2. Crime is a social and economic phenomenon
“a legal wrong that can be followed by criminal
proceedings which may result into
punishment.”
Legal definition : Crime is an intentional act
of commission or omission in contravention
to the law of the land and accordingly
punishable when proved in judicial
proceeding
3. Conventional and new forms of crime
White collar crime
Organized crime
Victimless crime
4. The term “cyber crime” was first coined by
Barry Collins in 1980’s
“Any criminal activity that uses a computer
either as an instrumentality, target or a means
for perpetuating further crimes comes within
the ambit of cyber crime”
A generalized definition of cyber crime may
be “ unlawful acts wherein the computer is
either a tool or target or both”
5. Capacity to store data in comparatively small
space
Easy to access
Complex
Negligence
Loss of evidence
6. The cyber criminals constitute of various
groups/ category. The following are the
category of cyber criminals:
• Children and adolescents between the age
group of 6 – 18 years
• Organised hackers
• Professional hackers / crackers
• Discontented employees
7. Hacking
Theft of information contained in electronic
form
Email bombing
Data diddling
Salami attacks
Denial of Service attack
Virus / worm attacks
Logic bombs
8. Trojan attacks
Internet time thefts
Web jacking
9. Internal Virus worms Trojan horses
Computer
crimes
Telecommunicati- Phone breaking Phone tapping Hacking
on crimes
Computer Embezzlements Frauds
Manipulation
Crimes
Support of Data bases to Data bases to Money laundering
Criminal support drug keep records of
Enterprises Distribution client
transaction
Hardware and Software piracy Theft of computer Theft of trade
software and microchips secrets
Theft
10. Classification of cyber crime
1. Against 2. Against
Individuals Organization
a. their person & a. Government 3. Against Society at
c. large
b. their property Firm, Company, Group
of an individual of Individuals
11. Harassment via e-mails.
Cyber-stalking.
Dissemination of obscene material.
Defamation.
Unauthorized control/access over computers
Indecent exposure
Email spoofing
Cheating & Fraud
12. Computer vandalism.
Transmitting virus.
Net trespass
Unauthorized control/access over computers
Intellectual Property crimes
Internet time thefts
13. Cyber terrorism against the government
organization.
Distribution of pirated software etc.
15. Cyber terrorism is the convergence of terrorism
and cyberspace. It is generally understood to
mean unlawful attacks and threats of attack
against computers, networks, and the
information stored therein when done to
intimidate or coerce a government or its people
in furtherance of political or social objectives.
16. LTTE AUM
Perpetrator Group/Individual Group/Individual
Place Sri Japan/US/Worldwide
Lanka/London/Australia Worldwide
Tool Threats/Violence/Recruitm Violence/Recruitment/
ent/Education/Strategies Education/Strategies
Target Government Governments
Officials/Recruits
Motivation Social/Political Change World Domination
18. Pornography (basically child pornography)
Polluting the youth through indecent
exposure
Trafficking
Financial crimes
Sale of illegal articles
Online gambling
Forgery
19.
20.
21. The Indian parliament considered it necessary to give effect
to the resolution by which the General Assembly adopted
Model Law on Electronic Commerce adopted by the United
Nations
As a consequence of which the Information Technology Act
2000 was passed and enforced on 17th May 2000.
The Information Technology Act deals with the various cyber
crimes in chapters IX & XI. The important sections are Ss.
43,65,66,67
22. deals with the unauthorised access, unauthorised
Section 43 downloading, virus attacks or any contaminant, causes
damage, disruption, denial of access, interference with
the service availed by a person
deals with ‘tampering with computer source documents’
Section 65 and provides for imprisonment up to 3 years or fine
deals with ‘hacking with computer system’ and provides
Section 66 for imprisonment up to 3 years or fine
deals with publication of obscene material and provides
section 67 for imprisonment up to a term of 10 years
23. To prevent cyber stalking avoid disclosing any
information pertaining to oneself. This is as good as
disclosing your identity to strangers in public place.
Always avoid sending any photograph online
particularly to strangers and chat friends as there
have been incidents of misuse of the photographs.
Always use latest and up date anti virus software to
guard against virus attacks.
Always keep back up volumes so that one may not
suffer data loss in case of virus contamination
Never send your credit card number to any site that is
not secured, to guard against frauds.
24. Always keep a watch on the sites that your
children are accessing to prevent any kind of
harassment or depravation in children.
Web site owners should watch traffic and check
any irregularity on the site. Putting host-based
intrusion detection devices on servers may do
this
Web servers running public sites must be
physically separate protected from internal
corporate network.
25. History is the witness that no legislation has
succeeded in totally eliminating crime from the globe.
The only possible step is to make people aware of
their rights and duties (to report crime as a collective
duty towards the society) and further making the
application of the laws more stringent to check crime.
Undoubtedly the IT Act is a historical step in the cyber
world. Further I all together do not deny that there is a
need to bring changes in the Information Technology
Act to make it more effective to combat cyber crime.