0% found this document useful (0 votes)
397 views13 pages

Cybercrime

This document provides an overview of cybercrime. It begins with defining cybercrime as crimes that involve computers and networks, where the computer may be the target or used to enable the crime. It then discusses the history of cybercrime from the 1970s to modern cases. Economic impacts are also reviewed, such as estimated costs of cybercrime being between $445-600 billion by 2014. Common types of cybercrime like financial fraud, harassment, and drug trafficking are described. Popular targets include personal devices, small businesses, healthcare, and financial institutions. The document also outlines major cybercrime cases in India, relevant cyber laws, and prevention strategies like using strong passwords and security software.

Uploaded by

Meharpreet Kaur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
397 views13 pages

Cybercrime

This document provides an overview of cybercrime. It begins with defining cybercrime as crimes that involve computers and networks, where the computer may be the target or used to enable the crime. It then discusses the history of cybercrime from the 1970s to modern cases. Economic impacts are also reviewed, such as estimated costs of cybercrime being between $445-600 billion by 2014. Common types of cybercrime like financial fraud, harassment, and drug trafficking are described. Popular targets include personal devices, small businesses, healthcare, and financial institutions. The document also outlines major cybercrime cases in India, relevant cyber laws, and prevention strategies like using strong passwords and security software.

Uploaded by

Meharpreet Kaur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

CYBERCRIME

Presented by :
Meharpreet Kaur
Btech. Biotechnology(BT1)
First year
For the subject : Professional Communication
Submitted to : Ms. Sukhpreet Kaur
INDEX
• What is cybercrime?
• History
• Economic impact
• Types of cybercrime
• Targets
• Cybercrime activity
• Major cybercrimes in India
• Cyber laws in India
• Prevention
• Conclusion
What is cybercrime?
• Crime that involves a computer and a network,
where the computer may have been a target or may
have been used to commission the crime.

• It may threaten a person or nation’s security and


financial health.

• Cybercrime crossing national borders and


involving a crime committed by at least one nation-
state is referred to as cyber warfare.

• Examples: identity theft, human and drug


trafficking, hacking, etc
HISTORY
• In the beginning of 1970s, crimes over telephones
were committed. The perpetrators were called
Phreakers.

• The first person to be convicted of cybercrime


was Ian Murphy, also known as Captain Zap, in
1981. He hacked the American telephone company
to manipulate their internal clock, so that users
could make free calls at peak times.

• The first cyber criminal in India, Amit Tiwari had


been on the watch list since 2003 until he was
finally caught in 2011.
ECONOMIC IMPACT
The country with the highest rate of cyber
crime is USA (23.9%) followed by China
(9.63%) .

• Estimated cost of cybercrime up to 2014-


between $445 and $600 billion, by a study
conducted by CSIS and McAfee.

• As of February 2018, Indian companies lost


USD 500,000 according to CISCO 2018 Annual
Cyber security report.
Types
• Financial fraud
Dishonest misinterpretation of a fact intended to let
another do or refrain from doing something that
causes loss.

• Online harassment /Cyber bullying/ Internet Trolls


Direct obscenities and derogatory comments at
specific individuals of a race, gender, colour, etc.

• Drug trafficking

• Cyber terrorism
Politically motivated use of computers and IT to
cause serious disruption and fear in society
TARGETS
• Personal Computers and Phones
- Also know as ‘Crypto-jacking’ i.e. stealth of using a computing
device to mine crypto-currency.
- Most of the apps being used are resource thirsty.

• Small Businesses
- have less setup to secure endpoints and stop an attack.

• Healthcare
- Most data rich industry.
- contain the most personal data related to a person.

• Financial Institutions/Banks
- Popular as most crypto-currencies are untraceable.
- According to IBM X-Force, more than 200 million records of
financial services were breached in 2017.
Cybercrime activity throughout 2015-16
Major cybercrimes in India
• SIM swap fraud
- In August 2018, Mumbai, Worked by getting SIM card
information through illegal means.

• Phishing attacks on Wipro


- Reportedly done through a gift card fraud.

• Cyber attack on Cosmos bank


- In August 2018, Pune
- Hacked servers and stole credit and debit card information.
- 94.4 Crore rupees transferred to various bank accounts in
Hong Kong
Cyber laws in India
IT act enacted on 17th October 2000.
Based on UNCITRAL model of International Commercial
Arbitration.

• Section 66- Hacking a computer system


- Imprisonment up to 3 years with a fine of 5 Lakhs

• Section 66B- Receiving stolen devices


- Imprisonment up to 3 years with a fine of 1 Lakhs

• Section 66E- Publishing private pictures of a person


- Imprisonment up to 3 years with a fine of 3 Lakhs

• Section 66F- Acts of cyber terrorism


- Imprisonment up to lifetime
Prevention
• Using strong passwords.

• Using updated and genuine software.

• Managing social media settings.

• Using a full time internet and overall security software.

• Practicing safe web surfing.


Conclusion
Though there are not a lot of people who are victims of
cybercrime, they are still at risk. There is no guarantee that one is
completely safe from all these attacks. So, it is best for us to make
sure that we make safe use of the internet.

Also, it is important to sensitize people about the repercussions of


their actions on the internet and the impact they might have on
someone else’s life.
THANK YOU!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy