You are on page 1of 17

Cyber Crime and

Security
Table of Content
Objectives of the Action Plan
01 04
Project

02 Acknowledgement 05 Questionnaire

Certificate of
03 06 Report
Completion
Objectives of the Project
01 02

To know about cyber crime To focus on the safety in


and cyber law. cyberspace.

04 05
To spread the knowledge
of the crimes or offences To know about origin
that take place through of cyber crime.
the cyberspace.
Acknowledgement
I would like to express my special thanks of gratitude to my teacher Ms. Sheetal
Kharbanda as well as our principal Ms. Gulshan Kaur who gave me the golden opportunity
to do this wonderful project on the topic Cyber Crime and Security, which also helped me
in doing a lot of research and I came to know about so many new things. I am thankful to
them.

Secondly, I would also like to thank my parents and friends who helped me a lot in
finalizing this project within the limited period.

Soumay Rai Gupta

-----------------------
Certificate of Completion
This is to certify that Soumay Rai Gupta, a student of class XI has successfully completed the
research on the project Cyber Crime and Security under the guidance of Ms. Sheetal Kharbanda
during the year 2022-2023.

( ) ( )

Signature of Principal Signature of Internal Examiner


Action Plan
Selection of the topic. Approval of the topic
01 02
by subject In-charge.

Search about various Data collection from


03 occurrences. various sources. 04

Execution of survey Preparation of Report.


05 06
via Google Form.
Questionnaire
1. How aware are you about cyber crime ?

2. Do you have an antivirus software installed on your PC / Mac ?

3. Are you currently using your web browser or a password manager app to save or create
passwords ?

4. Do you regularly backup your devices ?

5. Do you get the mail from unknown persons any time ?

6. How safe do you feel about your information, when you are online ?

7. Have you ever lost money due to Cyber Crime ?

8. How many times have you been a victim of a cybercrime ?

9. Do you think that the laws in effect are able to control cyber criminals ?

10. Provide your suggestions for modifications to the existing cyberlaws.


Report
Introduction
The internet in world is growing rapidly. It has given rise to new
opportunities in every field we can think of – be it entertainment, business,
sports or education. There are two sides to a coin. Internet also has its own
disadvantages. One of the major disadvantage is Cyber-crime.

The term ‘cyber-crime’ is misnomer. This term has nowhere been defined
in any statute/Act passed or enacted by the Indian Parliament. The
concept of cyber-crime is not radically different from the concept of
conventional crime. Both include conduct whether act or omission, which
cause breach of rules of law and counterbalanced by the sanction of the
state.

The commonly accepted definition of cyber security is the protection of any


computer system, system program, and data against unauthorized use,
disclosure, transfer, modification, or destruction whether accidental or
intentional. Cyber-attacks can come from internal networks, the Internet
or other private or public systems.
Causes of Cyber Crime
 Easy to access computers
Since technology is complex, it has become very difficult to protect the computer from viruses and
hackers. There are so many possibilities of hacking when we safeguard a computer system from
unauthorized access. Hackers can steal access codes, retinal images, advanced voice recorders, etc. that
can mislead the bio-metric systems easily and can be utilized to get past many security systems by
avoiding firewalls.

 Size to store computer data in comparatively small space 


The computer has got a distinctive feature of storing data in a very small space. Due to this, the people
can steal data very easily from any other storage and are using this for their purpose.

 Complexity of Code
The computers can run on operating systems and these operating systems are programmed with millions
of codes. There might be mistakes in the code. The human brain is defective so that they can commit
mistakes at any stage. The cyber-criminals take advantage of these loopholes.

 Negligence of the user


Human beings always neglect things. So, if we make any negligence in protecting our computer system
which leads the cyber-criminal to the access and control over the computer system.
Types of Cyber Crime
Hacking: It defines that sending illegal instruction to any other computer or network. In this case, a person’s computer is hacked so that
sensitive information can be retrieved. The criminal uses a variety of software to break into a person’s computer and the person may not
be knowing that his computer is being accessed from a remote location. The government websites are strong prey for hackers. Ethical
hacking is different from this and is used by many organizations to check their Internet security protection.

Children pornography and their Abuse: The internet is being enormously used to abuse children. This is a type of cyber-crime where
criminals exploit minors through chat rooms for the intention of child pornography. The Cyber-security sector of each nation is spending
an excess of time supervising chat rooms frequently visited by children with the belief of minimizing and preventing child abuse and
soliciting.

Plagiarism or Piracy or Theft: This crime happens when a person disobeys copyrights and downloads music, movies, games, and
software. Nowadays, the judicial system is addressing the cyber-crime and there are so many laws that stop people from illegal
downloading. Film producers and directors frequently become a martyr of this crime.

Cyber Stalking: This is an online harassment where the victim is exposed to a cascade of online messages and emails. Typically, these
stalkers know their victims and instead of offline stalking, they will use the Internet to stalk. Although, if they notice that cyber-stalking is
not having the effect which they have desired, then they begin offline stalking along with cyber-stalking to make sure that victim’s
survival is more depressed.
 Cyber Terrorism: Cyber terrorism is also known as information wars and can be defined as
an act of Internet terrorism which contains cautious and large-scale strikes and disturbances
of computer networks using computer viruses or the physical attacks using malware to strike
individuals, governments and other organizations. The aim of terrorists is to produce a sense
of terror in the brains of the victims. Cyber terrorists drive with the aim of harm and
demolition at the forefront of their activities like a vanguard.

 Identity Theft: This is a major problem with the people who are using the Internet and
technology for cash transactions and banking services. In this cyber-crime, a criminal
retrieves data about a person’s bank account, credit cards, Social Security, debit card and the
other diplomatic information to drain money or to purchase things online in the victim’s
name. This can result in vital economic losses for the victim and even in damaging the
victim’s credit history.

 Computer Vandalism: This is a type of malicious action that involves the destruction of


computers and data in different ways and certainly disrupting businesses. The computer
vandalism involves the installation of malicious programs which are designed to perform
damaging tasks such as deleting hard drive data or remove login credentials. Computer
vandalism differs from viruses which hold themselves to the existing programs.

 Malicious Software: This software based on the Internet or programs that are used to disturb
a network. The software is used to acquire access to a system to loot diplomatic information
or data or causing destruction to the software which is present in the system.
Ways to Prevent Cyber Crime
 By Using Strong Passwords: Maintaining different password and username combinations for each of the accounts and withstand the
desire to write them down. Weak passwords can be easily broken.

 Keep social media private: Be sure that your social networking profiles (Facebook, Twitter, YouTube, etc.) are set to be private. Once
be sure to check your security settings. Be careful with the information that you post online. Once if you put something on the Internet
and it is there forever.

 Protect your storage data: Protect your data by using encryption for your important diplomatic files such as related to financial and
taxes.

 Protecting your identity online: We have to be very alert when we are providing personal information online. You must be cautious
when giving out personal ids such as your name, address, phone number, and financial information on the Internet. Be sure to make that
websites are secure when you are making online purchases, etc. This includes allowing your privacy settings when you are using social
networking sites.

 Keep changing passwords frequently: When it comes to password, don’t stick to one password. You can change your password
frequently so that it may be difficult for the hackers to access the password and the stored data.

 Protect your computer with security software: Security software includes firewall and antivirus software. A firewall is normally your
computer’s first line of security. It controls that who, what and where is the communication is going on the internet. So, it’s better to
install security software which is from trusted sources to protect your computer.
Cyber Law (IT Law) in India
Cyber Law also called IT Law is the law regarding Information-technology including
computers and the internet. It is related to legal informatics and supervises the digital
circulation of information, software, information security, and e-commerce. 
IT law does not consist of a separate area of law rather it encloses aspects of contract,
intellectual property, privacy, and data protection laws. Intellectual property is a key element
of IT law. The area of software license is controversial and still evolving in Europe and
elsewhere. 

According to the Ministry of Electronics and Information Technology, Government of


India : 
Cyber Laws yields legal recognition to electronic documents and a structure to support e-
filing and e-commerce transactions and also provides a legal structure to reduce, check cyber
crimes

Importance of Cyber Law: 


1. It covers all transactions over the internet. 
2. It keeps eye on all activities over the internet. 
3. It touches every action and every reaction in cyberspace. 
 
Conclusion
Capacity of human mind is unfathomable. It is not possible to eliminate
cyber-crime rom cyber space. It is quite possible to check them. History
is the witness that no legislation has succeeded in totally eliminating
crime from the globe.
The only possible step is to make people aware of their rights and duties
(to report crime as a collective duty towards the society) and further
making the application of the laws more stringent to check crime,
Undoubtedly the Act is a historical step in the Information Technology
Act to make it more effective to combat cyber-crime.

I would conclude with a word of caution for the pro-legislation school


that it should be kept in mind that the provisions of the cyber law are
not made so stringent that it may retard the growth of the industry and
prove to be counter- productive.
Bibliography
The content for this project has been taken from the following
resources :

• https://youtu.be/AVBlvtEthtc

• https://youtu.be/DpjoZGOONiQ

• https://youtu.be/1A3sQO_bQ_E

• https://www.geeksforgeeks.org/cyber-crime/?ref=lbp
Thank You

You might also like