Identification and Analysis of Cyber Crime (Repository of Cyber Crime and Cyber Laws) Knowledge Based System (KBS) Presentation By : Dr. Priyanka Sharma.

Slides:



Advertisements
Similar presentations
CYBER CAFÉ VISITOR TRACKING SYSTEM A Comprehensive Portal for Tracking Cyber Café Visitors.
Advertisements

© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Gerald M. Santoro, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA (slides.
Hands-On Ethical Hacking and Network Defense
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
Management Support Systems A Hierarchy and a Guide.
Geneva, Switzerland, September 2014 Challenges and Successes in the Zambian ICT Security Sector Mainza Siamubayi Handongwe, Student Research Fellow,
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
1 Data Strategy Overview Keith Wilson Session 15.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Welcome!. Technical Writing - An Emerging Career! Presented by:
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
What have you known about cybercrime? What do you want to know about cybercrime?
Cyber Crimes.
Trouble History Database of HIMAC ~ Current Status and Future Plan ~ T.Kadowaki (Accelerator Engineering Corporation) 28.SEP.2007
Management Information Systems
TOGOLESE CONSUMERS ASSOCIATION (ATC ) Fifth Annual African Consumer Protection Dialogue Conference (Zambie september 2013) “ Moving Cross Border.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
INFORMATION SYSTEMS Overview
Digital Library Operating Management System by North Bangkok University Suphot Phuangkamnerd 1 Prachyanun Nilsook 2 and Ravisada Thamrongviwanna3 1 North.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Cybersecurity Governance in Ethiopia
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
1 Business Information Systems: An Overview Daniel F. Duran,BSAD 341 Whittier College.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
Best practices in combating hate crime on the ground osce.org/odihr.
Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Computer Forensics specialist By Andrew Shore Davis Sanders.
LONGE, OLUMIDE, RICHARD, BOATENG CHIEMEKE, STELLA CHANIKA, JONES Towards Remodelling The Peel Theory of Community Policing for Global Cyber Security.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
National Information Exchange Model (NIEM) Executive Introduction November 29, 2006 Thomas O’Reilly NIEM Program Management Office.
Accessibility policies and strategies at global level Introduction to Korean government ICT accessibilities Policy R&D project Prof. Jung, Bong-Keun
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
BY: EMERALD MOORE CRIME SCENE INVESTIGATOR (CSI).
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
Computer crimes.
SEARCH, The National Consortium for Justice Information and Statistics Melissa Nee Government Affairs Specialist SEARCH Overview Briefing.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Human Factors in Cyber Security: A Review for Research & Education P. Vigneswara Ilavarasan, PhD 1.
2.0 PROJECT INITIATION AND PLANNING The initiating and planning are the phase where process or workflow to develop the system will identify and planning.
Reading 1 Fight against cybercrime 板块:教学设计 —— 课件 Unit 4.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
Kerala Police Why Cocon ?  What is the purpose of holding such a Conference ?
Chapter 8 : Management of Security Lecture #1-Week 13 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
An Internet of Things (IoT) Digital Forensics Framework (IDFF) Edewede Oriwoh Department of Computer Science and Technology 3.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Chapter 17 Computer Crime Hess Introduction Computer crimes are relatively easy to commit and difficult to detect Most computer crimes are not prosecuted.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
IT Security  .
POLICE FORCE СПб Университет МВД России Кафедра иностранных языков
Seminar On Cyber Crime Submitted To: Submitted By:
Introduction to Computer Forensics
Introduction to the Federal Defense Acquisition Regulation
Introduction to Computer Forensics
CE-Notes Law Enforcement
Introduction to Digital Forensics
Peter E, Ayemholan1, Garba, Suleiman2 and Osaigbovo Timothy3
Presentation transcript:

Identification and Analysis of Cyber Crime (Repository of Cyber Crime and Cyber Laws) Knowledge Based System (KBS) Presentation By : Dr. Priyanka Sharma Representing : Raksha Shakti University

Raksha Shakti University An Introduction The Raksha Shakti University is a unique and first of its kind in India for conducting certificate, diploma and degree courses in the field of police science and internal security.

Raksha Shakti University – Department & Specilization Department of Police Administration Department of Criminology Department of Law Department of Public Security Department of Crime Prevention and Correction Department of Traffic Science Department of Information and Human Resource Management Department of Border Policing Department of Special Crimes

Project - CCR Repository of Cyber Crime and Cyber Laws) Identification and Analysis of Cyber Crime through - Knowledge Based System)

Cyber Crime - An Overview Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Criminals can also use computers for communication and document or data storage.

Project CCR – An Overview & Objective Project CCR is all about creating a commonly accessible repository of Cyber crime data and cyber Law. The Repository will be accessible through a secured web based application, the access rights will be given to Law enforcement agencies, general people through secured authentic login. The repository will have data related to the Law of cyber crime and data shared by general public related to actual crime happened.

Project CCR – How it Works? CCR – Knowledge Gathering Public Input Experts Law Enforcem ent agencies Books/ Manual & Literatures CCR works on an Information sharing model, where information will be incorporated to the system via actual crime incidents shared through General public, Law documents, Law enforcement Agencies and experts. The information will help Law enforcement agencies to Work effectively, promptly and accurately in solving Cases as they will have access to information shared From various resources across the country. It will help general public to know about cyber crime and Help them to know about law & order related to Cyber Law.

Project CCR – Functional Diagram.

Project CCR – Benefits Online Identification, Analysis and Law related solutions of Cyber Crime Prediction and prevention by gathering Survey data. This information will store cyber crime, criminal information,procedure to solve cases, and thus help in forming security policies. General people awareness about Cyber crime Law. Help investigators/cyber police aid in Decision making and a knowledge book for solving crimes Past knowledge/Experience can be assimilated with current observations of computer-related criminality to inform and guide the science of police investigations in the future. Reports will be generated time wise, crime wise, solved cases Unsolved cases

Project CCR – Interface

Search : Keyword : Category Similar cases : Laws Tips and Suggestions : Project CCR – Interface

Search : Keyword : Category Similar cases : Laws Tips and Suggestions : User in General Project CCR – Interface

CRIME Incident REGISTRATION User ID Name Mobile Organization Type of loss : Date Time Project CCR – Interface

Law Enforcement Search By : Keyword : Spam mails Cases : Category : Phising – sub category -- Location : Date & Time : Solved Cases : Unsolved Cases : Pending / Running Cases : Laws Output : According to query/law

Thank you