SlideShare una empresa de Scribd logo
1 de 29
Deepak Bhojwani
CS-4TH Year
CYBER CRIME

 The term “cyber crime” was first coined by
Barry Collins in 1980‟s
 “Any criminal activity that uses a computer
either as an instrumentality, target or a means
for perpetuating further crimes comes within
the ambit of cyber crime”
 A generalized definition of cyber crime
may be “ unlawful acts wherein the computer
is either a tool or target or both”
CYBER CRIMINALS:

 The cyber criminals constitute of various groups/
category. The following are the category of cyber
criminals:
• Children and adolescents between the age group of 6 – 18
years
• Organised hackers
• Professional hackers / crackers
• Discontented employees
MODE AND MANNER OF
COMMITING CYBER CRIME:



 Hacking
 Theft of information contained in electronic
form
 Email bombing
 Data diddling
 Salami attacks
 Denial of Service attack
 Virus / worm attacks
Contd.


 Logic bombs
 Trojan attacks
 Internet time thefts
 Web jacking
TYPES OF CYBER CRIME:


 AGAINST INDIVIDUALS
 AGAINST ORGANISATION
 AGAINST SOCIETY AT LARGE
AGAINST INDIVIDUALS:


 Harassment via e-mails.
 Cyber-stalking.
 Dissemination of obscene material.
 Defamation.
 Unauthorized control/access over computers
 Indecent exposure.
 Email spoofing.
 Cheating & Fraud.
AGAINST ORGANISATION:


 Cyber terrorism against the government
organization.
 Distribution of pirated software etc.
AGAINST SOCIETY AT LARGE:


 Pornography (basically child pornography).
 Polluting the youth through indecent exposure.
 Trafficking.
 Financial crimes.
 Sale of illegal articles.
 Online gambling.
 Forgery.
TOP 20 :

CYBER CRIMES IN INDIA:


STATUTORY PROVISONS:


 The Indian parliament considered it necessary to
give effect to the resolution by which the General
Assembly adopted Model Law on Electronic
Commerce adopted by the United Nations
 As a consequence of which the Information
Technology Act 2000 was passed and enforced on
17th May 2000.
 The Information Technology Act deals with the
various cyber crimes in chapters IX & XI. The
important sections are Ss. 43,65,66,67
VARIOUS SECTIONS:


Section 43

deals with the unauthorised access, unauthorised
downloading, virus attacks or any contaminant,
causes damage, disruption, denial of access,
interference with the service availed by a person

Section 65

deals with „tampering with computer source documents‟
and provides for imprisonment up to 3 years or fine

Section 66

deals with „hacking with computer system’ and provides
for imprisonment up to 3 years or fine

section 67

deals with publication of obscene material and
provides for imprisonment up to a term of 10 years
SECTION 65: SOURCE CODE



 Most important asset of software companies
 “Computer Source Code" means the listing of
programmes, computer commands, design and
layout
 Ingredients
 Knowledge or intention
 Concealment, destruction, alteration
 computer source code required to be kept or
maintained by law
 Punishment
 imprisonment up to three years and / or
 fine up to INR. 2 lakh
SECTION 67: PORNOGRAPHY:
 Ingredients



 Publishing or transmitting or causing to be published
 in the electronic form,
 Obscene material

 Punishment

 On first conviction
 imprisonment of either description up to five years and
 fine up to INR. 1 lakh

 On subsequent conviction

 imprisonment of either description up to ten years and
 fine up to INR. 2 lakh

 Section covers
 Internet Service Providers,
 Search engines,
 Pornographic websites

 Cognizable, Non- Bail able , JMIC/ Court of Sessions
CYBER PORNOGRAPHY CASES:


 DPS mms case
 Air Force Baal Bharati School case
 Miss Jammu mms case
Sec 69: Decryption of information:



 Ingredients
 Controller issues order to Government agency to intercept
any information transmitted through any computer
resource.
 Order is issued in the interest of the






sovereignty or integrity of India,
the security of the State,
friendly relations with foreign States,
public order or
preventing incitement for commission of a cognizable
offence

 Person in charge of the computer resource fails to extend all
facilities and technical assistance to decrypt the
information-punishment up to 7 years.
Sec 70: Protected System
 Ingredients



 Securing unauthorised access or attempting to secure
unauthorised access
 to „protected system‟

 Acts covered by this section:





Switching computer on / off
Using installed software / hardware
Installing software / hardware
Port scanning

 Punishment

 Imprisonment up to 10 years and fine
 Cognizable, Non-Bail able, Court of Sessions
Sections 71
 Section – 71:



 Offence Name - Misrepresentation to the Controller or the
Certifying Authority
 Description - Making any misrepresentation to, or suppression
of any material fact from, the Controller or the Certifying
Authority for obtaining any license or Digital Signature
Certificate, as the case may be.
 Penalty - Imprisonment for a term which may extend to 2
years, or with fine up to 1 lakh Rupees, or with both
Section 72
 section – 72:



 Offence Name - Penalty for breach of confidentiality and
privacy
 Description - Any person who, in pursuance of any of the
powers conferred under IT Act, has secured access to any
electronic record, book, register, correspondence,
information or document without the consent of the person
concerned discloses such electronic record, book., register,
correspondence, information, document to any other
person.
 Penalty - Imprisonment for a term which may extend to 2
years, or with fine up to 1 lakh Rupees, or with both.
Sections 73
Section – 73:



 Offence Name - Publishing Digital Signature Certificate false
in certain particulars
 Description - Publishing a Digital Signature Certificate or
otherwise making it available to any other person with the
knowledge that the Certifying Authority listed in the
certificate has not issued it or the subscriber listed in the
certificate has not accepted it or the certificate has been
revoked or suspended, unless such publication is for the
purpose of verifying a digital signature created prior to such
suspension or revocation.
 Penalty - Imprisonment for a term which may extend to 2
years, or with fine which may extend to 1 lakh Rupees.
SECTION 74


 Section – 74:
 Offence Name - Publication for fraudulent purpose
 Description - Creation, publication or otherwise making available
a Digital Signature
 Certificate for any fraudulent or unlawful purpose
 Penalty - Imprisonment for a term which may extend to 2 years,
or with fine up to 1 lakh Rupees, or with both. .
Computer Related Crimes under IPC
and Special Laws



Sending threatening messages by email

Sec 503 IPC

Sending defamatory messages by email

Sec 499, 500 IPC

Forgery of electronic records

Sec 463, 470, 471 IPC

Bogus websites, cyber frauds

Sec 420 IPC

Email spoofing

Sec 416, 417, 463 IPC

Online sale of Drugs

NDPS Act

Web - Jacking

Sec. 383 IPC

Online sale of Arms

Arms Act
Some more offences dealt with
under IPC…



 Criminal breach of trust/Fraud- Sec. 405,406,408,409
IPC
 Destruction of electronic evidence-Sec.204,477 IPC
 False electronic evidence-Sec.193 IPC
 Offences by or against public servantSec.167,172,173,175 IPC
CASE STUDY:BANK NSP-2003



 The Bank NSP case is the one where a management
trainee of the bank was engaged to be married. The
couple exchanged many emails using the company
computers. After some time the two broke up and the girl
created fraudulent email ids such as
“indianbarassociations” and sent emails to the boy‟s
foreign clients. She used the banks computer to do this.
The boy‟s company lost a large number of clients and
took the bank to court. The bank was held liable for the
emails sent using the bank‟s system.
Ref: Talwant Singh
Addl. District & Sessions Judge, Delhi
PREVENTION OF CYBER CRIME:



 To prevent cyber stalking avoid disclosing any
information pertaining to oneself. This is as good as
disclosing your identity to strangers in public place.
 Always avoid sending any photograph online particularly
to strangers and chat friends as there have been incidents
of misuse of the photographs.
 Always use latest and up date anti virus software to
guard against virus attacks.
 Always keep back up volumes so that one may not suffer
data loss in case of virus contamination
 Never send your credit card number to any site that is not
secured, to guard against frauds.
CONTD.:


 Always keep a watch on the sites that your children are
accessing to prevent any kind of harassment or depravation in
children.
 Web site owners should watch traffic and check any
irregularity on the site. Putting host-based intrusion detection
devices on servers may do this
 Web servers running public sites must be physically separate
protected from internal corporate network.
CONCLUSION


 History is the witness that no legislation has succeeded in
totally eliminating crime from the globe.
 The only possible step is to make people aware of their
rights and duties (to report crime as a collective duty
towards the society) and further making the application
of the laws more stringent to check crime.
 Undoubtedly the IT Act is a historical step in the cyber
world. Further I all together do not deny that there is a
need to bring changes in the Information Technology Act
to make it more effective to combat cyber crime
THANK YOU


Más contenido relacionado

La actualidad más candente

It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyberstalking
CyberstalkingCyberstalking
CyberstalkingTrevschic
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
cyber security legal perspective
cyber security legal perspectivecyber security legal perspective
cyber security legal perspectiveShoeb Ahmed
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)Siddharth Anand
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crimeatuljaybhaye
 

La actualidad más candente (20)

Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
cyber security legal perspective
cyber security legal perspectivecyber security legal perspective
cyber security legal perspective
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 

Destacado (20)

case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
 
Hu rt
Hu rtHu rt
Hu rt
 
Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Section 320 ---- ipc
Section 320 ---- ipcSection 320 ---- ipc
Section 320 ---- ipc
 
Indian Penal Code
Indian Penal CodeIndian Penal Code
Indian Penal Code
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Indian Penal Code - by Alvin Jo caleb
Indian Penal Code - by Alvin Jo calebIndian Penal Code - by Alvin Jo caleb
Indian Penal Code - by Alvin Jo caleb
 
General exceptions Indian Penal Code, (S. 76 to 106)
General  exceptions Indian Penal Code, (S. 76 to 106)General  exceptions Indian Penal Code, (S. 76 to 106)
General exceptions Indian Penal Code, (S. 76 to 106)
 
Indian Criminal Procedure Code.
Indian Criminal Procedure Code.Indian Criminal Procedure Code.
Indian Criminal Procedure Code.
 
The Indian Penal Code.
The Indian Penal Code.The Indian Penal Code.
The Indian Penal Code.
 
INDIAN PENAL CODE
INDIAN PENAL CODEINDIAN PENAL CODE
INDIAN PENAL CODE
 
Indian Penal Code,1860
Indian Penal Code,1860Indian Penal Code,1860
Indian Penal Code,1860
 
Lecture 1: What is Machine Learning?
Lecture 1: What is Machine Learning?Lecture 1: What is Machine Learning?
Lecture 1: What is Machine Learning?
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
An introduction to Machine Learning
An introduction to Machine LearningAn introduction to Machine Learning
An introduction to Machine Learning
 

Similar a Cyber crime

MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleHemraj Singh Chouhan
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCEanthony4web
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Cyber law
Cyber law Cyber law
Cyber law Arshad_A
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Ranjita Naik
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber lawPrashant Angadi
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber lawPrashant Angadi
 

Similar a Cyber crime (20)

Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using Google
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Vipul pdf
Vipul pdfVipul pdf
Vipul pdf
 
Shilpa
ShilpaShilpa
Shilpa
 
Cyber law
Cyber law Cyber law
Cyber law
 
Cyber law01
Cyber law01Cyber law01
Cyber law01
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000Cyber laws and sections according to IT Act 2000
Cyber laws and sections according to IT Act 2000
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 

Último

Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxAneriPatwari
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 

Último (20)

Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 

Cyber crime

  • 2. CYBER CRIME   The term “cyber crime” was first coined by Barry Collins in 1980‟s  “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”  A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both”
  • 3. CYBER CRIMINALS:   The cyber criminals constitute of various groups/ category. The following are the category of cyber criminals: • Children and adolescents between the age group of 6 – 18 years • Organised hackers • Professional hackers / crackers • Discontented employees
  • 4. MODE AND MANNER OF COMMITING CYBER CRIME:   Hacking  Theft of information contained in electronic form  Email bombing  Data diddling  Salami attacks  Denial of Service attack  Virus / worm attacks
  • 5. Contd.   Logic bombs  Trojan attacks  Internet time thefts  Web jacking
  • 6. TYPES OF CYBER CRIME:   AGAINST INDIVIDUALS  AGAINST ORGANISATION  AGAINST SOCIETY AT LARGE
  • 7. AGAINST INDIVIDUALS:   Harassment via e-mails.  Cyber-stalking.  Dissemination of obscene material.  Defamation.  Unauthorized control/access over computers  Indecent exposure.  Email spoofing.  Cheating & Fraud.
  • 8. AGAINST ORGANISATION:   Cyber terrorism against the government organization.  Distribution of pirated software etc.
  • 9. AGAINST SOCIETY AT LARGE:   Pornography (basically child pornography).  Polluting the youth through indecent exposure.  Trafficking.  Financial crimes.  Sale of illegal articles.  Online gambling.  Forgery.
  • 11. CYBER CRIMES IN INDIA: 
  • 12. STATUTORY PROVISONS:   The Indian parliament considered it necessary to give effect to the resolution by which the General Assembly adopted Model Law on Electronic Commerce adopted by the United Nations  As a consequence of which the Information Technology Act 2000 was passed and enforced on 17th May 2000.  The Information Technology Act deals with the various cyber crimes in chapters IX & XI. The important sections are Ss. 43,65,66,67
  • 13. VARIOUS SECTIONS:  Section 43 deals with the unauthorised access, unauthorised downloading, virus attacks or any contaminant, causes damage, disruption, denial of access, interference with the service availed by a person Section 65 deals with „tampering with computer source documents‟ and provides for imprisonment up to 3 years or fine Section 66 deals with „hacking with computer system’ and provides for imprisonment up to 3 years or fine section 67 deals with publication of obscene material and provides for imprisonment up to a term of 10 years
  • 14. SECTION 65: SOURCE CODE   Most important asset of software companies  “Computer Source Code" means the listing of programmes, computer commands, design and layout  Ingredients  Knowledge or intention  Concealment, destruction, alteration  computer source code required to be kept or maintained by law  Punishment  imprisonment up to three years and / or  fine up to INR. 2 lakh
  • 15. SECTION 67: PORNOGRAPHY:  Ingredients   Publishing or transmitting or causing to be published  in the electronic form,  Obscene material  Punishment  On first conviction  imprisonment of either description up to five years and  fine up to INR. 1 lakh  On subsequent conviction  imprisonment of either description up to ten years and  fine up to INR. 2 lakh  Section covers  Internet Service Providers,  Search engines,  Pornographic websites  Cognizable, Non- Bail able , JMIC/ Court of Sessions
  • 16. CYBER PORNOGRAPHY CASES:   DPS mms case  Air Force Baal Bharati School case  Miss Jammu mms case
  • 17. Sec 69: Decryption of information:   Ingredients  Controller issues order to Government agency to intercept any information transmitted through any computer resource.  Order is issued in the interest of the      sovereignty or integrity of India, the security of the State, friendly relations with foreign States, public order or preventing incitement for commission of a cognizable offence  Person in charge of the computer resource fails to extend all facilities and technical assistance to decrypt the information-punishment up to 7 years.
  • 18. Sec 70: Protected System  Ingredients   Securing unauthorised access or attempting to secure unauthorised access  to „protected system‟  Acts covered by this section:     Switching computer on / off Using installed software / hardware Installing software / hardware Port scanning  Punishment  Imprisonment up to 10 years and fine  Cognizable, Non-Bail able, Court of Sessions
  • 19. Sections 71  Section – 71:   Offence Name - Misrepresentation to the Controller or the Certifying Authority  Description - Making any misrepresentation to, or suppression of any material fact from, the Controller or the Certifying Authority for obtaining any license or Digital Signature Certificate, as the case may be.  Penalty - Imprisonment for a term which may extend to 2 years, or with fine up to 1 lakh Rupees, or with both
  • 20. Section 72  section – 72:   Offence Name - Penalty for breach of confidentiality and privacy  Description - Any person who, in pursuance of any of the powers conferred under IT Act, has secured access to any electronic record, book, register, correspondence, information or document without the consent of the person concerned discloses such electronic record, book., register, correspondence, information, document to any other person.  Penalty - Imprisonment for a term which may extend to 2 years, or with fine up to 1 lakh Rupees, or with both.
  • 21. Sections 73 Section – 73:   Offence Name - Publishing Digital Signature Certificate false in certain particulars  Description - Publishing a Digital Signature Certificate or otherwise making it available to any other person with the knowledge that the Certifying Authority listed in the certificate has not issued it or the subscriber listed in the certificate has not accepted it or the certificate has been revoked or suspended, unless such publication is for the purpose of verifying a digital signature created prior to such suspension or revocation.  Penalty - Imprisonment for a term which may extend to 2 years, or with fine which may extend to 1 lakh Rupees.
  • 22. SECTION 74   Section – 74:  Offence Name - Publication for fraudulent purpose  Description - Creation, publication or otherwise making available a Digital Signature  Certificate for any fraudulent or unlawful purpose  Penalty - Imprisonment for a term which may extend to 2 years, or with fine up to 1 lakh Rupees, or with both. .
  • 23. Computer Related Crimes under IPC and Special Laws  Sending threatening messages by email Sec 503 IPC Sending defamatory messages by email Sec 499, 500 IPC Forgery of electronic records Sec 463, 470, 471 IPC Bogus websites, cyber frauds Sec 420 IPC Email spoofing Sec 416, 417, 463 IPC Online sale of Drugs NDPS Act Web - Jacking Sec. 383 IPC Online sale of Arms Arms Act
  • 24. Some more offences dealt with under IPC…   Criminal breach of trust/Fraud- Sec. 405,406,408,409 IPC  Destruction of electronic evidence-Sec.204,477 IPC  False electronic evidence-Sec.193 IPC  Offences by or against public servantSec.167,172,173,175 IPC
  • 25. CASE STUDY:BANK NSP-2003   The Bank NSP case is the one where a management trainee of the bank was engaged to be married. The couple exchanged many emails using the company computers. After some time the two broke up and the girl created fraudulent email ids such as “indianbarassociations” and sent emails to the boy‟s foreign clients. She used the banks computer to do this. The boy‟s company lost a large number of clients and took the bank to court. The bank was held liable for the emails sent using the bank‟s system. Ref: Talwant Singh Addl. District & Sessions Judge, Delhi
  • 26. PREVENTION OF CYBER CRIME:   To prevent cyber stalking avoid disclosing any information pertaining to oneself. This is as good as disclosing your identity to strangers in public place.  Always avoid sending any photograph online particularly to strangers and chat friends as there have been incidents of misuse of the photographs.  Always use latest and up date anti virus software to guard against virus attacks.  Always keep back up volumes so that one may not suffer data loss in case of virus contamination  Never send your credit card number to any site that is not secured, to guard against frauds.
  • 27. CONTD.:   Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children.  Web site owners should watch traffic and check any irregularity on the site. Putting host-based intrusion detection devices on servers may do this  Web servers running public sites must be physically separate protected from internal corporate network.
  • 28. CONCLUSION   History is the witness that no legislation has succeeded in totally eliminating crime from the globe.  The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime.  Undoubtedly the IT Act is a historical step in the cyber world. Further I all together do not deny that there is a need to bring changes in the Information Technology Act to make it more effective to combat cyber crime