Cy L Campaign

download Cy L Campaign

of 15

Transcript of Cy L Campaign

  • 7/26/2019 Cy L Campaign

    1/15

  • 7/26/2019 Cy L Campaign

    2/15

    The internet in India is growing rapidly. Ithas given rise to new opportunities inevery field we can think of be it

    entertainment, business, sports oreducation

    There are two sides to a coin. Internet alsohas its own disadvantages. One of the

    major disadvantages is Cyber crimeillegalactivity committed on the internet

  • 7/26/2019 Cy L Campaign

    3/15

    Cybercrime is criminal activity done usingcomputers and the internet.

    This includes anything from downloadingillegal music files to stealing millions ofdollars from online bank accounts.

    Cybercrime also includes non-monetaryoffences, such as creating and distributingviruses on the other computers or postingconfidential business information on theinternet.

  • 7/26/2019 Cy L Campaign

    4/15

    Cyber crimes can be basically divided into3 major categories:

    1. Cyber crimes against persons.

    2. Cyber crimes against property.

    3. Cyber crimes against government

  • 7/26/2019 Cy L Campaign

    5/15

    Hacking

    Cyber stalking

    Spamming

    Cyber pornography

    Phishing

    Web jacking

    Cyber terrorism Email spoofing etc

  • 7/26/2019 Cy L Campaign

    6/15

    The advancement of the telecommunication technology there

    is increase in cyber crime in the nation. The technological

    advancement provided opportunities to the miscreants in the

    society, who are using technology for their selfish gains, like

    identity theft, harassment etc.

  • 7/26/2019 Cy L Campaign

    7/15

    (1) BLUEBUGGING

    (2) VISHING(3) MALWARE

    (4) SMISHING

  • 7/26/2019 Cy L Campaign

    8/15

    Turn on Blue Tooth or enable Internet onlywhen required.

    Do turn off the wireless connections when not

    needed. Regularly update the cell phone software.

    Install latest Anti Virus Software, and keep itupdated.

    Use strong passwords to lock your cell phone. Never share personal information with stranger

    Never store personal banking details in cellphones.

  • 7/26/2019 Cy L Campaign

    9/15

    Use Strong Passwords

    Secure your computer1. Activate your firewall

    2. Use anti-virus/malware software

    Secure your Mobile Devices

    Install the latest operating system updates

    Protect your Data

    Secure your wireless network

    Call the right person for help

  • 7/26/2019 Cy L Campaign

    10/15

    to provide legal recognition for transactions

    carried out by means of electronic data

    interchange and other means of electronic

    communication, commonly referred to as"electronic commerce",

  • 7/26/2019 Cy L Campaign

    11/15

    Section 43-Penalty and Compensation for damage tocomputer, computer system, etc

    Section 65-Tampering with Computer Source

    Documents

    Section 66-Computer Related Offences Email password Hacking

    Section 67-Punishment for publishing or

    transmitting obscene material in electronic form

    Section 69-Decryption of information

    Section 70-Accessing protected system

    Section 71-Misrepresntation

  • 7/26/2019 Cy L Campaign

    12/15

    Posting

    Personal information

    Pornography

  • 7/26/2019 Cy L Campaign

    13/15

    Disable and log off a specific useraccount to prevent access.

    Disable and log off a group of useraccounts which access a particularservice that is being attacked.

    Disable and dismount specific (network)devices, for instance disk devices thatare being swamped

  • 7/26/2019 Cy L Campaign

    14/15

    Disable specific applications, forexample, an e-mail system subjected toa SPAM attack.

    Close down an entire system, and divert

    processing to an alternative or backupservice on a secondary network

  • 7/26/2019 Cy L Campaign

    15/15

    Thank you