You are on page 1of 12

CYBER CRIME

Cyber Crime 27-08-2020 1


CONTENT
Introduction to Cyber Crime
How it Started?
Types of Cyber Crime
Cyber Security
Safety Tips for Cyber Crime
Cyber Law in India
Conclusion
Cyber Crime 27-08-2020 2
INTRODUCTION TO CYBER
CRIME

Cyber Crime 27-08-2020 3


Click icon to add
CYBER CRIME picture

Cybercrime is criminal activity that


either targets or uses a computer, a
computer network or a networked
device. Most, but not all, cybercrime is
committed by cybercriminals or
hackers who want to make money.
Cyber Crime 27-08-2020 4
HOW IT STARTED?
• The first recorded cyber crime took place in the year 1820! That is not surprising
considering the fact that the abacus, which is thought to be the earliest form of a
computer, has been around since 3500 B.C. in India, Japan and China. The era of modern
computers, however, began with the analytical engine of Charles Babbage.  In 1820,
Joseph ­Marie Jacquard, a textile manufacturer in France, produced the loom. This device
allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in
a fear amongst Jacquard's employees that their traditional employment and livelihood
were being threatened. They committed acts of sabotage to discourage Jacquard from
further use of the new technology. This is the first recorded cyber crime.
Cyber Crime 27-08-2020 5
TYPES OF CYBER CRIME
DDoS ATTACKS
• These are used to make an online service unavailable and take the network down by
overwhelming the site with traffic from a variety of sources. Large networks of infected devices
known as Botnets are created by depositing malware on users’ computers. The hacker then hacks
into the system once the network is down.
BOTNETS
• Botnets are networks from compromised computers that are controlled externally by remote
hackers. The remote hackers then send spam or attack other computers through these botnets.
Botnets can also be used to act as malware and perform malicious tasks.
Cyber Crime 27-08-2020 6
TYPES OF CYBER CRIME (CONTINUED)
 IDENTITY THEFT

• This cybercrime occurs when a criminal gains access to a user’s personal information to steal
funds, access confidential information, or participate in tax or health insurance fraud. They can
also open a phone/internet account in your name, use your name to plan a criminal activity and
claim government benefits in your name.
ONLINE SCAMS
• These are usually in the form of ads or spam emails that include promises of rewards or offers of
unrealistic amounts of money. Online scams include enticing offers that are “too good to be true”
and when clicked on can cause malware to interfere and compromise information.
Cyber Crime 27-08-2020 7
TYPES OF CYBER CRIME (CONTINUED)

 PHISHING
• This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to
their accounts or computer. Cybercriminals are becoming more established and many of these emails are not
flagged as spam. Users are tricked into emails claiming they need to change their password or update their
billing information, giving criminals access.
 CYBERSTALKING
• This kind of cybercrime involves online harassment where the user is subjected to a plethora of online
messages and emails. Typically cyberstalkers use social media, websites and search engines to intimidate a
user and instill fear. Usually, the cyberstalker knows their victim and makes the person feel afraid or
concerned for their safety.
Cyber Crime 27-08-2020 8
Click icon to add
picture
CYBER SECURITY
Cyber security is the practice of defending
computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks.
It's also known as information
technology security or electronic
information security. ... A compromised
application could provide access to the data its
designed to protect
Cyber Crime 27-08-2020 9
SAFETY TIPS FOR CYBER CRIME
 Most internet users are not dwelling on the fact that they may get hacked and many rarely change their
credentials or update passwords. This leaves many people susceptible to cybercrime and it’s important to become
informed. Educate yourself and others on the preventive measures you can take in order to protect yourself.
 Become vigilant when browsing websites.
 lag and report suspicious emails.
 Never click on unfamiliar links or ads.
 Use a VPN whenever possible.
 Ensure websites are safe before entering credentials.
 Keep antivirus/application systems up to date.
 Use strong passwords with 14+ characters.

Cyber Crime 27-08-2020 10


CYBER LAW IN INDIA
• India does not have a dedicated cybersecurity law. The Information Technology Act 2000 (the IT Act) read with
the rules and regulations framed thereunder deal with cybersecurity and the cybercrimes associated therewith.
The IT Act not only provides legal recognition and protection for transactions carried out through electronic data
interchange and other means of electronic communication, but it also contains provisions that are aimed at
safeguarding electronic data, information or records, and preventing unauthorised or unlawful use of a computer
system. Some of the cybersecurity crimes that are specifically envisaged and punishable under the IT Act are
hacking, denial-of-service attacks, phishing, malware attacks, identity fraud and electronic theft.
• In accordance with the Information Technology (The Indian Computer Emergency Response Team and Manner of
Performing Functions and Duties) Rules 2013 (the CERT Rules), the Computer Emergency Response Team (CERT-
In) has been established as the nodal agency responsible for the collection, analysis and dissemination of
information on cyber incidents and taking emergency measures to contain such incidents.

Cyber Crime 27-08-2020 11


CONCLUSION
• Though not all people are victims to cyber crimes, they are still at risk. Crimes by computer vary, and
they don’t always occur behind the computer, but they executed by computer. The hacker’s identity is
ranged between 12 years young to 67years old. The hacker could live three continents away from its
victim, and they wouldn’t even know they were being hacked. Crimes done behind the computer are
the 21st century’s problem. With the technology increasing, criminals don’t have to rob banks, nor do
they have to be outside in order to commit any crime. They have everything they need on their lap.
Their weapons aren’t guns anymore; they attack with mouse cursors and passwords.

Cyber Crime 27-08-2020 12

You might also like