You are on page 1of 15

The

internet in India is growing rapidly. It


has given rise to new opportunities in
every field we can think of be it
entertainment, business, sports or
education
There are two sides to a coin. Internet also
has its own disadvantages. One of the
major disadvantages is Cyber crime illegal
activity committed on the internet

Cybercrime

is criminal activity done using


computers and the internet.

This

includes anything from downloading


illegal music files to stealing millions of
dollars from online bank accounts.

Cybercrime

also includes non-monetary


offences, such as creating and distributing
viruses on the other computers or posting
confidential business information on the
internet.

Cyber

crimes can be basically divided into


3 major categories:
1. Cyber crimes against persons.
2. Cyber crimes against property.

3. Cyber crimes against government

Hacking
Cyber

stalking
Spamming
Cyber pornography
Phishing
Web jacking
Cyber terrorism
Email spoofing etc

The advancement of the telecommunication technology there


is increase in cyber crime in the nation. The technological
advancement provided opportunities to the miscreants in the
society, who are using technology for their selfish gains, like
identity theft, harassment etc.

(1) BLUEBUGGING
(2) VISHING
(3) MALWARE
(4) SMISHING

Turn on Blue Tooth or enable Internet only


when required.
Do turn off the wireless connections when not
needed.
Regularly update the cell phone software.
Install latest Anti Virus Software, and keep it
updated.
Use strong passwords to lock your cell phone.
Never share personal information with stranger
Never store personal banking details in cell
phones.

Use

Strong Passwords
Secure your computer
1. Activate your firewall
2. Use anti-virus/malware software
Secure your Mobile Devices
Install the latest operating system updates
Protect your Data
Secure your wireless network
Call the right person for help

to provide legal recognition for transactions


carried out by means of electronic data
interchange and other means of electronic
communication, commonly referred to as
"electronic commerce",

Section

43-Penalty and Compensation for damage to


computer, computer system, etc
Section 65-Tampering with Computer Source
Documents
Section 66-Computer Related Offences

Email password Hacking

Section

67-Punishment for publishing or


transmitting obscene material in electronic form
Section 69-Decryption of information
Section 70-Accessing protected system
Section 71-Misrepresntation

Posting
Personal

information
Pornography

Disable and log off a specific user


account to prevent access.
Disable and log off a group of user
accounts which access a particular
service that is being attacked.
Disable and dismount specific (network)
devices, for instance disk devices that
are being swamped

Disable specific applications, for


example, an e-mail system subjected to
a SPAM attack.

Close down an entire system, and divert


processing to an alternative or backup
service on a secondary network

Thank you

You might also like