SlideShare a Scribd company logo
1 of 78
Download to read offline
Cyber Space
Opportunities & Threat
Awareness
Class
Jayakumar PP
9847435193
Evolution of Cyber space
Computerisation
WHAT IS IOT?
• The Internet of Things (IoT) is the network of physical
objects—devices, vehicles, buildings and other items
embedded with electronics, software, sensors, and
network connectivity—that enables these objects to
collect and exchange data.
What is IoT?
IOT?
In simple words, Internet of Things (IoT) is
an ecosystem of connected physical objects
that are accessible through the internet.
• 1969 – Jan 2 – ARPANET – Four centers
• India joined in the year 1995 –Aug 15
• Instant Communications, News Reference, Resea
Entertainment, Shopping, etc, etc..
• 1972 Ray Tomlinson invents eMail.
• 1983 Invents Internet Protocol
• 1989 first World Wide Web Developed
• 1994 First G-Web Browser Developed (Mosaic).
• 1995 Internet open for commercial purpose.
The Internet is a Great Place
Evolution of Internet connectivity
IOT IN DAILY LIFE…
• eGovernance
• Social Media site
• Micro Blogs
• Mobile Apps
• Web Sites
• Internet has: porn sites
– hate sites pirated software, music, movies
– viruses and malicious downloads, spyware
– scams and data collection sites
• Harassment and legal/financial risks
Things Around Us!!!
e-Governance & Citizen Centric
Service Delivery
e-Governance
Services………..
Examples of e-Services – G2C
• Birth Certificate
• Health Care
• School Admission
• Scholarships
• e-Learning
• Examination Results
• Employment Services
• Vehicle Registration
• Driver’s License
• Passport/Visa
• Agriculture
• Land Record
• Property Registration
• Marriage Certificates
• Taxes
• Utility Services
• Municipality Services
• Pensions
• Insurance
• Health Care
• Death Certificate
from Cradle to Grave……
Threats in Cyber Space
• www.classmates.com – 1995 Randy Conrads
• Facebook & Orkut in the year 2004
• Twitter in the year 2006
• Google plus in the year 2011
1. Information Technology Act
2000
2. Indian Penal Code – 1860
3. Indian Copyright Act – 1957
• IT Act Applicable to all states of
India including Jammu & Kashmir
• It is applicable to any violation of the
provisions of this Act done by any
person anywhere in the world.
Cyber Crime Against
Women
BULLYING
Pornography
Morphing
Email
Spoofing
Defamation
Online Game
Online
Grooming
Threats Against Women & Children in Cyber Space
Police Contact and Help Line Numbers
Cyber Crime Reporting Portal
Cyber Bullying
Mobile phone harrassment is also called
BULLYING, which is a general term to describe any
type of unwanted telephone calls or messages, or
picture messages, intended to cause upset and
grief !!! – Sec 499, 509 of IPC and 120(o) KP Act .
✓Word, gesture or act intended to insult the modesty of a
woman.
✓Shall be punished with simple imprisonment for a term
which may extend to one year, or with fine, or with both
Cyber Grooming
Similarly, Section 419 of the IPC could also be
applied with the same qualification that it must
be making a pecuniary(financial) benefit to it.
Under Section 465 of the Act, a person committing
forgery shall be imprisoned for up to two years
and shall also liable to pay fine
➢ Section 499/500 IPC: When fake profile is posted with defamatory
content with an intention to defame other, the offence punishable
under Section 499/500 IPC (defamation) is attracted.
Details Required
➢ URL of the Suspect FB Account
➢ Screen Shot of FB Account – Two or more
➢ ID Proof & Photo of the Complainant
➢ URL & Screen Shot of the any post related with the
Social Media – Fake Profile
Making a fake account of another person
Section 66-D of Information Technology Act 2000, which was
subsequently amended in 2008, states that “whoever by
means of any communication device or computer
resource cheats by personating, shall be punished with
imprisonment of either description for a term which may
extend to three years and shall also be liable to fine which
may extend to one lakh rupees.”[1]
. The real face behind the fake profile can be traced through
IP address. Internet Protocol address (IP address) is a
numeric label – a set of four numbers (Eg. 202.54.30.1) –
that is assigned to every device (e.g., computer, printer)
participating on the internet
Social Media – Fake Account
Online Game
❖Addiction
❖Loss of interest
❖Underdeveloped physical condition
❖Decline in personal hygiene
❖Declining social activity
Roblox - popular with kids, teens and even adults, which allows users
to interact with one another in this virtual world, play games and also
engage in role play.
My Friend Cayla - smart toy looks like an innocent baby doll with
pretty features, lovely hair, a sweet smile, and an equally adorable outfit.
Blue Whale -This social media game dares its players to also
participate in a series of tasks which are detrimental to their health and can
also cause them great harm.
Fire Fairy - This online prank targets younger children and is
modelled after the animated series, It gives dangerous instructions to
unsuspecting kids on how they can become a magical “fire fairy”.
Cloud Pets -These innocent-looking smart toys which come as a
cuddly elephant, bear, cat, rabbit, dog or unicorn can record audio
messages via a mobile app and replay them for your child’s entertainment.
The Pass Out Challenge. The Salt and Ice Challenge
The Fire Challenge The Cutting Challenge
Dangerous Online Games
Online Financial Fradus
Details Required
❖ Card No (Credit/Debit)
❖ Bank & Account No
❖ Suspect Mobile Number (Call Received)
❖ Transaction details (Date, Time)
❖ Transaction ID(SMS), Amount, Wallet, Bank, etc.
Collect above details at the earliest and forward to
Cyber Cell
❖ Whatsapp 9497976000,9497981288,9847435193
❖ We can Collect, KYC, Mobile SDR & CDR, CAF
Online Financial Fradus
Unauthorized access of
❑Computer & Its resources
❑Telecommunication devices
❑Telecommunication media, etc.
Section 65 Tampering with computer Source
document.
Section 66 – Hacking with computer systems –
including all activities mentioned in the sec 43
Imprisonment up to three years, or with
fine which may extend up to two lakh
rupees, or with both
41
42
Hacking : - Hacker can be used to denote a
computer expert engaged in solving complex
problems on computers or persons securing
unauthorized access, looks around , collects
information and leaves without a trace. Hacking
done with malicious intention is called cracker.
Phreaker:- is a person who manipulates and
disrupts telecomm systems. Today
telecommunication systems has also been
computerized.
43
❖ The worst passwords to use are the ones
that come to mind first -- name, spouse's name,
maiden name, pets, children's name, even
street addresses, etc.
❖ The best passwords mix numbers with upper
and lowercase letters.
❖ A password that is not found in the dictionary
is even better. There are programs that will try
every word in the dictionary in an effort to crack
your security. Changing passwords regularly
❖
Password Breaking!!!
Trusted Friends
Trusted friends are friends you can reach out to if you
ever get locked out of your Facebook account .
Secure Browsing (https)
Your traffic (i.e. all of your activity) on Facebook
becomes encrypted
Login Notifications
Login Notifications are an opt-in security feature where
alerts are sent to you each time your account is
accessed from a new device. Add a Mobile Number.
Login Approvals : Similar to Login Notifications , but
need security code to login.
Password, Message & Links, Personal Information, Browser
Security & Computer Security
1. Getting started with 2-step verification
2. Check the forwarding and delegation in mail
settings tab.
3. Update your secondary email address and your
security question, and provide a mobile phone for SMS-
based account recovery
4. Secure Browsing (https)
Your traffic (i.e. all of your activity) on Facebook
becomes encrypted
5. Check recent IP addresses accessing the account
6. Backup your Gmail Account- (Thunderbird, Outlook , Pocomail).
Password, Message & Links, Personal Information, Browser
Security & Computer Security
47
True Caller
UC Browser
Shareit
Clean Master
A person following another especially women and
continuously harassing through online
Cyber Stalking is generally considered as use of the
Internet, e-mail or other electronic communications
device to stalk or harass a person.
Sec. 499, 503,509 IPC & Section 120(o) of KP Act.
Punishable with simple imprisonment for a term which may extend to two
years, or with fine, or with both.
Sec 503 IPC Sending threatening messages by e-
mail
Sec 499 IPC Sending defamatory messages by e-
mail
• Sexual Harassment
• Obsession for love
• Revenge & Hate
• Ego & Power Trips
➢Their main targets are the mostly females,
children, emotionally weak or unstable, etc. It is
believed that Over 75% of the victims are female
• Publishing sexual activities in the form of
visuals, audio or through text to raise
erotic feelings rather than aesthetic.
✓ New concept called as SEXTING
✓ Sending sexually explicit pictures by cell phone or
Email
51
52
Section 67 – Publishing of information which
is obscene in electronic form. 3 years or with fine
not exceeding 5 lakh
Sec 67 A - Punishment for publishing or transmitting of
material containing sexually explicit act, etc., in electronic
form. five years and with fine which may extend to ten lakh
rupees
Sec 119 of KP Act - Punishment for atrocities against
women. – (1) Any person who,—
(a) performs, in public places, any sexual gestures or acts
degrading the dignity of women; or
24(b) takes photographs or records videos or propagates them at
any place in a manner affecting the reasonable privacy of women.
Cases : Ramankari Teacher, Chengannur Beauty & Banlglore student,etc.
3 yrs imprisonment & Fine
• Put utmost care in selecting friends – All kinds of
Criminals are in this Social media.
• Don’t post family information publicly
• Don’t post, share and like defamatory comments
and contents.
• Don’t post dirty videos
• Don’t post live pictures while u r travelling.
• Note : Once u posted something, it will not taken
back from the Cyber World.
• Founders: Larry Page, Sergey Brin – 1998, 2004 -
Mark Zuckerberg, Dustin Moskovitz, W3C-Tim
Berners-Lee
• Fake Profiles – 499,500,509 IPC– 3 yrs + 2
lakhs.
• Defamatory posting – 3 yrs + Fine.
• Posting private parts of a person – Sec 66E -3
yrs. + 2 lakhs.
• Sexual messages & Audios – Sec 67 -3 yrs + 5
lakhs.
• Posting Sexual videos – Sec 67 A – 5 yrs + 10
lakh ( 7 yrs + 10 lakhs).
• Posting and downloading sexual videos of
children's – Sec 67 B - 5 yrs + 10 lakh ( 7 yrs +
10 lakhs).
Publishing statements lowering the
reputation of persons.
When someone publishes defamatory
matter about someone on a website or
sends e-mails, pictures, etc. containing
defamatory information to all of that
person's friends or on the internet.
Sec 499,500,503.
In case of sexual abuse against
women. Sec 509 & 354(a) IPC
Social Media & Cyber Crime
Ph : 0477 -2230804 Email : cybrcelalpy.pol@kerala.gov.in
Ph : 0477 -2230804 Email : cybrcelalpy.pol@kerala.gov.in
Phishing – Facebook Page
➢Criminal creates a “mirror” website that
looks like a legitimate website
➢They fool people into going to that site,
which transmits your username or
password to the them
➢Using pop-up windows to conceal the
real address in the victim’s address bar
➢“Pharming” victim redirected to a scam
website when the victim types in the
real address
Deceptive Login Page
➢Online Lottery Scam
➢Online Job Offers
➢ATM Fraud
➢Phishing
➢Russian Wife Scam
Appointment Letter
January 23, 2015
January 23, 2015 HI TECH CRIME ENQUIRY CELL
January 23, 2015 HI TECH CRIME ENQUIRY CELL
VISA
January 23, 2015 HI TECH CRIME ENQUIRY CELL
Section 468. Forgery for purpose of cheating
Whoever commits forgery, intending that the
document or Electronic Record forged shall be used
for the purpose of cheating, shall be punished with
imprisonment of either description for a term which
may extend to seven years, and shall also be liable to
fine.
Section 420. Cheating and dishonestly inducing
delivery of property
shall be punished with imprisonment of either
description for a term which may extend to seven
years, and shall also be liable to fine.
➢ Cyber Piracy is defined as art of making illegal
copies of Music, Books, software etc for the
purpose of sale.
➢ The major form of piracy on the net is violation
of copyrights and trade marks. A part of this piracy
had also been cyber squatting of domain names.
➢ Shall be punishable under section. 51, 63, 63B
of Indian Copyright Act.
• Where we stand
– Twentieth in top 20 pirating countries
– At 73%, behind China (92%), Vietnam (92%),
Indonesia (88%) and Russia (87%)
– Losses at $367 million
• Benefits of piracy control
– Reduction of piracy by 10% will
• Promote innovation
• Add $1.2 billion to GDP
• Create 48,000 jobs
• Add $92 million to tax revenues
IOT CHALLENGES..
Threat vs. Opportunity
• If misunderstood and misconfigured,
misused Technology poses risk to our data,
privacy, and safety
• If understood , secured, efficient use of
Technology will enhance communications,
lifestyle, and delivery of services
The Biggest Investment is
“Investment in as much of yourself as you can, you are
your own biggest by far.
✓ Are you wiser to day than yesterday, or last day , or last
year , or five years ago
✓ Are you taking good care to be physically and mentally
fit.
Jayakumar PP
Ethical Hacker
78
“Awareness about Cyber-crime threats is the best
tool to avoid of being a victim”.
Jayakumar PP
9847435193
jkambala@gmail.com
https://www.facebook.com/jayakumar.purushan
https://www.linkedin.com/pub/jayakumar-pp/65/59b/773
http://www.slideshare.net/jayakumarpurushan

More Related Content

What's hot

Spoofing
SpoofingSpoofing
Spoofing
Sanjeev
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Nettiquette complete
Nettiquette completeNettiquette complete
Nettiquette complete
yoochunjjangy
 

What's hot (20)

Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Spam
SpamSpam
Spam
 
Spoofing
SpoofingSpoofing
Spoofing
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Nettiquette complete
Nettiquette completeNettiquette complete
Nettiquette complete
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
cyber crime
cyber crimecyber crime
cyber crime
 

Similar to Cyber Space Threats and Opportunities

Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa
 

Similar to Cyber Space Threats and Opportunities (20)

Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 

More from Jayakumar PP

Planning in Software Projects
Planning in Software ProjectsPlanning in Software Projects
Planning in Software Projects
Jayakumar PP
 
Class on cyber crime
Class on cyber crimeClass on cyber crime
Class on cyber crime
Jayakumar PP
 

More from Jayakumar PP (9)

Financial Crime and Investigation- Finacial Frauds
Financial Crime and Investigation- Finacial FraudsFinancial Crime and Investigation- Finacial Frauds
Financial Crime and Investigation- Finacial Frauds
 
Blockchain technology and logistics management
Blockchain technology and logistics managementBlockchain technology and logistics management
Blockchain technology and logistics management
 
Akshaya Banking Kiosk
Akshaya Banking KioskAkshaya Banking Kiosk
Akshaya Banking Kiosk
 
Akshaya Project of Government of Kerala
Akshaya Project of Government of KeralaAkshaya Project of Government of Kerala
Akshaya Project of Government of Kerala
 
Akshaya down the years
Akshaya down the yearsAkshaya down the years
Akshaya down the years
 
IT to IOT Evolution
IT to IOT EvolutionIT to IOT Evolution
IT to IOT Evolution
 
CCTNS
CCTNS CCTNS
CCTNS
 
Planning in Software Projects
Planning in Software ProjectsPlanning in Software Projects
Planning in Software Projects
 
Class on cyber crime
Class on cyber crimeClass on cyber crime
Class on cyber crime
 

Recently uploaded

一比一定制美国罗格斯大学毕业证学位证书
一比一定制美国罗格斯大学毕业证学位证书一比一定制美国罗格斯大学毕业证学位证书
一比一定制美国罗格斯大学毕业证学位证书
A
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
AS
 
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
musaddumba454
 
一比一原版英国创意艺术大学毕业证如何办理
一比一原版英国创意艺术大学毕业证如何办理一比一原版英国创意艺术大学毕业证如何办理
一比一原版英国创意艺术大学毕业证如何办理
AS
 
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
Fi
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
AS
 
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
Fi
 
一比一原版布兰迪斯大学毕业证如何办理
一比一原版布兰迪斯大学毕业证如何办理一比一原版布兰迪斯大学毕业证如何办理
一比一原版布兰迪斯大学毕业证如何办理
A
 
一比一定制波士顿学院毕业证学位证书
一比一定制波士顿学院毕业证学位证书一比一定制波士顿学院毕业证学位证书
一比一定制波士顿学院毕业证学位证书
A
 

Recently uploaded (20)

Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
一比一定制美国罗格斯大学毕业证学位证书
一比一定制美国罗格斯大学毕业证学位证书一比一定制美国罗格斯大学毕业证学位证书
一比一定制美国罗格斯大学毕业证学位证书
 
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
 
The Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfThe Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdf
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
Washington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers ShirtWashington Football Commanders Redskins Feathers Shirt
Washington Football Commanders Redskins Feathers Shirt
 
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
100^%)( POLOKWANE))(*((+27838792658))*))௹ )Abortion Pills for Sale in Sibasa,...
 
一比一原版英国创意艺术大学毕业证如何办理
一比一原版英国创意艺术大学毕业证如何办理一比一原版英国创意艺术大学毕业证如何办理
一比一原版英国创意艺术大学毕业证如何办理
 
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
一比一原版(Soton毕业证书)南安普顿大学毕业证原件一模一样
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
 
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
 
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
 
Free on Wednesdays T Shirts Free on Wednesdays Sweatshirts
Free on Wednesdays T Shirts Free on Wednesdays SweatshirtsFree on Wednesdays T Shirts Free on Wednesdays Sweatshirts
Free on Wednesdays T Shirts Free on Wednesdays Sweatshirts
 
一比一原版布兰迪斯大学毕业证如何办理
一比一原版布兰迪斯大学毕业证如何办理一比一原版布兰迪斯大学毕业证如何办理
一比一原版布兰迪斯大学毕业证如何办理
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 
Dan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat HoodieDan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat Hoodie
 
HUMANIZE YOUR BRAND - FREE E-WORKBOOK Download Now
HUMANIZE YOUR BRAND - FREE E-WORKBOOK Download NowHUMANIZE YOUR BRAND - FREE E-WORKBOOK Download Now
HUMANIZE YOUR BRAND - FREE E-WORKBOOK Download Now
 
一比一定制波士顿学院毕业证学位证书
一比一定制波士顿学院毕业证学位证书一比一定制波士顿学院毕业证学位证书
一比一定制波士顿学院毕业证学位证书
 

Cyber Space Threats and Opportunities

  • 1. Cyber Space Opportunities & Threat Awareness Class Jayakumar PP 9847435193
  • 2. Evolution of Cyber space Computerisation
  • 4. • The Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity—that enables these objects to collect and exchange data. What is IoT? IOT? In simple words, Internet of Things (IoT) is an ecosystem of connected physical objects that are accessible through the internet.
  • 5. • 1969 – Jan 2 – ARPANET – Four centers • India joined in the year 1995 –Aug 15 • Instant Communications, News Reference, Resea Entertainment, Shopping, etc, etc.. • 1972 Ray Tomlinson invents eMail. • 1983 Invents Internet Protocol • 1989 first World Wide Web Developed • 1994 First G-Web Browser Developed (Mosaic). • 1995 Internet open for commercial purpose. The Internet is a Great Place
  • 6. Evolution of Internet connectivity
  • 7.
  • 8.
  • 9. IOT IN DAILY LIFE…
  • 10.
  • 11.
  • 12.
  • 13. • eGovernance • Social Media site • Micro Blogs • Mobile Apps • Web Sites • Internet has: porn sites – hate sites pirated software, music, movies – viruses and malicious downloads, spyware – scams and data collection sites • Harassment and legal/financial risks Things Around Us!!!
  • 14. e-Governance & Citizen Centric Service Delivery
  • 16. Examples of e-Services – G2C • Birth Certificate • Health Care • School Admission • Scholarships • e-Learning • Examination Results • Employment Services • Vehicle Registration • Driver’s License • Passport/Visa • Agriculture • Land Record • Property Registration • Marriage Certificates • Taxes • Utility Services • Municipality Services • Pensions • Insurance • Health Care • Death Certificate from Cradle to Grave……
  • 18.
  • 19. • www.classmates.com – 1995 Randy Conrads • Facebook & Orkut in the year 2004 • Twitter in the year 2006 • Google plus in the year 2011
  • 20. 1. Information Technology Act 2000 2. Indian Penal Code – 1860 3. Indian Copyright Act – 1957 • IT Act Applicable to all states of India including Jammu & Kashmir • It is applicable to any violation of the provisions of this Act done by any person anywhere in the world.
  • 21.
  • 22. Cyber Crime Against Women BULLYING Pornography Morphing Email Spoofing Defamation Online Game Online Grooming Threats Against Women & Children in Cyber Space
  • 23.
  • 24.
  • 25. Police Contact and Help Line Numbers
  • 28. Mobile phone harrassment is also called BULLYING, which is a general term to describe any type of unwanted telephone calls or messages, or picture messages, intended to cause upset and grief !!! – Sec 499, 509 of IPC and 120(o) KP Act . ✓Word, gesture or act intended to insult the modesty of a woman. ✓Shall be punished with simple imprisonment for a term which may extend to one year, or with fine, or with both
  • 30.
  • 31. Similarly, Section 419 of the IPC could also be applied with the same qualification that it must be making a pecuniary(financial) benefit to it. Under Section 465 of the Act, a person committing forgery shall be imprisoned for up to two years and shall also liable to pay fine ➢ Section 499/500 IPC: When fake profile is posted with defamatory content with an intention to defame other, the offence punishable under Section 499/500 IPC (defamation) is attracted. Details Required ➢ URL of the Suspect FB Account ➢ Screen Shot of FB Account – Two or more ➢ ID Proof & Photo of the Complainant ➢ URL & Screen Shot of the any post related with the Social Media – Fake Profile
  • 32. Making a fake account of another person Section 66-D of Information Technology Act 2000, which was subsequently amended in 2008, states that “whoever by means of any communication device or computer resource cheats by personating, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.”[1] . The real face behind the fake profile can be traced through IP address. Internet Protocol address (IP address) is a numeric label – a set of four numbers (Eg. 202.54.30.1) – that is assigned to every device (e.g., computer, printer) participating on the internet Social Media – Fake Account
  • 33. Online Game ❖Addiction ❖Loss of interest ❖Underdeveloped physical condition ❖Decline in personal hygiene ❖Declining social activity
  • 34. Roblox - popular with kids, teens and even adults, which allows users to interact with one another in this virtual world, play games and also engage in role play. My Friend Cayla - smart toy looks like an innocent baby doll with pretty features, lovely hair, a sweet smile, and an equally adorable outfit. Blue Whale -This social media game dares its players to also participate in a series of tasks which are detrimental to their health and can also cause them great harm. Fire Fairy - This online prank targets younger children and is modelled after the animated series, It gives dangerous instructions to unsuspecting kids on how they can become a magical “fire fairy”. Cloud Pets -These innocent-looking smart toys which come as a cuddly elephant, bear, cat, rabbit, dog or unicorn can record audio messages via a mobile app and replay them for your child’s entertainment. The Pass Out Challenge. The Salt and Ice Challenge The Fire Challenge The Cutting Challenge Dangerous Online Games
  • 36. Details Required ❖ Card No (Credit/Debit) ❖ Bank & Account No ❖ Suspect Mobile Number (Call Received) ❖ Transaction details (Date, Time) ❖ Transaction ID(SMS), Amount, Wallet, Bank, etc. Collect above details at the earliest and forward to Cyber Cell ❖ Whatsapp 9497976000,9497981288,9847435193 ❖ We can Collect, KYC, Mobile SDR & CDR, CAF Online Financial Fradus
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. Unauthorized access of ❑Computer & Its resources ❑Telecommunication devices ❑Telecommunication media, etc. Section 65 Tampering with computer Source document. Section 66 – Hacking with computer systems – including all activities mentioned in the sec 43 Imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both 41
  • 42. 42 Hacking : - Hacker can be used to denote a computer expert engaged in solving complex problems on computers or persons securing unauthorized access, looks around , collects information and leaves without a trace. Hacking done with malicious intention is called cracker. Phreaker:- is a person who manipulates and disrupts telecomm systems. Today telecommunication systems has also been computerized.
  • 43. 43 ❖ The worst passwords to use are the ones that come to mind first -- name, spouse's name, maiden name, pets, children's name, even street addresses, etc. ❖ The best passwords mix numbers with upper and lowercase letters. ❖ A password that is not found in the dictionary is even better. There are programs that will try every word in the dictionary in an effort to crack your security. Changing passwords regularly ❖
  • 45. Trusted Friends Trusted friends are friends you can reach out to if you ever get locked out of your Facebook account . Secure Browsing (https) Your traffic (i.e. all of your activity) on Facebook becomes encrypted Login Notifications Login Notifications are an opt-in security feature where alerts are sent to you each time your account is accessed from a new device. Add a Mobile Number. Login Approvals : Similar to Login Notifications , but need security code to login. Password, Message & Links, Personal Information, Browser Security & Computer Security
  • 46. 1. Getting started with 2-step verification 2. Check the forwarding and delegation in mail settings tab. 3. Update your secondary email address and your security question, and provide a mobile phone for SMS- based account recovery 4. Secure Browsing (https) Your traffic (i.e. all of your activity) on Facebook becomes encrypted 5. Check recent IP addresses accessing the account 6. Backup your Gmail Account- (Thunderbird, Outlook , Pocomail). Password, Message & Links, Personal Information, Browser Security & Computer Security
  • 47. 47
  • 49. A person following another especially women and continuously harassing through online Cyber Stalking is generally considered as use of the Internet, e-mail or other electronic communications device to stalk or harass a person. Sec. 499, 503,509 IPC & Section 120(o) of KP Act. Punishable with simple imprisonment for a term which may extend to two years, or with fine, or with both. Sec 503 IPC Sending threatening messages by e- mail Sec 499 IPC Sending defamatory messages by e- mail
  • 50. • Sexual Harassment • Obsession for love • Revenge & Hate • Ego & Power Trips ➢Their main targets are the mostly females, children, emotionally weak or unstable, etc. It is believed that Over 75% of the victims are female
  • 51. • Publishing sexual activities in the form of visuals, audio or through text to raise erotic feelings rather than aesthetic. ✓ New concept called as SEXTING ✓ Sending sexually explicit pictures by cell phone or Email 51
  • 52. 52 Section 67 – Publishing of information which is obscene in electronic form. 3 years or with fine not exceeding 5 lakh Sec 67 A - Punishment for publishing or transmitting of material containing sexually explicit act, etc., in electronic form. five years and with fine which may extend to ten lakh rupees Sec 119 of KP Act - Punishment for atrocities against women. – (1) Any person who,— (a) performs, in public places, any sexual gestures or acts degrading the dignity of women; or 24(b) takes photographs or records videos or propagates them at any place in a manner affecting the reasonable privacy of women. Cases : Ramankari Teacher, Chengannur Beauty & Banlglore student,etc. 3 yrs imprisonment & Fine
  • 53. • Put utmost care in selecting friends – All kinds of Criminals are in this Social media. • Don’t post family information publicly • Don’t post, share and like defamatory comments and contents. • Don’t post dirty videos • Don’t post live pictures while u r travelling. • Note : Once u posted something, it will not taken back from the Cyber World. • Founders: Larry Page, Sergey Brin – 1998, 2004 - Mark Zuckerberg, Dustin Moskovitz, W3C-Tim Berners-Lee
  • 54. • Fake Profiles – 499,500,509 IPC– 3 yrs + 2 lakhs. • Defamatory posting – 3 yrs + Fine. • Posting private parts of a person – Sec 66E -3 yrs. + 2 lakhs. • Sexual messages & Audios – Sec 67 -3 yrs + 5 lakhs. • Posting Sexual videos – Sec 67 A – 5 yrs + 10 lakh ( 7 yrs + 10 lakhs). • Posting and downloading sexual videos of children's – Sec 67 B - 5 yrs + 10 lakh ( 7 yrs + 10 lakhs).
  • 55.
  • 56.
  • 57. Publishing statements lowering the reputation of persons. When someone publishes defamatory matter about someone on a website or sends e-mails, pictures, etc. containing defamatory information to all of that person's friends or on the internet. Sec 499,500,503. In case of sexual abuse against women. Sec 509 & 354(a) IPC
  • 58. Social Media & Cyber Crime
  • 59. Ph : 0477 -2230804 Email : cybrcelalpy.pol@kerala.gov.in
  • 60. Ph : 0477 -2230804 Email : cybrcelalpy.pol@kerala.gov.in
  • 62.
  • 63. ➢Criminal creates a “mirror” website that looks like a legitimate website ➢They fool people into going to that site, which transmits your username or password to the them ➢Using pop-up windows to conceal the real address in the victim’s address bar ➢“Pharming” victim redirected to a scam website when the victim types in the real address
  • 64.
  • 66. ➢Online Lottery Scam ➢Online Job Offers ➢ATM Fraud ➢Phishing ➢Russian Wife Scam
  • 68. January 23, 2015 HI TECH CRIME ENQUIRY CELL
  • 69. January 23, 2015 HI TECH CRIME ENQUIRY CELL VISA
  • 70. January 23, 2015 HI TECH CRIME ENQUIRY CELL
  • 71. Section 468. Forgery for purpose of cheating Whoever commits forgery, intending that the document or Electronic Record forged shall be used for the purpose of cheating, shall be punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine. Section 420. Cheating and dishonestly inducing delivery of property shall be punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine.
  • 72. ➢ Cyber Piracy is defined as art of making illegal copies of Music, Books, software etc for the purpose of sale. ➢ The major form of piracy on the net is violation of copyrights and trade marks. A part of this piracy had also been cyber squatting of domain names. ➢ Shall be punishable under section. 51, 63, 63B of Indian Copyright Act.
  • 73. • Where we stand – Twentieth in top 20 pirating countries – At 73%, behind China (92%), Vietnam (92%), Indonesia (88%) and Russia (87%) – Losses at $367 million • Benefits of piracy control – Reduction of piracy by 10% will • Promote innovation • Add $1.2 billion to GDP • Create 48,000 jobs • Add $92 million to tax revenues
  • 75. Threat vs. Opportunity • If misunderstood and misconfigured, misused Technology poses risk to our data, privacy, and safety • If understood , secured, efficient use of Technology will enhance communications, lifestyle, and delivery of services
  • 76. The Biggest Investment is “Investment in as much of yourself as you can, you are your own biggest by far. ✓ Are you wiser to day than yesterday, or last day , or last year , or five years ago ✓ Are you taking good care to be physically and mentally fit.
  • 78. 78 “Awareness about Cyber-crime threats is the best tool to avoid of being a victim”. Jayakumar PP 9847435193 jkambala@gmail.com https://www.facebook.com/jayakumar.purushan https://www.linkedin.com/pub/jayakumar-pp/65/59b/773 http://www.slideshare.net/jayakumarpurushan