
• Cybercrime against Society
• Crimes emanating from Usenet
newsgroup
16. 1. Cybercrime against an
individual
• Electronic mail spoofing and other online frauds
• Phishing, spear phishing
• spamming
• Cyberdefamation
• Cyberstalking and harassment
• Computer sabotage
• Pornographic offenses
• passwordsniffing
20. 5.Crimes emanating from
Usenet newsgroup
• Usenet groups may carry very offensive,
harmful, inaccurate material
• Postings that have been mislabeled or are
deceptive in another way
• Hence service at your own risk
21. History of Usenet groups
• In 1979 it was developed by two graduate
student
• s from Duke University in North Carolina
(UNC) as a network that allowed users to
exchange quantities of information too large
for mailboxes
• Usenet was designed to facilitate textual
exchanges between scholars.
• Slowly, the network structure adapted to
allow the exchange of larger files such as
videos or images.
22. Usenet groups as a “safe”
place?
• Usenet newsgroups constitute one o the
largest source of child pornography available
in cyberspace
• This source useful for observing other types
of criminal or particular activities: online
interaction between pedophiles, adult
pornographers and writers of pornographic
stories.
• Usenet for sharing illegal content
23. Criminal activity on Oracle USENET
Newsgroups
• This interesting SearchOracle article on
Oracle security bloopers, we see the risks with engaging
the unsavory inhabitants of the Oracle USENET newsgroup,
a forum laced with profanity, pornography and, according
to this note, criminal Oracle hackers:
• “I subscribe to several Usenet groups so I can keep my
skills current. Well, a few years ago a DBA needed some
assistance and posted a question in which he shared his
tnsnames.ora file and wondered why he could not connect
to SQL*Plus with the following syntax:
• sqlplus system/SecurePswd@prod
• Almost immediately several people connected to this
person’s production system and was able to fish around the
system. Numerous people emailed the DBA back and
pointed out that he just broadcasted to the world his
production connection string and password. How crazy is
that?”
24. E-Mail Spoofing
• E-mail spoofing is the forgery of an e-mail header
so that the message appears to have originated
from someone or somewhere other than the
actual source.
• To send spoofed e-mail, senders insert commands
in headers that will alter message information.
• It is possible to send a message that appears to be
from anyone, anywhere, saying whatever the
sender wants it to say.
• Thus, someone could send spoofed e-mail that
appears to be from you with a message that you
didn't write.
• Classic examples of senders who might prefer to
disguise the source of the e-mail include a sender
25. E-Mail Spoofing
• Although most spoofed e-mail falls into the "nuisance"
category and requires little action other than deletion,
the more malicious varieties can cause serious
problems and security risks.
• For example, spoofed e-mail may purport to be from
someone in a position of authority, asking for
sensitive data, such as passwords, credit card
numbers, or other personal information -- any of
which can be used for a variety of criminal purposes.
• The Bank of America, eBay, and Wells Fargo are
among the companies recently spoofed in mass spam
mailings.
• One type of e-mail spoofing, self-sending spam,
involves messages that appear to be both to and from
the recipient.
26. Spamming
• People who create electronic spam : spammers
• Spam is abuse of electronic messaging systems to
send unsolicited bulk messages indiscriminately
• Spamming may be
⚬E-Mail Spam
⚬Instant messaging spam
⚬Usenet group spam
⚬Web search engine spam
⚬Spam in blogs, wiki spam
⚬Online classified ads spam
⚬Mobile phone messaging spam
⚬Internet forum spam
⚬Junk fax spam
⚬Social networking spam
……..
27. Spamming
• Spamming is difficult to control
• Advertisers have no operating costs beyond the
management of their mailing lists
• It is difficult to hold senders accountable for their
mass mailings
• Spammers are numerous
28. Avoid the following web
publishing techniques:
• Repeating keywords
• Use of keywords that do not relate to the content on
the site
• Use of fast meta refresh
⚬change to the new page in few seconds.
• Redirection
• IP cloaking:
⚬ including related links, information, and terms.
• Use of colored text on the same color background
• Tiny text usage
• Duplication of pages with different URLs
• Hidden links
30. Cyber defamation
• The tort of cyber defamation is considered to be
the act of defaming, insulting, offending or
otherwise causing harm through false statements
pertaining to an individual in cyberspace.
• Example: someone publishes
defamatory matter about
someone on a website
or sends an E-mail containing
defamatory information
to all friends of that person.
31. It may amount to defamation
when-
• If imputation to a deceased person would harm the
reputation of that person, and is intended to be
hurtful to the feelings of his family or other near
relatives
• An imputation is made concerning a company or an
association or collection of people as such.
• An imputation in the form of an alternative or
expressed ironically
• An imputation that directly or indirectly, in the
estimation of others, lowers the moral or intellectual
character of that person, or lowers the character of
that person in respect of his caste or of his calling, or
lowers the credit of that person.
32. Types of defamation
• Libel : written defamation
• Slander: oral defamation
• The plaintiff must have to show that the
defamatory statements were unlawful and would
indeed injure the person’s or organization’s
reputation.
• When failed to prove, the person who made the
allegations may still be held responsible for
defamation.
33. Cyber defamation cases
• In first case of cyber defamation in India (14 dec
2009),
⚬ the employee of a corporate defamed its reputation was sending
derogatory and defamatory emails against the company and its
managing directo
⚬ In this case the Court(delhi court) had restrained the defendant from
sending derogatory, defamatory, obscene, vulgar, humiliating and
abusive emails.
⚬The court passed as important ex-parte injunction.
• In another case, accused posted obscene, defamatory and annoying
message about a divorcee woman and also sent emails to the victim.
⚬ The offender was traced and was held guilty of offences under section 469,
509 IPC and 67 of IT Act, 2000.
• Other defamation cases:
⚬ A malicious customer review by a competitor could destroy a small business.
⚬ A false accusation of adultery on a social networking site could destroy a
marriage.
⚬ An allegation that someone is a “crook” could be read by a potential employer
or business partner
34. Internet Time Theft
• Occurs when an unauthorized person uses
the Internet hours paid for by another person
• Comes under hacking
• The person get access to someone else’s ISP user ID
and password, either by hacking or by gaining access
to it by illegal means
• And uses the internet without the other person’s
knowledge
• This theft can be identified when Internet time is
recharged often, despite infrequent usage.
• This comes under “identity theft”
35. Salami attack/ salami
technique
• Are used for committing financial crimes.
• The alterations made are so insignificant that in a
single case it would go completely unnoticed.
• Example: a bank employee inserts a program,
into the bank’s serve, that deduces a small
amount from the account of every customer
every month,
• The unauthorised debit goes unnoticed by the
customers, but the employee will make a sizable
amount every month.
36. Salami attack: real life
examples
• Small “shavings” for Big gains!
• The petrol pump fraud
37. Data diddling
• Data diddling involves changing data input in a
computer.
• In other words, information is changed from the way
it should be entered by a person typing in the data.
• Usually, a virus that changes data or a programmer of
the database or application has pre-programmed it to
be changed.
• For example, a person entering accounting may
change data to show their account, or that or a friend
or family member, is paid in full. By changing or failing
to enter the information, they are able to steal from
the company.
38. • To deal with this type of crime, a company
must implement policies and internal
controls.
• This may include performing regular audits,
using software with built-in features to
combat such problems, and supervising
employees.
39. Real life example:
Doodle me Diddle
• Electricity board in India have been victims to
data diddling programs inserted when private
parties computerized their systems.
40. Forgery
• The act of forging something, especially the
unlawful act of counterfeiting a document or
object for the purposes of fraud or deception.
• Something that has been forged, especially a
document that has been copied or remade to
look like the original.
• Counterfeit currency notes, postage, revenue
stamps, marksheets, etc., can be forged using
sophisticated computers, printers and scanners.
41. Real life case:
• Stamp Paper Scam – a racket that flourished on
loopholes in the system
• Abdul Karim Telgi, the mastermind of the multi-crore
counterfeiting, printed fake stamp papers worth
thousands of crores of rupees using printing
machines purchased illegally with the help of some
conniving officials of the Central Govt.’s Security
Printing Press (India Security Press) located in Nasik.
These fake stamp papers penetrated in more than 12
states through a widespread network of vendors who
sold the counterfeits without any fear and earned
hefty commissions.
• Amount swindled Rs. 172 crores
• Telgi is in jail serving his 13 plus 10 years term
42. Web jacking
• This term is derived from the term hi jacking.
• In these kinds of offences the hacker gains
access and control over the web site of another.
• He may even change the information on the site.
• The first stage of this crime involves “password
sniffing”.
• The actual owner of the website does not have
any more control over what appears on that
website
• This may be done for fulfilling political objectives
or for money
43. Real life examples
• recently the site of MIT (Ministry of Information
Technology) was hacked by the Pakistani hackers
and some obscene matter was placed therein.
• Further the site of Bombay crime branch was
also web jacked.
• Another case of web jacking is that of the ‘gold
fish’ case. In this case the site was hacked and the
information pertaining to gold fish was changed.
44. Industrial spying/ Industrial
Espionage
• Industrial espionage is the covert and sometimes
illegal practice of investigating competitors to
gain a business advantage.
• The target of investigation might be a trade
secret such as a proprietary product specification
or formula, or information about business plans.
• In many cases, industrial spies are simply
seeking any data that their organization can
exploit to its advantage.
45. Real life case
• A Chinese Trojan horse email campaign targeted some 140
senior Israeli defense corporation employees (2013) involved in
highly classified, sensitive security projects.
• The email was made to appear as if it came from a known
German company that regularly works with the Israeli defense
industry.
• However, it turned out to contain a Trojan horse, which,
according to the report, attempted to funnel information from
the recipients' computers.
• The Trojan horse was noticed by computer defense systems and
shut down.
• The defense establishment then realized how many Israelis
received the email, and reportedly tracked the malicious
program down to Chinese defense industries.
• The incident led security companies to reiterate to employees
computer security guidelines.
46. Hacking
Every act committed toward breaking into a
computer and/ or network is hacking.
Purpose
• Greed
• Power
• Publicity
• Revenge
• Adventure
• Desire to access forbidden information
• Destructive mindset
47. History of hacking
• hacking is any technical effort to manipulate the normal behavior
of network connections and connected systems.
• A hacker is any person engaged in hacking.
• The term "hacking" historically referred to constructive, clever
technical work that was not necessarily related to computer
systems.
• M.I.T. engineers in the 1950s and 1960s first popularized the term
and concept of hacking.
• the so-called "hacks" perpetrated by these hackers were
intended to be harmless technical experiments and fun learning
activities.
• Later, outside of M.I.T., others began applying the term to less
honorable pursuits. for example, several hackers in the U.S.
experimented with methods to modify telephones for making
free long-distance calls over the phone network illegally.
• As computer networking and the Internet exploded in popularity,
data networks became by far the most common target of hackers
and hacking.
48. Hacking vs. Cracking
• Malicious attacks on computer networks are
officially known as cracking ,
• while hacking truly applies only to activities
having good intentions.
• Most non-technical people fail to make this
distinction, however.
• Outside of academia, its extremely common to
see the term "hack" misused and be applied to
cracks as well.
49. There are 3 types of modern
hackers
• Black Hats: Criminal Hackers.
⚬Possess desire to destruction
⚬Hack for personal monetary gains : Stealing credit
card information, transferring money from various
bank accounts to their own account, extort money
from corporate giant by threatening.
• White Hats: Ethical Hackers.
⚬Network Security Specialist.
• Grey Hats: Deals in both of the above (jack of all
trades, master of none).
50. Real life case:dec 2009
NASA site hacked via SQL
Injection
• Two NASA sites recently were hacked by an individual wanting to
demonstrate that the sites are susceptible to SQL injection.
• The websites for NASA's Instrument Systems and Technology Division
and Software Engineering Division were accessed by a researcher, who
posted to his blog screen shots taken during the hack.
• The researcher, using the alias "c0de.breaker," used SQL injection to
hijack the sites.
• SQL injection is an attack process where a hacker adds additional SQL
code commands to a page request and the web server then tries to
execute those commands within the backend database
• The NASA hack yielded the credentials of some 25 administrator
accounts.
• The researcher also gained access to a web portal used for managing
and editing those websites.
• In this particular case, the researcher found the vulnerabilities, made
NASA aware of them, then published findings after the websites had
been fixed.
• An attacker, however, could have tried to use that web server as an entry
point into other systems NASA might control or edit the content of the
52. The story..
• LOS ANGELES, CA – Octuplet mom Nadya Suleman
launched a website to solicit donations for her family,
but it was immediately hacked by a group of vigilante
mothers!
• The website originally featured photos of all eight
octuplets, a thank you note from Suleman, images of
children’s toys and a large donation button for
viewers to send money through. Suleman also
provided an address where people can send items
such as diapers and formula.
• Suleman was perhaps not prepared for the backlash
she was to receive, as the site was hacked and
brought down within hours. The original homepage
53. • The site was tagged by the famous hacker group
MOD, also known as the Mothers of Disappointment.
The mysterious group has a history of attacking
personal sites they disapprove of, including Britney
Spears when she infamously hung dry her sons on a
clothes line after a bath, and Angelina Jolie for being
Angelina Jolie.
• Weekly World News could not reach any members for
comment, however reporters did receive a short note
from an anonymous e-mail address:
• mod will not tolerate the selfish acts of bad parenting
we will remain true to our mission despite any
setbacks
viva la maternity
(call your mother, she misses you)
• The site has since been restored, and Suleman’s PR
54. Online frauds
• Fraud that is committed using the internet is “online fraud.”
Online fraud can involve financial fraud and identity theft.
• Online fraud comes in many forms.
⚬ viruses that attack computers with the goal of retrieving personal
information, to email schemes that lure victims into wiring money to
fraudulent sources,
⚬ “phishing” emails that purport to be from official entities (such as
banks or the Internal Revenue Service) that solicit personal
information from victims to be used to commit identity theft,
⚬ to fraud on online auction sites (such as Ebay) where perpetrators
sell fictional goods.
⚬E-Mail spoofing to make the user to enter the personal information :
financial fraud
⚬Illegal intrusion: log-in to a computer illegally by having previously
obtained actual password. Creates a new identity fooling the
computer that the hacker is the genuine operator. Hacker commits
innumerable number of frauds.
55. Pornographic offenses: Child
pornography
• Means any visual depiction, including but not
limited to the following:
• Any photograph that ca be considered obscene
and/ or unsuitable for the age of child viewer.
• Film ,video, picture;
• Obscene Computer generated image or picture
56. How do they Operate
• Pedophiles use false identity to trap the children/teenagers
• Pedophiles contact children/teens in various chat rooms which
are used by children/teen to interact with other children/teen.
• Befriend the child/teen.
• Extract personal information from the child/teen by winning his
confidence.
• Gets the e-mail address of the child/teen and starts making
contacts on the victims e-mail address as well.
• Starts sending pornographic images/text to the victim including
child pornographic images in order to help child/teen shed his
inhibitions so that a feeling is created in the mind of the victim
that what is being fed to him is normal and that everybody does
it.
• Extract personal information from child/teen
• At the end of it, the pedophile set up a meeting with the
child/teen out of the house and then drag him into the net to
further sexually assault him or to use him as a sex object.
57. Software piracy
• Theft of software through the illegal copying of
genuine programs or the counterfeiting and
distribution of products intended to pass for the
original.
• End-user copying
• Hard disk loading with illicit means
• Counterfeiting
• Illegal downloads from internet
58. Buying Pirated software have
a lot to lose:
• Getting untested software that may have been
copied thousands of times.
• Potentially contain hard-ware infecting viruses
• No technical support in case of software failure
• No warranty protection
• No legal right to use the product
59. Computer sabotage
• Computer sabotage involves deliberate attacks intended to
disable computers or networks for the purpose of
disrupting commerce, education and recreation for
personal gain, committing espionage, or facilitating
criminal conspiracie.
• Through viruses, worms, logic bombs
• Chernobyl virus
■The Chernobyl virus is a computer virus with a potentially devastating
payload that destroys all computer data when an infected file is
executed.,
• Y2K virus
⚬Y2K bug, also called Year 2000 bug or Millennium Bug, a
problem in the coding of computerized systems that was
projected to create havoc in computers and
computer networks around the world at the beginning of the
60. E-mail bombing/mail
bombs
• In Internet usage, an email bomb is a form of net
abuse consisting of sending huge volumes of
email to an address in an attempt to overflow the
mailbox or overwhelm the server where the email
address is hosted in a denial-of-service attack.
• Construct a computer to repeatedly send E-mail
to a specified person’s E-mail address.
• Can overwhelm the recipient’s personal account
and potentially shut down the entire system.
61. Computer network
intrusions
• An intrusion to computer network from any
where in the world and steal data, plant viruses,
create backdoors, insert trojan horse or change
passwords and user names.
• An intrusion detection system (IDS) inspects all
inbound and outbound network activity and
identifies suspicious patterns that may indicate a
network or system attack from someone
attempting to break into or compromise a
system.
• The practice of strong password
62. Password sniffing
• Password sniffers are programs that monitor and
record the name and password of network users
as they login, jeopardizing security at a site.
• through sniffers installed, anyone can
impersonate an authorized user and login to
access restricted documents.
63. Credit card frauds
• Credit card fraud is a wide-ranging term for theft
and fraud committed using or involving a
payment card, such as a credit card or debit card,
as a fraudulent source of funds in a transaction.
• The purpose may be to obtain goods without
paying, or to obtain unauthorized funds from an
account.
• Credit card fraud is also an adjunct to
identity theft.
64. Identity theft
• Identity theft is a fraud involving another person’s
identity for an illicit purpose.
• The criminal uses someone else’s identity for his/ her
own illegal purposes.
• Phishing and identity theft are related offenses
• Examples:
⚬Fraudulently obtaining credit
⚬Stealing money from victim’s bank account
⚬Using victim’s credit card number
⚬Establishing accounts with utility companies
⚬Renting an apartment
⚬Filing bankruptcy using the victim’s name
65. Real life cases
• Dr. Gerald Barnes
Gerald Barnbaum lost his pharmacist license after
committing Medicaid fraud. He stole the identity of Dr.
Gerald Barnes and practiced medicine under his name. A
type 1 diabetic died under his care. “Dr. Barnes” even
worked as a staff physician for a center that gave exams to
FBI agents. He’s currently serving hard time.
• Andrea Harris-Frazier
Margot Somerville lost her wallet on a trolley. Two years
later she was arrested. Andrea Harris-Frazier had
defrauded several banks—using Somerville’s identity—out
of tens of thousands of dollars. The real crook was caught.
• Abraham Abdallah
A busboy named Abraham Abdallah got into the bank
accounts of Steven Spielberg and other famous people
after tricking his victims via computer, getting sufficient
data to fake being their financial advisors—then calling
their banks…and you know the rest.
66. Cybercrime:
the legal perspective
• Cybercrime possess a mammoth challenge
• Computer crime: Criminal Justice Resource
Manual(1979)
⚬Any illegal act for which knowledge of computer
technology is essential for a successful prosecution.
• International legal aspects of computer crimes
were studied in 1983
⚬Encompasses any illegal act for which the
knowledge of computer technology is essential for
its prepetration
67. Cybercrime:
the legal perspective
• The network context of cyber crime make it one
of the most globalized offenses of the present
and most modernized threats of the future.
• Solution:
⚬Divide information system into segments bordered
by state boundaries.
■ Not possible and unrealistic because of globalization
⚬Or incorporate the legal system into an integrated
entity obliterating these state boundaries.
68. Cybercrimes: An Indian
Perspective
• India has the fourth highest number of internet
users in the world.
• 45 million internet users in India
• 37% - in cybercafes
• 57% are between 18 and 35 years
• The Information Technology (IT) Act, 2000,
specifies the acts which are punishable. Since the
primary objective of this Act is to create an
enabling environment for commercial use of I.T.
69. Cybercrimes: An Indian
Perspective
• 217 cases were registered under IT Act during the
year 2007 as compared to 142 cases during the
previous year (2006)
• Thereby reporting an increase of 52.8% in 2007
over 2006.
• 22.3% cases (49out of 217 cases) were reported
from Maharashtra followed by Karnataka (40),
Kerala (38) and Andhra Pradesh and Rajasthan (16
each).
71. Incidence of Cyber Crimes in
Cities
• 17 out of 35 mega cities did not report any case of Cyber
Crime i.e, neither under the IT Act nor under IPC Sections)
during the year 2007.
• 17 mega cities have reported 118 cases under IT Act and 7
megacities reported 180 cases undervarious section of IPC.
• There was an increase of 32.6% (from 89 cases in 2006 to
118 cases in 2007) in cases under IT Act as compared to
previous year (2006),
• and an increase of 26.8% (from 142 cases in 2006 to 180
cases in 2007) of cases registered under various section of
IPC
• Bengaluru (40), Pune (14) and Delhi (10) cities have
reported high incidence of cases (64 out of 118 cases)
registered under IT Act, accounting for more than half of