尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
CYBER CRIME
CYBERCRIME REFERS TO
ILLEGAL ACTIVITIES
CONDUCTED IN
CYBERSPACE, TARGETING
COMPUTER SYSTEMS,
NETWORKS, AND
INDIVIDUALS FOR
FINANCIAL GAIN OR
DISRUPTION.
TYPES OF CYBER CRIME
1.PHISING
2.RANSOMEWARE
3.MAN IN THE MIDDLE
4.DENIAL OF SERVICE ATTACK
5.MALWARE
6.CYBER STALKING
7.CYBER BULYING
8.CYBER TERRORISM
9.SPYWARE
10.CRYPTOJACKING etc.
HOW TO PROTECT OURSELVES FROM CYBER CRIME
?
3. BEWARE OF POP-UPS
AND FRAUDULENT EMAILS->
WHEN A POP UP OR A SPAM EMAIL
APPEARS IN YOUR WINDOW AND ASKS
YOU TO SHARE YOUR USERNAME OR
PASSWORD, NEVERFALL FOR THAT
TRAP.
4. MANAGE YOUR SOCIAL
MEDIA SETTINGS->
WHEN YOU ARE WORKING ON
YOUR SOCIAL MEDIA PROFILE, THE
BEST ADVICE IS TO KEEP YOUR
PERSONAL OR PRIVATE
INFORMATION LOCKED FROM
PUBLIC EYES.
Cyber Security Policy is a document
which states in writing how an
organization plans to protect its
physical and information
technology (IT) assets.
An information security policy consists of high
level statements relating to the protection of
information across the business
Policies should define:
1. Scope-Who the policy applies to.
2. Who does the actions defined by the policy?
3. Defines when defined actions are to be done.
Security
Policy
Policy is "a plan or course of action as of a government political part or business intended to influence
and determine decisions action, other matters"
a standard is a more detailed statement of what must be done to comply with policy
practices , procedures and guidelines explain how employees will comply with policy.
For policies to be effective they must be:
• Properly Disseminated
• Read
• Understood
• Agreed-to
Policies require constant modification and maintenance. In order to produce a complete information
security policy, management must define the following three types of information security policies.
Enterprise information security program policies Issue-specific information security policies
Systems-specific information security policies
THE INFORMATION SECURITY POLICY FRAMEWORK
• A policy may state all business information must be adequately protected when being
transferred.
• A supporting data transfer standard builds upon this, requiring that all sensitive information be
encrypted using a specific encryption type and that all transfers are logged.
• A supporting guideline explains the best practices for recording sensitive data transfers, and
provides templates for the logging of these transfers.
• A procedure provides step by step instructions for performing encrypted data transfers and
ensures compliance with the associated policy, standards and guidelines.
A quality information security program begins and ends with
policy. Properly
developed and implemented policies enable the information security
program to function almost seamlessly within the workplace.
• Policy should never conflict with law.
• Policy must be able to stand up in court, if challenged.
• Policy must be properly supported and administered.
"All policies must contribute to the success of the organization.
Management must ensure the adequate sharing of responsibility
for proper use of informaton systems. End users of information
systems should be involved in the steps of policy formulation."
IMPORTANCE OF CYBER SECURITY IN DIGITAL AGE
To make cybersecurity measures explicit, the written norms are required.These norms are known as cybersecurity
standards: the generic sets of prescriptions for an ideal execution of certain measures. The standards may involve
methods, guidelines, reference frameworks, etc. It ensures efficiency of security, facilitates integration and
interoperability, enables meaningful comparison of measures, reduces complexity, and provide the structure for
new developments.
A security standard is "a published specification that establishes a common language, and contains a technical
specification or other precise criteria and is designed to be used consistently, as a rule, a guideline, or a
definition." The goal of security standards is to improve the security of information technology (IT) systems,
networks, and critical infrastructures. The Well-Written cybersecurity standards enable consistency among product
developers and serve as a reliable standard for purchasing security products.
Security standards are generally provided for all organizations regardless of their size or the industry and sector in
which they operate. This section includes information about each standard that is usually recognized as an
essential component of any cybersecurity strategy.
Security Standards
ISO stands for International Organization for Standardization. International Standards make
things to work. These standards provide a world-class specification for products, services and
computers, to ensure quality, safety and efficiency. They are instrumental in facilitating
international trade.
ISO standard is officially established On 23 February 1947. It is an independent, non-
governmental international organization. Today, it has a membership of 162 national
standards bodies and 784 technical committees and subcommittees to take care of standards
development. ISO has published over 22336 International Standards and its related documents
which covers almost every industry, from information technology, to food safety, to
agriculture and healthcare.
ISO
The Information Technology Act also known as ITA-2000, or the IT Act main aims is to provide the legal
infrastructure in India which deal with cybercrime and e-commerce. The IT Act is based on the United
Nations Model Law on E-Commerce 1996 recommended by the General Assembly of United Nations. This act
is also used to check misuse of cyber network and computer in India. It was officially passed in 2000 and
amended in 2008. It has been designed to give the boost to Electronic commerce, e-transactions and related
activities associated with commerce and trade. It also facilitate electronic governance by means of reliable
electronic records.
IT Act 2000 has 13 chapters, 94 sections and 4 schedules. The first 14 sections concerning digital signatures
and other sections deal with the certifying authorities who are licensed to issue digital signature certificates,
sections 43 to 47 provides penalties and compensation, section 48 to 64 deal with appeal to high court,
sections 65 to 79 deal with offences, and the remaining section 80 to 94 deal with miscellaneous of the act
.
IT ACT
COPYRIGHT ACT
The Copyright Act 1957 amended by the Copyright Amendment Act 2012 governs the subject of copyright law in India. This Act is applicable from 21 January 1958. Copyright
is a legal term which describes the ownership of control of the rights to the authors of "original works of authorship" that are fixed in a tangible form of expression. An original
work of authorship is a distribution of certain works of creative expression including books, video, movies, music, and computer programs. The copyright law has been enacted
to balance the use and reuse of creative works against the desire of the creators of art, literature, music and monetize their work by controlling who can make and sell copies of
the work
The copyright act covers the following-
• Rights of copyright owners
• Works eligible for protection
• Duration of copyright
• Who can claim copyright.
The Copyright act does not covers the following-
• Ideas, procedures, methods, processes, concepts, systems, principles, or discoveries
• Works that are not fixed in a tangible form (such as a choreographic work that has not been notated or recorded or an improvisational speech that has not been written
down)
• Familiar symbols or designs
• Titles, names, short phrases, and slogans
• Mere variations of typographic ornamentation,
• lettering, or coloring
Patent law is a law that deals with new inventions. Traditional patent law protect tangible
scientific inventions, such as circuit boards, heating coils, car engines, or zippers. As time
increases patent law have been used to protect a broader variety of inventions such as business
practices, coding algorithms, or genetically modified organisms. It is the right to exclude others
from making, using, selling, importing, inducing others to infringe, and offering a product
specially adapted for practice of the patent.
In general, a patent is a right that can be granted if an invention is:
• Not a natural object or process
• New
• Useful
• Not obvious.
PATENT LAW
Intellectual property rights is a right that allow creators, or owners of patents,
trademarks or copyrighted works to benefit from their own plans, ideas, or other
intangible assets or investment in a creation. These IPR rights are outlined in the
Article 27 of the Universal Declaration of Human Rights. It provides for the right
to benefit from the protection of moral and material interests resulting from
authorship of scientific, literary or artistic productions. These property rights
allow the holder to exercise a monopoly on the use of the item for a specified
period.
IPR (INTELLECTUAL
PROPERTY RIGHTS )
Cyber law (also referred to as cyberlaw) is a term used to describe the legal
issues related to useof communications technology, particularly "cyberspace“.
It deals with the legal aspects of cyberspace, the internet, and computing
Consumers depend on cyber laws to protect them from online fraud.
Laws are made to prevent identity theft, credit card theft, and other financial
crimes that happen online.
A person who commits identity theft may face confederate or state criminal
charges.
They might also encounter a civil action brought by a victim.
• The Cybersecurity and Infrastructure Security Agency (CISA)
• The National Cyber Coordination Centre (NCCC)
• Indian Cybercrime Coordination Centre (I4C)
Cybersecurity Law - China:
China's Cybersecurity Law focuses on enhancing the security of critical information infrastructure and safeguarding
cyberspace. It imposes certain obligations on network operators, including data localization requirements and
cooperation with government cybersecurity reviews.
Personal Data Protection Act (PDPA) - Singapore:
Singapore's PDPA is designed to govern the collection, use, and disclosure of personal data by organizations. It
establishes the rights of individuals to access and correct their personal information and sets out obligations for data
protection.
Information Technology Act, 2000 - India:
India's Information Technology Act, 2000, addresses various aspects of electronic governance and cybercrime. It
criminalizes unauthorized access to computer systems, the transmission of obscene content, and other offenses related
to electronic communication.
SOME OF THE CYBER LAWS OF MAJOR COUNTRY’S
California Consumer Privacy Act (CCPA) - United States:
The CCPA is a state-level privacy law in California, USA. It grants California residents certain rights
regarding their personal information, including the right to know what data is being collected and the
right to request the deletion of personal information.
WHAT TO DO IF A PERSON
BECOMES A VICTIM OF CYBER CRIME ?
STEPS TO FOLLOW AFTER ONE BECOMES VICTIM OF CYBER CRIME
1.DISCONNECT AND DETACH ->
2. TAKE LEGAL ACTION ->
•
•
•
3. INFORM YOUR CONTACTS->
4.TAKE PREVENTIVE STEPS FOR FUTURE->
CASE STUDIES
THANK YOU
Rishik Chaudhary
Priyanshu Mishra
Abhay Kr.
Yashvardhan Rai

More Related Content

Similar to Cyber Crime with basics and knowledge to cyber sphere

Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docx
BestMan28
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
Indian Air Force
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
Melvin DCruz
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
pronab Kurmi
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
mtvvvv
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
Pankaj Nandurkar
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
ShailendraPandey96
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
India cyber
India cyberIndia cyber
India cyber
sabariss
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
cloneseeyom
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Lecture 8.pdf
Lecture 8.pdfLecture 8.pdf
Lecture 8.pdf
abdukadirabdullahuad
 
What is Network security, or Securiing your data Through Network,N.pdf
What is Network security, or Securiing your data Through Network,N.pdfWhat is Network security, or Securiing your data Through Network,N.pdf
What is Network security, or Securiing your data Through Network,N.pdf
anujmkt
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
RobertBhattarai
 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.ppt
ssuseraaf866
 
UNIT V.pptx
UNIT V.pptxUNIT V.pptx
Chapter 5
Chapter 5Chapter 5
Chapter 5
Dr. Muath Asmar
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
nykobap01
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
ijtsrd
 
Cyber law
Cyber lawCyber law
Cyber law
premarhea
 

Similar to Cyber Crime with basics and knowledge to cyber sphere (20)

Ethics assignment.docx
Ethics assignment.docxEthics assignment.docx
Ethics assignment.docx
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
India cyber
India cyberIndia cyber
India cyber
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Lecture 8.pdf
Lecture 8.pdfLecture 8.pdf
Lecture 8.pdf
 
What is Network security, or Securiing your data Through Network,N.pdf
What is Network security, or Securiing your data Through Network,N.pdfWhat is Network security, or Securiing your data Through Network,N.pdf
What is Network security, or Securiing your data Through Network,N.pdf
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 
CR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.pptCR 23 - Legal & Ethical Aspects.ppt
CR 23 - Legal & Ethical Aspects.ppt
 
UNIT V.pptx
UNIT V.pptxUNIT V.pptx
UNIT V.pptx
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Aet531 week6 nnb_final
Aet531 week6 nnb_finalAet531 week6 nnb_final
Aet531 week6 nnb_final
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
 
Cyber law
Cyber lawCyber law
Cyber law
 

More from RISHIKCHAUDHARY2

ARTIFICIAL INTELLEGENCE
ARTIFICIAL INTELLEGENCEARTIFICIAL INTELLEGENCE
ARTIFICIAL INTELLEGENCE
RISHIKCHAUDHARY2
 
CYBER SAFETY PPT
 CYBER SAFETY PPT CYBER SAFETY PPT
CYBER SAFETY PPT
RISHIKCHAUDHARY2
 
PHYSICAL EDUCATION project on 2021 tokyo olympics
 PHYSICAL EDUCATION project on 2021 tokyo olympics PHYSICAL EDUCATION project on 2021 tokyo olympics
PHYSICAL EDUCATION project on 2021 tokyo olympics
RISHIKCHAUDHARY2
 
TRIGNOMETRY PROJECT
 TRIGNOMETRY PROJECT TRIGNOMETRY PROJECT
TRIGNOMETRY PROJECT
RISHIKCHAUDHARY2
 
Poverty in India
Poverty in IndiaPoverty in India
Poverty in India
RISHIKCHAUDHARY2
 
Art integrated project on Sikkim
Art integrated project on SikkimArt integrated project on Sikkim
Art integrated project on Sikkim
RISHIKCHAUDHARY2
 

More from RISHIKCHAUDHARY2 (6)

ARTIFICIAL INTELLEGENCE
ARTIFICIAL INTELLEGENCEARTIFICIAL INTELLEGENCE
ARTIFICIAL INTELLEGENCE
 
CYBER SAFETY PPT
 CYBER SAFETY PPT CYBER SAFETY PPT
CYBER SAFETY PPT
 
PHYSICAL EDUCATION project on 2021 tokyo olympics
 PHYSICAL EDUCATION project on 2021 tokyo olympics PHYSICAL EDUCATION project on 2021 tokyo olympics
PHYSICAL EDUCATION project on 2021 tokyo olympics
 
TRIGNOMETRY PROJECT
 TRIGNOMETRY PROJECT TRIGNOMETRY PROJECT
TRIGNOMETRY PROJECT
 
Poverty in India
Poverty in IndiaPoverty in India
Poverty in India
 
Art integrated project on Sikkim
Art integrated project on SikkimArt integrated project on Sikkim
Art integrated project on Sikkim
 

Recently uploaded

🔥Call Girls In Chandigarh 💯Call Us 🔝 6350257716 🔝💃Top Class Call Girl Service...
🔥Call Girls In Chandigarh 💯Call Us 🔝 6350257716 🔝💃Top Class Call Girl Service...🔥Call Girls In Chandigarh 💯Call Us 🔝 6350257716 🔝💃Top Class Call Girl Service...
🔥Call Girls In Chandigarh 💯Call Us 🔝 6350257716 🔝💃Top Class Call Girl Service...
THE MOST
 
Top UI/UX Design Trends for 2024: What Business Owners Need to Know
Top UI/UX Design Trends for 2024: What Business Owners Need to KnowTop UI/UX Design Trends for 2024: What Business Owners Need to Know
Top UI/UX Design Trends for 2024: What Business Owners Need to Know
Onepixll
 
🔥High Profile Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl ...
🔥High Profile Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl ...🔥High Profile Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl ...
🔥High Profile Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl ...
shasha$L14
 
peru primero de la alianza con el pacifico
peru primero de la alianza con el pacificoperu primero de la alianza con el pacifico
peru primero de la alianza con el pacifico
FernandoGuevaraVentu2
 
Call Girls Jabalpur 7742996321 Jabalpur Escorts Service
Call Girls Jabalpur 7742996321 Jabalpur Escorts ServiceCall Girls Jabalpur 7742996321 Jabalpur Escorts Service
Call Girls Jabalpur 7742996321 Jabalpur Escorts Service
DipikaKaurr
 
Nashik Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Nashik Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort ServiceNashik Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Nashik Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
sabanasarkari36
 
Karol Bagh Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Karol Bagh Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...Karol Bagh Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Karol Bagh Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
sanju baba
 
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENTUnlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
keshavtiwari584
 
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort ServiceVVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
graggunno
 
japie swanepoel_ ai windhoek june 2024.pptx
japie swanepoel_ ai windhoek june 2024.pptxjapie swanepoel_ ai windhoek june 2024.pptx
japie swanepoel_ ai windhoek june 2024.pptx
japie swanepoel
 
Powai Call Girls ☑ +91-9920725232 ☑ Available Hot Girls Aunty Book Now
Powai Call Girls ☑ +91-9920725232 ☑ Available Hot Girls Aunty Book NowPowai Call Girls ☑ +91-9920725232 ☑ Available Hot Girls Aunty Book Now
Powai Call Girls ☑ +91-9920725232 ☑ Available Hot Girls Aunty Book Now
reddyaditi530
 
Call Girls Chennai 📲 8824825030 Chennai Escorts (Tamil Girls) service 24X7
Call Girls Chennai 📲 8824825030 Chennai Escorts (Tamil Girls) service 24X7Call Girls Chennai 📲 8824825030 Chennai Escorts (Tamil Girls) service 24X7
Call Girls Chennai 📲 8824825030 Chennai Escorts (Tamil Girls) service 24X7
vrvipin164
 
Seizing the IPv6 Advantage: For a Bigger, Faster and Stronger Internet
Seizing the IPv6 Advantage: For a Bigger, Faster and Stronger InternetSeizing the IPv6 Advantage: For a Bigger, Faster and Stronger Internet
Seizing the IPv6 Advantage: For a Bigger, Faster and Stronger Internet
APNIC
 
Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...
Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...
Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...
monuc3758 $S2
 
Call Girls Vijayawada 7742996321 Vijayawada Escorts Service
Call Girls Vijayawada 7742996321 Vijayawada Escorts ServiceCall Girls Vijayawada 7742996321 Vijayawada Escorts Service
Call Girls Vijayawada 7742996321 Vijayawada Escorts Service
huse9823
 
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
uqbyfm
 
Call Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl Mahipalpur
Call Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl MahipalpurCall Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl Mahipalpur
Call Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl Mahipalpur
alisha panday
 
Celebrity Navi Mumbai Call Girls 🥰 9967584737 🥰 Escorts Service Available Mumbai
Celebrity Navi Mumbai Call Girls 🥰 9967584737 🥰 Escorts Service Available MumbaiCelebrity Navi Mumbai Call Girls 🥰 9967584737 🥰 Escorts Service Available Mumbai
Celebrity Navi Mumbai Call Girls 🥰 9967584737 🥰 Escorts Service Available Mumbai
komal sharman06
 
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
manalishivani8
 
'Secure and Sustainable Internet Infrastructure for Emerging Technologies'
'Secure and Sustainable Internet Infrastructure for Emerging Technologies''Secure and Sustainable Internet Infrastructure for Emerging Technologies'
'Secure and Sustainable Internet Infrastructure for Emerging Technologies'
APNIC
 

Recently uploaded (20)

🔥Call Girls In Chandigarh 💯Call Us 🔝 6350257716 🔝💃Top Class Call Girl Service...
🔥Call Girls In Chandigarh 💯Call Us 🔝 6350257716 🔝💃Top Class Call Girl Service...🔥Call Girls In Chandigarh 💯Call Us 🔝 6350257716 🔝💃Top Class Call Girl Service...
🔥Call Girls In Chandigarh 💯Call Us 🔝 6350257716 🔝💃Top Class Call Girl Service...
 
Top UI/UX Design Trends for 2024: What Business Owners Need to Know
Top UI/UX Design Trends for 2024: What Business Owners Need to KnowTop UI/UX Design Trends for 2024: What Business Owners Need to Know
Top UI/UX Design Trends for 2024: What Business Owners Need to Know
 
🔥High Profile Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl ...
🔥High Profile Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl ...🔥High Profile Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl ...
🔥High Profile Call Girls Gurgaon 💯Call Us 🔝 9873777170 🔝💃Top Class Call Girl ...
 
peru primero de la alianza con el pacifico
peru primero de la alianza con el pacificoperu primero de la alianza con el pacifico
peru primero de la alianza con el pacifico
 
Call Girls Jabalpur 7742996321 Jabalpur Escorts Service
Call Girls Jabalpur 7742996321 Jabalpur Escorts ServiceCall Girls Jabalpur 7742996321 Jabalpur Escorts Service
Call Girls Jabalpur 7742996321 Jabalpur Escorts Service
 
Nashik Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Nashik Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort ServiceNashik Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
Nashik Call Girls 💯Call Us 🔝 7374876321 🔝 💃 Independent Female Escort Service
 
Karol Bagh Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Karol Bagh Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...Karol Bagh Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Karol Bagh Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
 
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENTUnlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
 
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort ServiceVVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
VVIP Call Girls💯Call Us {{ 7374876321 }} 🔝 💃 Independent Female Escort Service
 
japie swanepoel_ ai windhoek june 2024.pptx
japie swanepoel_ ai windhoek june 2024.pptxjapie swanepoel_ ai windhoek june 2024.pptx
japie swanepoel_ ai windhoek june 2024.pptx
 
Powai Call Girls ☑ +91-9920725232 ☑ Available Hot Girls Aunty Book Now
Powai Call Girls ☑ +91-9920725232 ☑ Available Hot Girls Aunty Book NowPowai Call Girls ☑ +91-9920725232 ☑ Available Hot Girls Aunty Book Now
Powai Call Girls ☑ +91-9920725232 ☑ Available Hot Girls Aunty Book Now
 
Call Girls Chennai 📲 8824825030 Chennai Escorts (Tamil Girls) service 24X7
Call Girls Chennai 📲 8824825030 Chennai Escorts (Tamil Girls) service 24X7Call Girls Chennai 📲 8824825030 Chennai Escorts (Tamil Girls) service 24X7
Call Girls Chennai 📲 8824825030 Chennai Escorts (Tamil Girls) service 24X7
 
Seizing the IPv6 Advantage: For a Bigger, Faster and Stronger Internet
Seizing the IPv6 Advantage: For a Bigger, Faster and Stronger InternetSeizing the IPv6 Advantage: For a Bigger, Faster and Stronger Internet
Seizing the IPv6 Advantage: For a Bigger, Faster and Stronger Internet
 
Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...
Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...
Full Night Fun With Call Girls Lucknow📞7737669865 At Very Cheap Rates Doorste...
 
Call Girls Vijayawada 7742996321 Vijayawada Escorts Service
Call Girls Vijayawada 7742996321 Vijayawada Escorts ServiceCall Girls Vijayawada 7742996321 Vijayawada Escorts Service
Call Girls Vijayawada 7742996321 Vijayawada Escorts Service
 
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
 
Call Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl Mahipalpur
Call Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl MahipalpurCall Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl Mahipalpur
Call Girls In Mahipalpur 🔥 +91-9711199012🔥High Profile Call Girl Mahipalpur
 
Celebrity Navi Mumbai Call Girls 🥰 9967584737 🥰 Escorts Service Available Mumbai
Celebrity Navi Mumbai Call Girls 🥰 9967584737 🥰 Escorts Service Available MumbaiCelebrity Navi Mumbai Call Girls 🥰 9967584737 🥰 Escorts Service Available Mumbai
Celebrity Navi Mumbai Call Girls 🥰 9967584737 🥰 Escorts Service Available Mumbai
 
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
🔥Chennai Call Girls 🫱 8824825030 🫲 High Class Chennai Escorts Service Available
 
'Secure and Sustainable Internet Infrastructure for Emerging Technologies'
'Secure and Sustainable Internet Infrastructure for Emerging Technologies''Secure and Sustainable Internet Infrastructure for Emerging Technologies'
'Secure and Sustainable Internet Infrastructure for Emerging Technologies'
 

Cyber Crime with basics and knowledge to cyber sphere

  • 2.
  • 3. CYBERCRIME REFERS TO ILLEGAL ACTIVITIES CONDUCTED IN CYBERSPACE, TARGETING COMPUTER SYSTEMS, NETWORKS, AND INDIVIDUALS FOR FINANCIAL GAIN OR DISRUPTION.
  • 4. TYPES OF CYBER CRIME 1.PHISING 2.RANSOMEWARE 3.MAN IN THE MIDDLE 4.DENIAL OF SERVICE ATTACK 5.MALWARE 6.CYBER STALKING 7.CYBER BULYING 8.CYBER TERRORISM 9.SPYWARE 10.CRYPTOJACKING etc.
  • 5. HOW TO PROTECT OURSELVES FROM CYBER CRIME ?
  • 6. 3. BEWARE OF POP-UPS AND FRAUDULENT EMAILS-> WHEN A POP UP OR A SPAM EMAIL APPEARS IN YOUR WINDOW AND ASKS YOU TO SHARE YOUR USERNAME OR PASSWORD, NEVERFALL FOR THAT TRAP. 4. MANAGE YOUR SOCIAL MEDIA SETTINGS-> WHEN YOU ARE WORKING ON YOUR SOCIAL MEDIA PROFILE, THE BEST ADVICE IS TO KEEP YOUR PERSONAL OR PRIVATE INFORMATION LOCKED FROM PUBLIC EYES.
  • 7. Cyber Security Policy is a document which states in writing how an organization plans to protect its physical and information technology (IT) assets. An information security policy consists of high level statements relating to the protection of information across the business Policies should define: 1. Scope-Who the policy applies to. 2. Who does the actions defined by the policy? 3. Defines when defined actions are to be done. Security Policy
  • 8.
  • 9. Policy is "a plan or course of action as of a government political part or business intended to influence and determine decisions action, other matters" a standard is a more detailed statement of what must be done to comply with policy practices , procedures and guidelines explain how employees will comply with policy. For policies to be effective they must be: • Properly Disseminated • Read • Understood • Agreed-to Policies require constant modification and maintenance. In order to produce a complete information security policy, management must define the following three types of information security policies. Enterprise information security program policies Issue-specific information security policies Systems-specific information security policies
  • 10. THE INFORMATION SECURITY POLICY FRAMEWORK • A policy may state all business information must be adequately protected when being transferred. • A supporting data transfer standard builds upon this, requiring that all sensitive information be encrypted using a specific encryption type and that all transfers are logged. • A supporting guideline explains the best practices for recording sensitive data transfers, and provides templates for the logging of these transfers. • A procedure provides step by step instructions for performing encrypted data transfers and ensures compliance with the associated policy, standards and guidelines.
  • 11. A quality information security program begins and ends with policy. Properly developed and implemented policies enable the information security program to function almost seamlessly within the workplace. • Policy should never conflict with law. • Policy must be able to stand up in court, if challenged. • Policy must be properly supported and administered. "All policies must contribute to the success of the organization. Management must ensure the adequate sharing of responsibility for proper use of informaton systems. End users of information systems should be involved in the steps of policy formulation." IMPORTANCE OF CYBER SECURITY IN DIGITAL AGE
  • 12. To make cybersecurity measures explicit, the written norms are required.These norms are known as cybersecurity standards: the generic sets of prescriptions for an ideal execution of certain measures. The standards may involve methods, guidelines, reference frameworks, etc. It ensures efficiency of security, facilitates integration and interoperability, enables meaningful comparison of measures, reduces complexity, and provide the structure for new developments. A security standard is "a published specification that establishes a common language, and contains a technical specification or other precise criteria and is designed to be used consistently, as a rule, a guideline, or a definition." The goal of security standards is to improve the security of information technology (IT) systems, networks, and critical infrastructures. The Well-Written cybersecurity standards enable consistency among product developers and serve as a reliable standard for purchasing security products. Security standards are generally provided for all organizations regardless of their size or the industry and sector in which they operate. This section includes information about each standard that is usually recognized as an essential component of any cybersecurity strategy. Security Standards
  • 13. ISO stands for International Organization for Standardization. International Standards make things to work. These standards provide a world-class specification for products, services and computers, to ensure quality, safety and efficiency. They are instrumental in facilitating international trade. ISO standard is officially established On 23 February 1947. It is an independent, non- governmental international organization. Today, it has a membership of 162 national standards bodies and 784 technical committees and subcommittees to take care of standards development. ISO has published over 22336 International Standards and its related documents which covers almost every industry, from information technology, to food safety, to agriculture and healthcare. ISO
  • 14. The Information Technology Act also known as ITA-2000, or the IT Act main aims is to provide the legal infrastructure in India which deal with cybercrime and e-commerce. The IT Act is based on the United Nations Model Law on E-Commerce 1996 recommended by the General Assembly of United Nations. This act is also used to check misuse of cyber network and computer in India. It was officially passed in 2000 and amended in 2008. It has been designed to give the boost to Electronic commerce, e-transactions and related activities associated with commerce and trade. It also facilitate electronic governance by means of reliable electronic records. IT Act 2000 has 13 chapters, 94 sections and 4 schedules. The first 14 sections concerning digital signatures and other sections deal with the certifying authorities who are licensed to issue digital signature certificates, sections 43 to 47 provides penalties and compensation, section 48 to 64 deal with appeal to high court, sections 65 to 79 deal with offences, and the remaining section 80 to 94 deal with miscellaneous of the act . IT ACT
  • 15. COPYRIGHT ACT The Copyright Act 1957 amended by the Copyright Amendment Act 2012 governs the subject of copyright law in India. This Act is applicable from 21 January 1958. Copyright is a legal term which describes the ownership of control of the rights to the authors of "original works of authorship" that are fixed in a tangible form of expression. An original work of authorship is a distribution of certain works of creative expression including books, video, movies, music, and computer programs. The copyright law has been enacted to balance the use and reuse of creative works against the desire of the creators of art, literature, music and monetize their work by controlling who can make and sell copies of the work The copyright act covers the following- • Rights of copyright owners • Works eligible for protection • Duration of copyright • Who can claim copyright. The Copyright act does not covers the following- • Ideas, procedures, methods, processes, concepts, systems, principles, or discoveries • Works that are not fixed in a tangible form (such as a choreographic work that has not been notated or recorded or an improvisational speech that has not been written down) • Familiar symbols or designs • Titles, names, short phrases, and slogans • Mere variations of typographic ornamentation, • lettering, or coloring
  • 16. Patent law is a law that deals with new inventions. Traditional patent law protect tangible scientific inventions, such as circuit boards, heating coils, car engines, or zippers. As time increases patent law have been used to protect a broader variety of inventions such as business practices, coding algorithms, or genetically modified organisms. It is the right to exclude others from making, using, selling, importing, inducing others to infringe, and offering a product specially adapted for practice of the patent. In general, a patent is a right that can be granted if an invention is: • Not a natural object or process • New • Useful • Not obvious. PATENT LAW
  • 17. Intellectual property rights is a right that allow creators, or owners of patents, trademarks or copyrighted works to benefit from their own plans, ideas, or other intangible assets or investment in a creation. These IPR rights are outlined in the Article 27 of the Universal Declaration of Human Rights. It provides for the right to benefit from the protection of moral and material interests resulting from authorship of scientific, literary or artistic productions. These property rights allow the holder to exercise a monopoly on the use of the item for a specified period. IPR (INTELLECTUAL PROPERTY RIGHTS )
  • 18. Cyber law (also referred to as cyberlaw) is a term used to describe the legal issues related to useof communications technology, particularly "cyberspace“. It deals with the legal aspects of cyberspace, the internet, and computing
  • 19. Consumers depend on cyber laws to protect them from online fraud. Laws are made to prevent identity theft, credit card theft, and other financial crimes that happen online. A person who commits identity theft may face confederate or state criminal charges. They might also encounter a civil action brought by a victim.
  • 20. • The Cybersecurity and Infrastructure Security Agency (CISA) • The National Cyber Coordination Centre (NCCC) • Indian Cybercrime Coordination Centre (I4C)
  • 21. Cybersecurity Law - China: China's Cybersecurity Law focuses on enhancing the security of critical information infrastructure and safeguarding cyberspace. It imposes certain obligations on network operators, including data localization requirements and cooperation with government cybersecurity reviews. Personal Data Protection Act (PDPA) - Singapore: Singapore's PDPA is designed to govern the collection, use, and disclosure of personal data by organizations. It establishes the rights of individuals to access and correct their personal information and sets out obligations for data protection. Information Technology Act, 2000 - India: India's Information Technology Act, 2000, addresses various aspects of electronic governance and cybercrime. It criminalizes unauthorized access to computer systems, the transmission of obscene content, and other offenses related to electronic communication. SOME OF THE CYBER LAWS OF MAJOR COUNTRY’S
  • 22. California Consumer Privacy Act (CCPA) - United States: The CCPA is a state-level privacy law in California, USA. It grants California residents certain rights regarding their personal information, including the right to know what data is being collected and the right to request the deletion of personal information.
  • 23. WHAT TO DO IF A PERSON BECOMES A VICTIM OF CYBER CRIME ?
  • 24. STEPS TO FOLLOW AFTER ONE BECOMES VICTIM OF CYBER CRIME 1.DISCONNECT AND DETACH -> 2. TAKE LEGAL ACTION -> • • •
  • 25. 3. INFORM YOUR CONTACTS-> 4.TAKE PREVENTIVE STEPS FOR FUTURE->
  • 26.
  • 28.
  • 29.
  • 30. THANK YOU Rishik Chaudhary Priyanshu Mishra Abhay Kr. Yashvardhan Rai
  翻译: