Date post: | 12-Apr-2017 |
Category: |
Internet |
Upload: | akshaykumar-kavar |
View: | 56 times |
Download: | 0 times |
L.D. College of Engineering
• Rubber Technology• Semester :- 5th• Cyber Security• Topic :- Cyber Crime & Law
Group 4 Name Enrollment No. Ravi Bhikhadiya 140280126001Akshay Kavar 140280126007Nilesh Dudhat 140280126014Dhruvik Pipaliya 140280126017Ravikumar Sardhara 140280126022Chirag Zalawadiya 140280126029
Cyber Crime & its LawIntroduction (Cyber Crime)Types of Cyber CrimeHackingMalwareCyber SpaceDigital ForensicsCyber SecurityCyber Law (IT Act)
Cyber CrimeCyber crime (Computer Crime) is a crime
that involves a computer and a network.The computer may have been used in the
commission of a crime, or it may be the target.
Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
Types of Cyber CrimeCyber crimes can be basically divided into 3
major categories:
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government.
1. Cyber Crimes against PersonsCybercrimes committed against persons
include various crimes like transmission of child pornography, Harassment of any one with the use of a computer, message, e-mails etc…
Harassment can be racial, religious, or other.
2. Cyber Crimes against property These crimes includeComputer vandalism (destruction of others'
property), Transmission of harmful programs,Unauthorized trespassing through cyber
space,Unauthorized possession of computer
information.
3. Cyber Crimes against governmentCyber terrorism is one distinct kind of crime
in this category. The growth of internet has shown that the
medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.
Modification of a conventional crime by using computers.Financial crimesCyber pornographySale of illegal articlesOnline gamblingEmail spoofingVirus / worm attacksLogic bombsTrojan attacksTheft of computer system
HackingThe Process of attempting to gain or successfully
gaining, unauthorized access to computer or technical resources is called Hacking.
In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.
The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.
MalwareMalware, short for malicious (or malevolent)
software, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
It can appear in the form of code, scripts, active content, and other software.
Malware' is a general term used to refer to a variety of forms of hostile or intrusive software
Denial-of-service attack (DoS attack) In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, It generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
Cyber SpaceCyberspace is "the notional environment
in which communication over computer networks occurs.“
The word became popular in the 1990s when the uses of the Internet, networking, and digital communication were all growing dramatically and the term "cyberspace" was able to represent the many new ideas and phenomena that were emerging.
Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems.
Threats in Cyberspace1. Hacktivism2. Cybercrime3. Cyberespionage4. Cyberwar5. Cyberterrorism
WHAT IS DIGITAL FORENSICS?Digital Forensics is the preservation,
identification, extraction, interpretation and documentation of computer evidence which can be used in the court of law.
Branches of Digital Forensics include:Network ForensicsFirewall ForensicsDatabase ForensicsMobile Device forensics
THE BENEFITS OF DIGITAL FORENSICSDigital Forensics help to protect from and
solve cases involving:
Theft of intellectual propertyFinancial FraudDistribution and execution of viruses and
wormsHacker system penetration
Cyber SecurityCyber Security involves protection of
sensitive personal and business information through prevention, detection and response to different online attacks.
Cyber security actually preventing the attacks, cyber world.
Privacy Policy : Before submitting your name , e-mail ,
address, on a website look for the sites privacy policy.
Keep Software Up to Date: If the seller reduces patches for the software
operating system your device ,install them as soon as possible .Installing them will prevent attackers form being able to take advantage. Do not choose option that allows your computer to remember your passwords.
DISABLE REMOTE CONNECTIVITY : Some PDA’s and phones are equipped with
wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use.
Cybersecurity is a young field. Cyber security is a highly educated and aging field.
Advantages of CYBER SECURITYThe cyber security will defend us from
critical attacks.It helps us to browse the site, website.Internet Security process all the incoming
and outgoing data on your computer. It will defend us from hacks and virus.Application of cyber security used in our PC
needs update every week
Safety Tips for CYBER CRIMEUse antivirus SoftwareInsert FirewallsUninstall unnecessary softwareMaintain backupCheck security settings
Cyber Law of India (IT Act 2000) Cyber crime can involve criminal activities
that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code.
In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both.
The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act, 2000.
CONCLUSIONCybercrime is indeed getting the recognition
it deserves. However, it is not going to restricted that
easily . In fact , it is highly likely that cyber crime
and its hackers will continue developing and upgrading to stay ahead of the law.
So, to make us a safer we must need cyber security.
We are currently in a talent shortageThere is a talent shortage.
THANK YOU.