+ All Categories
Home > Internet > Cyber crime & law

Cyber crime & law

Date post: 12-Apr-2017
Category:
Upload: akshaykumar-kavar
View: 56 times
Download: 0 times
Share this document with a friend
28
L.D. College of Engineering Rubber Technology Semester :- 5th Cyber Security Topic :- Cyber Crime & Law
Transcript
Page 1: Cyber crime & law

L.D. College of Engineering

• Rubber Technology• Semester :- 5th• Cyber Security• Topic :- Cyber Crime & Law

Page 2: Cyber crime & law

Group 4 Name Enrollment No. Ravi Bhikhadiya 140280126001Akshay Kavar 140280126007Nilesh Dudhat 140280126014Dhruvik Pipaliya 140280126017Ravikumar Sardhara 140280126022Chirag Zalawadiya 140280126029

Page 3: Cyber crime & law

Cyber Crime & its LawIntroduction (Cyber Crime)Types of Cyber CrimeHackingMalwareCyber SpaceDigital ForensicsCyber SecurityCyber Law (IT Act)

Page 4: Cyber crime & law

Cyber CrimeCyber crime (Computer Crime) is a crime

that involves a computer and a network.The computer may have been used in the

commission of a crime, or it may be the target.

Page 5: Cyber crime & law
Page 6: Cyber crime & law

Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.

Page 7: Cyber crime & law

Types of Cyber CrimeCyber crimes can be basically divided into 3

major categories:

1. Cyber crimes against persons.

2. Cyber crimes against property.

3. Cyber crimes against government.

Page 8: Cyber crime & law

1. Cyber Crimes against PersonsCybercrimes committed against persons

include various crimes like transmission of child pornography, Harassment of any one with the use of a computer, message, e-mails etc…

Harassment can be racial, religious, or other.

Page 9: Cyber crime & law

2. Cyber Crimes against property These crimes includeComputer vandalism (destruction of others'

property), Transmission of harmful programs,Unauthorized trespassing through cyber

space,Unauthorized possession of computer

information.

Page 10: Cyber crime & law

3. Cyber Crimes against governmentCyber terrorism is one distinct kind of crime

in this category. The growth of internet has shown that the

medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.

Page 11: Cyber crime & law

Modification of a conventional crime by using computers.Financial crimesCyber pornographySale of illegal articlesOnline gamblingEmail spoofingVirus / worm attacksLogic bombsTrojan attacksTheft of computer system

Page 12: Cyber crime & law

HackingThe Process of attempting to gain or successfully

gaining, unauthorized access to computer or technical resources is called Hacking.

In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.

The term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker.

Page 13: Cyber crime & law

MalwareMalware, short for malicious (or malevolent)

software, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

It can appear in the form of code, scripts, active content, and other software.

Malware' is a general term used to refer to a variety of forms of hostile or intrusive software

Page 14: Cyber crime & law

Denial-of-service attack (DoS attack) In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, It generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.

Page 15: Cyber crime & law

Cyber SpaceCyberspace is "the notional environment

in which communication over computer networks occurs.“

The word became popular in the 1990s when the uses of the Internet, networking, and digital communication were all growing dramatically and the term "cyberspace" was able to represent the many new ideas and phenomena that were emerging.

Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems.

Page 16: Cyber crime & law

Threats in Cyberspace1. Hacktivism2. Cybercrime3. Cyberespionage4. Cyberwar5. Cyberterrorism

Page 17: Cyber crime & law

WHAT IS DIGITAL FORENSICS?Digital Forensics is the preservation,

identification, extraction, interpretation and documentation of computer evidence which can be used in the court of law.

Branches of Digital Forensics include:Network ForensicsFirewall ForensicsDatabase ForensicsMobile Device forensics

Page 18: Cyber crime & law

THE BENEFITS OF DIGITAL FORENSICSDigital Forensics help to protect from and

solve cases involving:

Theft of intellectual propertyFinancial FraudDistribution and execution of viruses and

wormsHacker system penetration

Page 19: Cyber crime & law
Page 20: Cyber crime & law

Cyber SecurityCyber Security involves protection of

sensitive personal and business information through prevention, detection and response to different online attacks.

Cyber security actually preventing the attacks, cyber world.

Page 21: Cyber crime & law

Privacy Policy : Before submitting your name , e-mail ,

address, on a website look for the sites privacy policy.

Keep Software Up to Date: If the seller reduces patches for the software

operating system your device ,install them as soon as possible .Installing them will prevent attackers form being able to take advantage. Do not choose option that allows your computer to remember your passwords.

DISABLE REMOTE CONNECTIVITY : Some PDA’s and phones are equipped with

wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use.

Page 22: Cyber crime & law

Cybersecurity is a young field. Cyber security is a highly educated and aging field.

Page 23: Cyber crime & law

Advantages of CYBER SECURITYThe cyber security will defend us from

critical attacks.It helps us to browse the site, website.Internet Security process all the incoming

and outgoing data on your computer. It will defend us from hacks and virus.Application of cyber security used in our PC

needs update every week

Page 24: Cyber crime & law

Safety Tips for CYBER CRIMEUse antivirus SoftwareInsert FirewallsUninstall unnecessary softwareMaintain backupCheck security settings

Page 25: Cyber crime & law

Cyber Law of India (IT Act 2000) Cyber crime can involve criminal activities

that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code.

In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both.

The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act, 2000.

Page 26: Cyber crime & law

CONCLUSIONCybercrime is indeed getting the recognition

it deserves. However, it is not going to restricted that

easily . In fact , it is highly likely that cyber crime

and its hackers will continue developing and upgrading to stay ahead of the law.

So, to make us a safer we must need cyber security.

Page 27: Cyber crime & law

We are currently in a talent shortageThere is a talent shortage.

Page 28: Cyber crime & law

THANK YOU.


Recommended