SlideShare una empresa de Scribd logo
1 de 25
CYBER CRIME
Science and crime
   Crime is a social and economic phenomenon
   “a legal wrong that can be followed by criminal
    proceedings which may result into
    punishment.”
   Legal definition : Crime is an intentional act
    of commission or omission in contravention
    to the law of the land and accordingly
    punishable when proved in judicial
    proceeding
   Conventional and new forms of crime
   White collar crime
   Organized crime
   Victimless crime
   The term “cyber crime” was first coined by
    Barry Collins in 1980’s
   “Any criminal activity that uses a computer
    either as an instrumentality, target or a means
    for perpetuating further crimes comes within
    the ambit of cyber crime”
   A generalized definition of cyber crime may
    be “ unlawful acts wherein the computer is
    either a tool or target or both”
   Capacity to store data in comparatively small
    space
   Easy to access
   Complex
   Negligence
   Loss of evidence
   The cyber criminals constitute of various
    groups/ category. The following are the
    category of cyber criminals:
•   Children and adolescents between the age
    group of 6 – 18 years
•   Organised hackers
•   Professional hackers / crackers
•   Discontented employees
   Hacking
   Theft of information contained in electronic
    form
   Email bombing
   Data diddling
   Salami attacks
   Denial of Service attack
   Virus / worm attacks
   Logic bombs
   Trojan attacks
   Internet time thefts
   Web jacking
Internal           Virus             worms              Trojan horses
Computer
crimes
Telecommunicati-   Phone breaking    Phone tapping      Hacking
on crimes

Computer           Embezzlements     Frauds
Manipulation
Crimes
Support of         Data bases to     Data bases to      Money laundering
Criminal           support drug      keep records of
Enterprises        Distribution      client
                                     transaction
Hardware and       Software piracy   Theft of computer Theft of trade
software                             and microchips    secrets
Theft
Classification of cyber crime
   1. Against            2. Against
  Individuals           Organization
a. their person &       a. Government      3. Against Society at
                               c.                  large
b. their property   Firm, Company, Group
 of an individual        of Individuals
    Harassment via e-mails.
   Cyber-stalking.
   Dissemination of obscene material.
   Defamation.
   Unauthorized control/access over computers
   Indecent exposure
   Email spoofing
    Cheating & Fraud
    Computer vandalism.
   Transmitting virus.
    Net trespass
    Unauthorized control/access over computers
   Intellectual Property crimes
    Internet time thefts
   Cyber terrorism against the government
    organization.
   Distribution of pirated software etc.
CYBER TERRORISM
Scientific war against
Governments
   Cyber terrorism is the convergence of terrorism
    and cyberspace. It is generally understood to
    mean unlawful attacks and threats of attack
    against computers, networks, and the
    information stored therein when done to
    intimidate or coerce a government or its people
    in furtherance of political or social objectives.
LTTE                     AUM

Perpetrator   Group/Individual          Group/Individual

Place         Sri                       Japan/US/Worldwide
              Lanka/London/Australia    Worldwide
Tool          Threats/Violence/Recruitm Violence/Recruitment/
              ent/Education/Strategies  Education/Strategies

Target        Government                Governments
              Officials/Recruits
Motivation    Social/Political Change   World Domination
   DETERRENCE
   CRIMINAL JUSTICE
   ENHANCED DEFENSE
   NEGOTIATIONS
    Pornography (basically child pornography)
    Polluting the youth through indecent
    exposure
    Trafficking
   Financial crimes
   Sale of illegal articles
   Online gambling
   Forgery
   The Indian parliament considered it necessary to give effect
    to the resolution by which the General Assembly adopted
    Model Law on Electronic Commerce adopted by the United
    Nations
   As a consequence of which the Information Technology Act
    2000 was passed and enforced on 17th May 2000.
   The Information Technology Act deals with the various cyber
    crimes in chapters IX & XI. The important sections are Ss.
    43,65,66,67
deals with the unauthorised access, unauthorised
Section 43   downloading, virus attacks or any contaminant, causes
             damage, disruption, denial of access, interference with
             the service availed by a person
             deals with ‘tampering with computer source documents’
Section 65   and provides for imprisonment up to 3 years or fine


             deals with ‘hacking with computer system’ and provides
Section 66   for imprisonment up to 3 years or fine


             deals with publication of obscene material and provides
section 67   for imprisonment up to a term of 10 years
   To prevent cyber stalking avoid disclosing any
    information pertaining to oneself. This is as good as
    disclosing your identity to strangers in public place.
   Always avoid sending any photograph online
    particularly to strangers and chat friends as there
    have been incidents of misuse of the photographs.
   Always use latest and up date anti virus software to
    guard against virus attacks.
   Always keep back up volumes so that one may not
    suffer data loss in case of virus contamination
   Never send your credit card number to any site that is
    not secured, to guard against frauds.
   Always keep a watch on the sites that your
    children are accessing to prevent any kind of
    harassment or depravation in children.
   Web site owners should watch traffic and check
    any irregularity on the site. Putting host-based
    intrusion detection devices on servers may do
    this
   Web servers running public sites must be
    physically separate protected from internal
    corporate network.
   History is the witness that no legislation has
    succeeded in totally eliminating crime from the globe.

   The only possible step is to make people aware of
    their rights and duties (to report crime as a collective
    duty towards the society) and further making the
    application of the laws more stringent to check crime.

   Undoubtedly the IT Act is a historical step in the cyber
    world. Further I all together do not deny that there is a
    need to bring changes in the Information Technology
    Act to make it more effective to combat cyber crime.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Destacado

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among studentsjune21harsh
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentationsarahj6
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Jacqueline Fick
 
Secure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSecure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSkybox Security
 
Crime Detection And Prevention Method By Using HCI
Crime Detection And  Prevention Method By Using HCICrime Detection And  Prevention Method By Using HCI
Crime Detection And Prevention Method By Using HCIPAF KIET
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crimeELDO RAJU
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)Siddharth Anand
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti SajibeKanti
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 

Destacado (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentation
 
Cybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber SpiesCybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber Spies
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...
 
Secure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSecure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual Intelligence
 
Crime Detection And Prevention Method By Using HCI
Crime Detection And  Prevention Method By Using HCICrime Detection And  Prevention Method By Using HCI
Crime Detection And Prevention Method By Using HCI
 
CRIME DETECTION
CRIME DETECTIONCRIME DETECTION
CRIME DETECTION
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 

Similar a CYBER CRIME AND SCIENCE

Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 

Similar a CYBER CRIME AND SCIENCE (20)

Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

Más de Paul Senthil

Más de Paul Senthil (7)

CRPF
CRPFCRPF
CRPF
 
police force ppt.pptx
police force ppt.pptxpolice force ppt.pptx
police force ppt.pptx
 
Environmental administration
Environmental administrationEnvironmental administration
Environmental administration
 
Hr and un
Hr and unHr and un
Hr and un
 
Japan constitution
Japan constitutionJapan constitution
Japan constitution
 
Motivation
MotivationMotivation
Motivation
 
Ne gp
Ne gpNe gp
Ne gp
 

Último

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 

Último (20)

LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 

CYBER CRIME AND SCIENCE

  • 2. Crime is a social and economic phenomenon  “a legal wrong that can be followed by criminal proceedings which may result into punishment.”  Legal definition : Crime is an intentional act of commission or omission in contravention to the law of the land and accordingly punishable when proved in judicial proceeding
  • 3. Conventional and new forms of crime  White collar crime  Organized crime  Victimless crime
  • 4. The term “cyber crime” was first coined by Barry Collins in 1980’s  “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”  A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both”
  • 5. Capacity to store data in comparatively small space  Easy to access  Complex  Negligence  Loss of evidence
  • 6. The cyber criminals constitute of various groups/ category. The following are the category of cyber criminals: • Children and adolescents between the age group of 6 – 18 years • Organised hackers • Professional hackers / crackers • Discontented employees
  • 7. Hacking  Theft of information contained in electronic form  Email bombing  Data diddling  Salami attacks  Denial of Service attack  Virus / worm attacks  Logic bombs
  • 8. Trojan attacks  Internet time thefts  Web jacking
  • 9. Internal Virus worms Trojan horses Computer crimes Telecommunicati- Phone breaking Phone tapping Hacking on crimes Computer Embezzlements Frauds Manipulation Crimes Support of Data bases to Data bases to Money laundering Criminal support drug keep records of Enterprises Distribution client transaction Hardware and Software piracy Theft of computer Theft of trade software and microchips secrets Theft
  • 10. Classification of cyber crime 1. Against 2. Against Individuals Organization a. their person & a. Government 3. Against Society at c. large b. their property Firm, Company, Group of an individual of Individuals
  • 11. Harassment via e-mails.  Cyber-stalking.  Dissemination of obscene material.  Defamation.  Unauthorized control/access over computers  Indecent exposure  Email spoofing  Cheating & Fraud
  • 12. Computer vandalism.  Transmitting virus.  Net trespass  Unauthorized control/access over computers  Intellectual Property crimes  Internet time thefts
  • 13. Cyber terrorism against the government organization.  Distribution of pirated software etc.
  • 14. CYBER TERRORISM Scientific war against Governments
  • 15. Cyber terrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
  • 16. LTTE AUM Perpetrator Group/Individual Group/Individual Place Sri Japan/US/Worldwide Lanka/London/Australia Worldwide Tool Threats/Violence/Recruitm Violence/Recruitment/ ent/Education/Strategies Education/Strategies Target Government Governments Officials/Recruits Motivation Social/Political Change World Domination
  • 17. DETERRENCE  CRIMINAL JUSTICE  ENHANCED DEFENSE  NEGOTIATIONS
  • 18. Pornography (basically child pornography)  Polluting the youth through indecent exposure  Trafficking  Financial crimes  Sale of illegal articles  Online gambling  Forgery
  • 19.
  • 20.
  • 21. The Indian parliament considered it necessary to give effect to the resolution by which the General Assembly adopted Model Law on Electronic Commerce adopted by the United Nations  As a consequence of which the Information Technology Act 2000 was passed and enforced on 17th May 2000.  The Information Technology Act deals with the various cyber crimes in chapters IX & XI. The important sections are Ss. 43,65,66,67
  • 22. deals with the unauthorised access, unauthorised Section 43 downloading, virus attacks or any contaminant, causes damage, disruption, denial of access, interference with the service availed by a person deals with ‘tampering with computer source documents’ Section 65 and provides for imprisonment up to 3 years or fine deals with ‘hacking with computer system’ and provides Section 66 for imprisonment up to 3 years or fine deals with publication of obscene material and provides section 67 for imprisonment up to a term of 10 years
  • 23. To prevent cyber stalking avoid disclosing any information pertaining to oneself. This is as good as disclosing your identity to strangers in public place.  Always avoid sending any photograph online particularly to strangers and chat friends as there have been incidents of misuse of the photographs.  Always use latest and up date anti virus software to guard against virus attacks.  Always keep back up volumes so that one may not suffer data loss in case of virus contamination  Never send your credit card number to any site that is not secured, to guard against frauds.
  • 24. Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children.  Web site owners should watch traffic and check any irregularity on the site. Putting host-based intrusion detection devices on servers may do this  Web servers running public sites must be physically separate protected from internal corporate network.
  • 25. History is the witness that no legislation has succeeded in totally eliminating crime from the globe.  The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime.  Undoubtedly the IT Act is a historical step in the cyber world. Further I all together do not deny that there is a need to bring changes in the Information Technology Act to make it more effective to combat cyber crime.