[Audio] . SANDIP FOUNDATION Sandip Institute Of Technology and Research center Name: Ashish Kumar Shrivastva Div : A Branch : CSE Roll No. 141 Subject Social Media and Content Creation Guidance By : Prof. A. S. Hake Ma'am.
[Audio] . CYPENCRI E ECORITY.
[Audio] INTRODUCTION CYBER CRIME Cybercrime is best considered as a collection of acts or conducts Acts are based on the material offence object that affects the computer data or systems. Takes place over electronic communications or information systems The unusual characteristic of cybercrime is that the victim and the offender may never come into direct contact.
[Audio] HISTORY OF CYBER CRIME THE FIRST MAJOR WAVE OF CYBER CRIME ATTACK WAS REPORTED IN THE LATE 80'S,WITH THE PROLIFERATION OF EMAILS. THE CYBER CRIMES TOOK OFF IN THE EARLY 2000'S WHEN SOCIAL MEDIA CAME TO LIFE THE GLOBAL CYBER CRIME INDUSTRY GENERATES A LOT OF REVENUE ANUALLY.
[Audio] CYBERCRIMES. CYBERCRIMES.
[Audio] SCAMS DATA THEFT Any fraudulent business practice that extracts money from an unsuspecting, ignorant person is called a Scam. Internet Scams are different methodologies of fraud, facilitated by cybercriminals on the Internet. Scams can happen in a myriad of ways- via phishing emails, social media, SMS messages on your mobile phone, fake tech support phone calls, scareware and more. The main purpose of these types of scams can range from credit card theft, capturing user login and password credentials and even identity theft. Data theft refers to the cybercrime that takes place when fraudsters or hackers gain illegal access to certain sensitive and private information that is not meant to be shared publicly. In other words, it refers to stealing information that is used later unethically eventually causing harm to big organizations. One such incident can collapse a huge organization by stealing someone’s identity, address, and position..
[Audio] MAN-IN-THE-MIDDLE(MitM) ATTACKS PIRACY Software Piracy refers to obtaining files for which you don't have the right to use or download from the Internet. Most items that are protected under copyright law are available against a payment. Violating this is known as Piracy. For example, a movie or a photograph or a video etc. is copyrighted in the favour of the creator/owner/producer. A product protected by copyright law cannot be downloaded, copied, reproduced or resold without their permission It can be defined as the process of intercepting and altering communications between two parties without their knowledge or consent, allowing the attackers to eavesdrop,modify,or inject malicious content into the communication..
[Audio] IT IS BASED ON THE UNITED NATIONS MODEL LAW ON ELECTRONICS COMMERCE 1996. IT IS THE PRIMARY LAW IN INDIA WHICH DEALS WITH CYBERCRIME AND ELECTRONIC COMMERCE,WHICH CAME INTO FORCE ON OCTOBER 17, 2000 . THE MAIN PURPOSE OF THIS ACT IS TO PROVIDE LEGAL RECOGNITION TO ELECTRONIC COMMERCE AND TO FACILITATE FILING OF ELECTRONIC RECORDS WITH THE GOVERNMENT. IT/CYBER CRIME ACT OF INDIA.
[Audio] SECTION 65 TAMPERING WITH COMPUTER SOURCE DOCUMENTS SECTION 66F CYBER TERRORISM SECTION 66 HACKING OF COMPUTER SYSTEMS,DATA ALTERATION A criminal act perpetrated by the use of computer/telecommunication resulting in violence to fear among country's population. A person knowingly altering any computer code or a network when it’s required to be kept or maintained. ANY PERSON DESTROYS OR DELETES OR ALTERS INFORMATION RESIDING IN ANY COUMPUTER SOURCE OF AN ORGANIZATION BY ANY MEANS. Punishment: The punishment would be upto three years IN JAIL AND upto two lakh rupees. Punishment: THE PUNISHMENT MAY LEAD TO IMPRISONMENT OF LIFE. Punishment: THE PUNISHMENT MAY LEAD TO IMPRISONMENT FOR THREE YEARS AND TWO LAKH FINE OR BOTH..
[Audio] SECTION 66C IDENTIFY THEFT ANY PERSON FRAUDENTLY MAKING USE OF ELECTRONIC SIGNATURE AND PASSWORD OF OTHER PERSON. PUNISHMENT : THE PUNISHMENT WOULD BE JAIL AND FINE UPTO ONE LAKH. SECTION 66E PUNISHMENT FOR VIOLATION OF PRIVACY ANYONE CAPTURING OR DISCLOSING ANY PERSON'S INFORMATION WITHOUT HIS CONSENT COME UNDER VIOLATION OF PRIVACY. PUNISHMENT : THE PUNISHMENT WOULD BE THREE YEARS IN JAIL OR FINE NOT EXCEEDING TWO LAKHS, OR WITH BOTH ..
[Audio] WHAT IS CYBER SECURITY ? Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes..
[Audio] It provides protection against worms, viruses, spyware and other unwanted programs. It protects the personal and sensitive data of an individual and organizations from being stolen. ADVANTAGES OF CYBER SECURITY The cyber security will defend us from critical attacks It will defend us from hack and viruses..
[Audio] ADVANTAGES OF CYBER SECURITY IN BUSINESS In business cybersecurity helps in increasing the productivity Inspires customer confidence which helps the customer having faith in the company It helps in protecting your business, employess can use the system without threats Stops your website from going down.
[Audio] 72% of data breach victims are large businesses In January 2019 alone, 1.76 billion records were leaked from various data breaches around the world. Effect of cybercrime in various famous organisations..
[Audio] Analysis of cybercrime in India Impact of cybercrime on different countries According to a survey by Ipsos, the frequency of complaint filed by Indians are much higher, that is, 32% higher compared with that of the U.S., U.K. and other technologically advanced countries where it ranges only about 11-15%. The 32% data is for the complained cases let alone the non complained ones The United States suffered the most high-profile cyber-attacks with 156 separate incidents between May 2006 and June 2020..
[Audio] More than 90 per cent - are male. Around 80 per cent are under 30 years old. Around 60 per cent, started at very young age [10 and 15 years old]. More than 90 per cent - are male. 90 per cent do not have a low socioeconomic status. above average intelligence and Well Educated Motives Espionage Financial Gain Fun "challenge to beat the system.".
[Audio] Cybercrime is not just a technical problem. Cybercriminals, hackers, social engineers play with human emotions. They play them like a piano. They know what buttons to push to get a specific reaction. So what can we do? What can we do to become a human firewall?.
[Audio] SAFETY TIPS Protect yourself from cyber attacks.
[Audio] Stay safe on the Internet Do not enter your credentials and personal information in insecure websites Use secure password (3tM^yh!xWhZJ%@k5#Ti9NCH#5d$WwG) Use a password manager Turn on 2-factor authentication Lock your social media account Be careful when interacting with unknown people on the internet Limit the use of public WiFi Do not use pirated software Be careful when downloading from torrents Install an antivirus.
[Audio] Staying safe in day-to-day life When you get call from a unknown number make sure it's not a video call Be extra careful when calling business numbers listed on google You don't need to enter your UPI pin while receiving payment from someone..
[Audio] Dealing with a scam / cybercrime Stay calm and block contact with them to prevent further getting entrapped in their trap Immediately file a report in your nearest police station or cyber cell or by registering a complaint on https://www.cybercrime.gov.in/ If you have been scammed of your money then immediately report it to your bank According to the Reserve Bank of India (RBI), if you become a victim of an illegal electronic transaction, then your responsibility can be zero. But, this will happen only if you inform your bank about this immediately. Reset your passwords Protect yourselves from further risks.
[Audio] With the rise in technology, crime is no longer limited to banks and petty thefts. Cyber crime is indeed getting the recognition it deserves..
[Audio] CONCLUSION PAUSE TAKE A MOMENT, PATIENCE IS THE KEY THINK DON'T GET INTIMIDATED. ACT FOLLOW THE REQUIRED SAFTEY TIPS. CYBERSECURITY BEGINS WHEN WE PAUSE A MOMENT AND THINK BEFORE CLICKING A LINK. THIS SIMPLE ACT CAN PREVENT ENORMOUS DISASTERS THAT CAN CRIPPLE AN ORGANIZATION..
[Audio] Thank You for Watching. Thank You for Watching.