X

Download Cybercrime PowerPoint Presentation

SlidesFinder-Advertising-Design.jpg

Login   OR  Register
X


Iframe embed code :



Presentation url :

Home / Computers & Web / Computers & Web Presentations / Cybercrime PowerPoint Presentation

Cybercrime PowerPoint Presentation

Ppt Presentation Embed Code   Zoom Ppt Presentation

PowerPoint is the world's most popular presentation software which can let you create professional Cybercrime powerpoint presentation easily and in no time. This helps you give your presentation on Cybercrime in a conference, a school lecture, a business proposal, in a webinar and business and professional representations.

The uploader spent his/her valuable time to create this Cybercrime powerpoint presentation slides, to share his/her useful content with the world. This ppt presentation uploaded by worldwideweb in Computers & Web ppt presentation category is available for free download,and can be used according to your industries like finance, marketing, education, health and many more.

About This Presentation

Cybercrime Presentation Transcript

Slide 1 - Cybercrimes Online crime
Slide 2 - Overview of Cybercrimes Information Security and Cyber Crimes: The objective of this message is to educate and create awareness amongst the public on use of Technology, Internet media and its implications on possible cyber crimes. Some of the possible preventive measures, one can take to avoid getting victimized for a cyber crime
Slide 3 - At the end of this presentation you will learn What is Cyber Crime Types of Cyber Crime Threats & Trends of Cyber Crime
Slide 4 - Criminals & Internet Cyber Laws Cyber crime is a generic term that refers to all criminal activities done using the medium of computers, the internet, cyber space and the worldwide web. "Cyber Security“ means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction. Cyber law is a term used to describe the legal issues related to use of communications technology, particularly "cyberspace", i.e. the Internet. Cyber Law is represented by Indian IT ACT 2008
Slide 5 - Cyber Crime – Motivation Money/Greed Curiosity Revenge Fun Praise seekers
Slide 6 - Cyber Crime – Upward Trends • Huge increase in the use of Internet and smart phones • Individuals share personal and work related information on Internet •Critical and sensitive information are shared on Internet • Financial transactions take place on Internet • Security controls are never 100% and adequate • BAD guys are always ahead of GOOD guys
Slide 7 - Cyber Crime - Its No more a fun Committing any crime using cyber space (using internet) is no more fun as there are stringent laws.
Slide 8 - Common Cyber-crime scenarios and Applicability of Legal Sections Let us look into some common cyber-crime scenarios which can attract prosecution as per the penalties and offences prescribed in IT Act 2000 (amended via 2008) Act and Indian Penal Codes.
Slide 9 - ATM Card Fraud and Lottery Fraud Committing cheating by impersonation in the name of bank manager or e.g. using names and logos of reputed companies Provisions Applicable:- Sections 66C, 66D of IT Act and section 420 of the IPC.
Slide 10 - Harassment via fake public profile on social networking site Creation of fake profile in social media using personal details of others like picture, name and other data Provisions Applicable:- Sections 66C of IT Act and 500 of IPC
Slide 11 - Online Hate Community Uploading mainly in social media and in other websites etc with intent to spread communal hatred Provisions Applicable: Section and 153/153A / 153B/295/295A/504/505 of the Indian Penal Code.
Slide 12 - Email Account Hacking Making unauthorized access / hacking of mail ID , any type of social network IDs, websites etc Provisions Applicable:- Section 66 of Information Technology Act
Slide 13 - Creation of fake websites mainly for cheating or defamation If any fake website or alike website is created for the purpose of cheating or defamation to any organization where identical features and logos are used. Provisions Applicable:- 66D of IT Act and 468/469/471/419/420 IPC
Slide 14 - Introducing malignant contents, alteration and deletion of data etc If any virus, worm, trojan,bug,backdoor,rootkit etc are introduced in any computer system or if any alteration , deletion of data or unauthorized copying or erasing are made. Provisions Applicable:- Punishable under section 66 of IT Act
Slide 15 - Cyber Terrorism If with intent to threaten the unity , integrity , security or sovereignty of country or to strike terror in the people or for any act which may cause denial of services of computer system Punishable u/s 66F of IT act
Slide 16 - Online sale of illegal Articles Where sale of narcotics, drugs weapons and wildlife is facilitated by the Internet Provisions Applicable:- Generally conventional laws are applied in these cases.
Slide 17 - Phishing and Email Scams Phishing involves fraudulently acquiring sensitive information through masquerading a site as a trusted entity. (E.g. Passwords, credit card information) Provisions Applicable:- section 66D of IT Act and Section 419/420 of IPC
Slide 18 - Theft of Confidential Information (Data Theft) Many business organizations store their confidential information in computer systems. This informations are targeted by rivals, criminals and disgruntled employees. Provisions Applicable:- Sections 72/72A of IT Act and 406/408 of Indian Penal Code
Slide 19 - Source Code Theft Source code generally is the most coveted and important “crown jewel” asset of a company. If intentionally destroys or alteration of source of code is committed which is punishable under the following section of law. Provisions applicable:- Section 65 of IT Act and Section 63 of Copyright Act.
Slide 20 - Uploading of videos/pictures having sexual/pornographic contents Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest and for defamation of woman/girl. It is punishable u/s 67/67A/67B of IT Act and 354D/500/509 IPC which may extent to more than 7 years. If morphing is made in the sexual material then sections 67/67A/67B of IT Act and 465/469/471/354D/500/509 IPC
Slide 21 - Cyber Crime Curiosity and Revenge may be primary reasons for a perpetrator to get motivated for a cyber crime. Most of the times, people are not aware about the implications of cyber crimes/laws Girls are the most found victims of a cyber crimes Monetary un-lawful or quick Gain/profit
Slide 22 - Common Scenarios - Defamatory Post It is usually found that a victim shares photographs and personal videos in good faith at the time of good relationship but the same photographs and videos can be edited and uploaded in different social media sites and bad websites in the pretext of revenge, defame, blackmail etc. “Dos and don'ts" Do not share your personal photographs and videos to anyone, Always secure your Profile picture in the social media, do not accept friend requests from un-known persons.
Slide 23 - Vishing calls (BANKING FRAUD) IT IS ALSO COMMON THAT ONE RECEIVES FRAUD CALL FROM UNKNOWN MOBILE NUMBERS REVEALING THEMSELVES AS BANK MANAGERS OF REPUTED BANK AND IN THE NAME OF GIVING SERVICE MANAGES TO COLLECT THE DEBIT CARD DETAILS AND OTP’S, EVENTUALLY SYPHONING THE AMOUNT FROM THE VICTIMS’ BANK ACCOUNT. "Dos and Don'ts" DO NOT ENTERTAIN ANY CALL WHO POSES AS CALLING FROM BANK AUTHORITIES DO NOT AT ANY CONDITION SHARE YOUR OTP’S TO ANY ONE DO NOT SHARE YOUR “BANKING “SECURE PIN” BANK NEVER ASK FOR ANY CARD NO OR OTP’S OR PIN NO. ETC
Slide 24 - FACEBOOK RELATED FRAUD Fraudsters these days use face book as the platform to cheat innocent people, the fraudster creates an fancy face book profile (foreigners) and sends friend requests which gets accepted by common victims. Over a period of time and several conversations once the fraudster has relevant information about the victim (birthdays, anniversary, etc) he poses to have sent gifts from abroad having high values, the victim then gets call of confirmation from airport customs that a gift has come which has high value and needs payment for clearance, the victim pays the initial amount and there on keeps on receiving call demanding money for more clearance and at the day gets cheated. "Dos and Don'ts" DO NOT ACCEPT FRIEND REQUEST FROM UNKNOWN PERSONS ON FACEBOOK OR ANY SOCIAL MEDIA. DO NOT PAY FOR ANY GIFTS
Slide 25 - Fake website related recruitment fraud: A fraudster creates alike website copying the entire details from the Original Organisation and they upload the false results containing the name of the candidates (victims), charges money from innocent youths pursuing a career. Who pay them in the belief of getting Job? But later finds out at the time of Joining that the entire process was a fraud. Dos & Don’ts Do not believe in touts as there are no ways they can land you to a Job. Look the URL of the website carefully. Contact with the admin (contact details are available in google) of the website before believing it.
Slide 26 - Insurance Fraud: Fraudster mainly targets senior citizens and generally contact them during the noon hours, in the name of reopening the lapsed Insurance, they also visit their houses and convinces the victim to issue cheques or and at times provides an erasing pen to sign the cheque which they later encash, thereby cheating the elderly people of huge fund. They also issues new insurances in the name of the victim as they get a majority of the commission for this. "Dos and Don'ts" Do not allow insurance agents to your house in respect this sort of call.
Slide 27 - Retired Servicemen Fraud: Fraudster mainly posing as to be calling from the central team calls retired persons and informs them that they have sum of money which is due as arrear which will be credited to the their account. But in order to avail the same the victim needs to pay processing fees to different bank accounts. At the end after paying the processing fees the amount never gets credited to the victims account and thereby gets cheated. "Dos and Don'ts" Do not entertain such type of calls, verify from your former department about any increment or arrears. Departments never says to pay processing fees into personal bank account
Slide 28 - Other Common Cyber Crimes Cyber crimes can be categorized and listed in multiple ways, however some of the other common cyber crimes observed are as below but not limited to : • Cyber stalking • Cyber Bullying • Installing Key loggers • Cyber Terrorism • Email based Frauds • Web jacking • Online Gambling • DoS Attacks
Slide 29 - Security Awareness
Slide 30 - Security Awareness • Passwords are the only and/OR the primary option to ensure privacy of your information • Ensure Passwords are complex in nature •Do not write passwords •Do Not Keep your Display Pic (DP) in Whatsapp open to everyone • Do Not Accept friend request from unknown person. • Keep your photos in Facebook secured • Log- out from all devices after completing your work.
Slide 31 - Security Awareness – Social Media Social Media (FB, twitter, etc) is now an integral part of our daily life Be sensitive in what you upload on your social networking account (status, pics, etc) Use security and privacy options provided by social media sites SMS based second factor authentication Access control (who can see what) Browser /machine mapping to your social media profile Block Keep your personal details, personal.
Slide 32 - Security Awareness - Smart mobile devices • Connect to ONLY authorized wifi access • Use auto lock features • Download apps from authorized app stores ONLY • Use Privacy options provided by various mobile Operating system • Do NOT accept calls from weird numbers OR do not give a call back
Slide 33 - Thank You.