cyber crime
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
mohamed ismail
Active In SP
**

Posts: 1
Joined: Jan 2010
#1
29-01-2010, 09:47 PM


hi i want cyber crime ppt.........
Reply
computer science technology
Active In SP
**

Posts: 740
Joined: Jan 2010
#2
30-01-2010, 08:48 AM

please read topicideashow-to-cyber-crime-full-report where cyber crime presentation document added
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
ashitha_sasi
Active In SP
**

Posts: 1
Joined: Oct 2010
#3
16-10-2010, 02:59 PM

hai i need cyber crime seminar and presentation report


Attached Files
.doc   cyber crime.doc (Size: 379.5 KB / Downloads: 116)
Reply
projectsofme
Active In SP
**

Posts: 1,124
Joined: Jun 2010
#4
21-12-2010, 04:18 PM


.ppt   Cyber Crime.ppt (Size: 1.78 MB / Downloads: 82)
Presented By:Rajani.V.G
Cyber Crime

Objectives:

Cyber Forensics
Cyber Crime
Glimpses on IT Act 2000
Tips
What is Forensics ?

Fusion Of Science And Technology To Investigate Crime.

Legal Process At Core Undertaking The Rule Of Law.

Dethroning The Heinous Crime Of Computer World.

What is Cyber Crime ?

Motive Behind The Crime
Unawareness

Curiosity

Adventure

Destructive mindset

Popularity

Types of Cyber Crimes

Hacking
phishing
Credit card fraud
Morphing
Pornography
Virus

Phishing

Credit Card Fraud
The unauthorized and illegal use of a credit card to purchase property

Credit Card Fraud
Scared? But remember, safety saves
Graph Of Credit card fraud
Morphing


Investigation Processes
Forensics.

Forensic Peripherals.

Role Of Investigator.

The Forensic Methodology.

The Digital Evidence Legal Process.
Role Of Investigator
Creative In Discovery Of Evidence.
Unbiased Third Party.
Tackling Corporate Malfeasance.
Technical Competency.
Real Time Corporate Espionage.
Qualified And Credentialed.
Legal Intelligence.
The Methodology 11C’s
Case Of Custody.

Cloning.
Chopping The File System Offsets.
Converting Conversions.
Core Deleted Data Recovery.
Cross Referencing Logs.
Craniology Of OS Artifacts.
Clandestinely Traversing The Network.
Carving System Backup.
Centralizing Data Interpretation.
Cliffed Incident Analysis.
IT Act 2000
66. Hacking With Computer System

67 . Publishing of information which is obscene in electronic form

Tips

Use original software
Keep upgrading your software
Have at least an anti-virus and firewall in place
Avoid sharing personal details with strangers
Follow instructions especially while banking online
The user, if attacked, should file an FIR
Conclusion

The new legislation which can cover all the aspects of the Cyber Crimes should be passed so the grey areas of the law can be removed.
The software’s are easily available for download should be restricted by the Government by appropriate actions. New amendment should be including to the IT Act, 2000 to make it efficient and active against the crimes.
The training and public awareness programs should be organized in the Companies as well as in common sectors.
The number of the cyber cops in India should be increased.
The jurisdiction problem is there in the implementation part which should be removed because the cyber criminals does not have any jurisdiction limit then why do the laws have, after all they laws are there, to punish the criminal but present scenario gives them the chance to escape.




Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  cyber terrorism paper presentation in ieee format for free download Guest 1 70 11-10-2016, 09:05 AM
Last Post: amrutha735
  activity diagram for cyber cafe management Guest 1 69 02-05-2016, 02:04 PM
Last Post: mkaasees
Wink free download seminar report on cyber security Guest 1 61 17-02-2016, 02:42 PM
Last Post: mkaasees
  online crime file management ppt Guest 1 95 30-10-2015, 03:36 PM
Last Post: mkaasees
  cyber cafe management system with uml diagram presentation Guest 0 114 17-10-2015, 06:53 PM
Last Post: Guest
  crime file management system ooad full project Guest 0 115 11-10-2015, 01:07 AM
Last Post: Guest
  cyber cafe management system srs doc Guest 0 99 18-09-2015, 02:24 PM
Last Post: Guest
  cyber bidding gateway net project Guest 0 67 12-09-2015, 08:29 PM
Last Post: Guest
  crime file management jsp project download Guest 0 68 25-08-2015, 08:53 PM
Last Post: Guest
  pc cyber cafe billing system project Guest 1 62 04-08-2015, 10:44 AM
Last Post: mkaasees