Cy L Campaign
-
Upload
ranjita-naik -
Category
Documents
-
view
221 -
download
0
Transcript of Cy L Campaign
-
7/26/2019 Cy L Campaign
1/15
-
7/26/2019 Cy L Campaign
2/15
The internet in India is growing rapidly. Ithas given rise to new opportunities inevery field we can think of be it
entertainment, business, sports oreducation
There are two sides to a coin. Internet alsohas its own disadvantages. One of the
major disadvantages is Cyber crimeillegalactivity committed on the internet
-
7/26/2019 Cy L Campaign
3/15
Cybercrime is criminal activity done usingcomputers and the internet.
This includes anything from downloadingillegal music files to stealing millions ofdollars from online bank accounts.
Cybercrime also includes non-monetaryoffences, such as creating and distributingviruses on the other computers or postingconfidential business information on theinternet.
-
7/26/2019 Cy L Campaign
4/15
Cyber crimes can be basically divided into3 major categories:
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government
-
7/26/2019 Cy L Campaign
5/15
Hacking
Cyber stalking
Spamming
Cyber pornography
Phishing
Web jacking
Cyber terrorism Email spoofing etc
-
7/26/2019 Cy L Campaign
6/15
The advancement of the telecommunication technology there
is increase in cyber crime in the nation. The technological
advancement provided opportunities to the miscreants in the
society, who are using technology for their selfish gains, like
identity theft, harassment etc.
-
7/26/2019 Cy L Campaign
7/15
(1) BLUEBUGGING
(2) VISHING(3) MALWARE
(4) SMISHING
-
7/26/2019 Cy L Campaign
8/15
Turn on Blue Tooth or enable Internet onlywhen required.
Do turn off the wireless connections when not
needed. Regularly update the cell phone software.
Install latest Anti Virus Software, and keep itupdated.
Use strong passwords to lock your cell phone. Never share personal information with stranger
Never store personal banking details in cellphones.
-
7/26/2019 Cy L Campaign
9/15
Use Strong Passwords
Secure your computer1. Activate your firewall
2. Use anti-virus/malware software
Secure your Mobile Devices
Install the latest operating system updates
Protect your Data
Secure your wireless network
Call the right person for help
-
7/26/2019 Cy L Campaign
10/15
to provide legal recognition for transactions
carried out by means of electronic data
interchange and other means of electronic
communication, commonly referred to as"electronic commerce",
-
7/26/2019 Cy L Campaign
11/15
Section 43-Penalty and Compensation for damage tocomputer, computer system, etc
Section 65-Tampering with Computer Source
Documents
Section 66-Computer Related Offences Email password Hacking
Section 67-Punishment for publishing or
transmitting obscene material in electronic form
Section 69-Decryption of information
Section 70-Accessing protected system
Section 71-Misrepresntation
-
7/26/2019 Cy L Campaign
12/15
Posting
Personal information
Pornography
-
7/26/2019 Cy L Campaign
13/15
Disable and log off a specific useraccount to prevent access.
Disable and log off a group of useraccounts which access a particularservice that is being attacked.
Disable and dismount specific (network)devices, for instance disk devices thatare being swamped
-
7/26/2019 Cy L Campaign
14/15
Disable specific applications, forexample, an e-mail system subjected toa SPAM attack.
Close down an entire system, and divert
processing to an alternative or backupservice on a secondary network
-
7/26/2019 Cy L Campaign
15/15
Thank you