SlideShare una empresa de Scribd logo
1 de 27
Cyber Crimes
& Cyber Laws
Introduction
Crime committed using a computer and the
internet to steal a person's identity or illegal
imports or malicious programs
 Cybercrime is nothing but where the
computer used as an object or subject of
crime.

Cont…
 The

first spam email took place in 1978 when
it was sent out over the Arpanet (Advanced
Research Projects Agency Network),.
 The first virus was installed on an Apple
computer in 1982 when a high school
student, Rich Skrenta, developed the Elk
cloner.
Cyber Crime
Definition :
 Cybercrime is a term for any illegal
activity that uses a computer as its
primary means of commission. The U.S.
Department of Justice expands the
definition of cybercrime to include any
illegal activity that uses a computer for
the storage of evidence.
CYBER CRIMES ARE
MAINLY CLASSIFIED AS:

Those against a person.



Against Properties.



Crime targetting the government.
Against a Person
i. Harassment via e-mails:

Harassment through e-mails is not a new concept. It is
very similar to harassing through letters.
ii. Cyber-stalking :
Cyber stalking involves following a person movements
across the Internet by posting messages.
iii. Email spoofing:
A mail which misrepresents its origin. It shows it's origin to
be different from which actually it originates.
Against Properties
i.Computer Vandalism:

Damaging or destroying data rather than
stealing or misusing them is called cyber
vandalism.
ii.Transmitting virus:
These are programs that attach themselves
to a file and then circulate .
They usually affect the data on a
computer, either by altering or deleting it.
Against Government
Cyber Terrorism:
Terrorist attacks on the Internet is by distributed
denial of service attacks, hate websites and hate
emails, attacks on sensitive computer
networks, etc. Technology savvy terrorists are
using 512-bit encryption, which is impossible to
decrypt.
The recent example may be cited of – Osama Bin
Laden, the LTTE, and attack on America’s army
deployment system during Iraq war.
TYPES OF CYBER
CRIMES








HACKING
DENIAL OF
SERVICE ATTACK
VIRUS
DISSEMINATION
SOFTWARE
PIRACY
PORNOGRAPHY
IRC Crime









NET EXTORTION
PHISHING
SPOOFING
CYBER STALKING
CYBER
DEFAMATION
SALAMI ATTACK
CREDIT CARD
FRAUD
Cyber Criminal
Those who are doing crimes by using the
computer as an target or object.
i. Children and adolescents between the age
group of 6 – 18 years
ii. Dissatisfied employees
iii. Professional hackers / crackers
iv. Organized hackers
Modes & Manners of
Committing Cyber Crimes


Unauthorized access to computer systems or
networks:
This is generally
referred
as
‘Hacking’. That is accessing the
information of others without proper
authorization.



Theft of information contained in electronic
form:
This includes theft of information
stored in computer hard disks, removable
storage media etc.
Cont…
 Data diddling:

This is altering raw data just before a
computer processes it and then changing it
back after the processing is completed.
 Denial of Service attack:
The computer is flooded with more requests
than it can handle which cause it to crash.
Distributed Denial of Service (DDOS) attack
is a example.
Cont…
Trojan attacks:
It means unauthorized programmer. It gains control over
another’s system by representing itself as an authorized
programmer.
 Web jacking:
This term is derived from the term hi jacking. In these
kinds of offences the hacker gains access and control
over the web site of another.
 Email bombing:
It refers to sending large numbers of mail to the
victim, which may be an individual or a
company by ultimately resulting into crashing.

Hacking
Intrusion into a computer system without
the permission of the computer
owner/user.
 E.g : Hacking into Best Western
Database.

Types of Cyber Crimes
i. Child Pornography:

The use of computer networks to create, distribute, or
access materials that sexually use underage children.
ii. Cyber Contraband:
Transferring illegal items through the internet (such
as encryption technology) that is barred in some
locations.
iii. Cyber laundering:
Electronic transfer of illegally-obtained money with
the goal of hiding its source and possibly its
destination.
Cont ..
iv.

v.

Cyber Stalking:
Threats that creates fear through the use of
computer
technology
such
as
email,
phones,
text
messages, webcams, websites or videos.
Cyber Theft:
Using a computer to steal. This includes
activities
related
to:
breaking
and
entering, unlawful appropriation, identity
theft, fraud, malicious hacking and piracy.
Cyber Security




Cyber security involves protection of
sensitive personal and business
information
through
prevention,
detection, and response to different
online attacks.
Cyber security actually protects your
personal information by responding,
detecting and preventing the attacks.
Protecting Your Privacy
Privacy policy :
Before submitting your name, email address, or
other personal information on a web site, look for
the site's privacy policy.
 Evidence that your information is being
encrypted :
To protect attackers from hijacking your
information, any personal information submitted
online should be encrypted. Many sites use SSL
or secure sockets layer, to encrypt information.

How Can We Protect
Keep software up to date:
If the seller releases patches for the software
operating your device, install them as soon as
possible. Installing them will prevent attackers
from being able to take advantage.
 Use good passwords:
Select passwords that will be difficult for thieves
to guess. Do not choose options that allow your
computer to remember your passwords.

Cont …
 Disable remote connectivity:

Some PDA’s and phones are equipped with
wireless technologies, such as Bluetooth, that
can be used to connect to other devices or
computers. You should disable these features
when they are not in use.
Extent of Progress on Updating
Cyber Crime Laws
Substantially or Fully Updated (10):
Australia, Canada, Estonia, India,
Japan, Mauritius, Peru, Philippines,
Turkey, United States

Partially Updated (9):
Brazil, Chile, China, Czech
Republic, Denmark,
Malaysia, Poland, Spain,
United Kingdom

No Updated Laws (33):
Albania, Bulgaria, Burundi, Cuba, Dominican Republic,
Egypt, Ethiopia, Fiji, France, Gambia, Hungary, Iceland,
Iran, Italy, Jordan, Kazakhstan, Latvia, Lebanon,
Lesotho, Malta, Moldova, Morocco, New Zealand,
Nicaragua, Nigeria, Norway, Romania, South Africa,
Sudan, Vietnam, Yugoslavia, Zambia, Zimbabwe
Cyber Laws in INDIA
India has enacted the first I.T.Act, 2000
based on the UNCIRAL model
recommended by the general assembly of
the United Nations.
 Offence under IT Acts


 Tampering with Computer source documents
 Hacking with Computer systems, Data alteration
 Publishing obscene information Un-authorised

access to protected system
 Breach of Confidentiality and Privacy
 Publishing false digital signature certificates
Computer Related Crimes
Covered under IPC & Special
Laws










Sending threatening messages by email
Sending defamatory messages by email
Forgery of electronic records
Bogus websites, cyber frauds
Email spoofing
Web-Jacking
E-Mail Abuse
Online sale of Drugs
Online sale of Arms
DRAWBACKS OF PRESENT CYBER
LAWS


Jurisdiction is the highly debatable issue
 Due to growing arms of cyber space the

territorial boundaries seem to vanish


Loss of evidence because
 data are routinely destroyed
 collection of data outside the territorial extent



Cyber Army
 Requirement for highly technical staff
 High technology crime & investigation

infrastructure


A law regulating the cyber-space
Conclusion


Weak penalties limit deterrence
 These crimes have large-scale economic

and social effects.


Self-protection remains the first line of
defense for e.g.
 Finding the holes in the network
 Using intrusion alert programs
 Using Encryption



A law regulating the cyber-space
Cont …


Co-operation for exchange of material
and evidence of computer crimes
between law enforcement agencies.
THANK YOU

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 

Destacado

Destacado (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber law
Cyber lawCyber law
Cyber law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
INDIAN CYBERLAW
INDIAN CYBERLAWINDIAN CYBERLAW
INDIAN CYBERLAW
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 

Similar a Cyber crime types & laws

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesVivekanandaGN1
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxFakeGamer390
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics sunanditaAnand
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitySohailAkbar14
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfAadil83
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 

Similar a Cyber crime types & laws (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
English in written
English in writtenEnglish in written
English in written
 

Cyber crime types & laws

  • 2. Introduction Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs  Cybercrime is nothing but where the computer used as an object or subject of crime. 
  • 3. Cont…  The first spam email took place in 1978 when it was sent out over the Arpanet (Advanced Research Projects Agency Network),.  The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk cloner.
  • 4. Cyber Crime Definition :  Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission. The U.S. Department of Justice expands the definition of cybercrime to include any illegal activity that uses a computer for the storage of evidence.
  • 5. CYBER CRIMES ARE MAINLY CLASSIFIED AS: Those against a person.  Against Properties.  Crime targetting the government.
  • 6. Against a Person i. Harassment via e-mails: Harassment through e-mails is not a new concept. It is very similar to harassing through letters. ii. Cyber-stalking : Cyber stalking involves following a person movements across the Internet by posting messages. iii. Email spoofing: A mail which misrepresents its origin. It shows it's origin to be different from which actually it originates.
  • 7. Against Properties i.Computer Vandalism: Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. ii.Transmitting virus: These are programs that attach themselves to a file and then circulate . They usually affect the data on a computer, either by altering or deleting it.
  • 8. Against Government Cyber Terrorism: Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt. The recent example may be cited of – Osama Bin Laden, the LTTE, and attack on America’s army deployment system during Iraq war.
  • 9. TYPES OF CYBER CRIMES       HACKING DENIAL OF SERVICE ATTACK VIRUS DISSEMINATION SOFTWARE PIRACY PORNOGRAPHY IRC Crime        NET EXTORTION PHISHING SPOOFING CYBER STALKING CYBER DEFAMATION SALAMI ATTACK CREDIT CARD FRAUD
  • 10. Cyber Criminal Those who are doing crimes by using the computer as an target or object. i. Children and adolescents between the age group of 6 – 18 years ii. Dissatisfied employees iii. Professional hackers / crackers iv. Organized hackers
  • 11. Modes & Manners of Committing Cyber Crimes  Unauthorized access to computer systems or networks: This is generally referred as ‘Hacking’. That is accessing the information of others without proper authorization.  Theft of information contained in electronic form: This includes theft of information stored in computer hard disks, removable storage media etc.
  • 12. Cont…  Data diddling: This is altering raw data just before a computer processes it and then changing it back after the processing is completed.  Denial of Service attack: The computer is flooded with more requests than it can handle which cause it to crash. Distributed Denial of Service (DDOS) attack is a example.
  • 13. Cont… Trojan attacks: It means unauthorized programmer. It gains control over another’s system by representing itself as an authorized programmer.  Web jacking: This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the web site of another.  Email bombing: It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing. 
  • 14. Hacking Intrusion into a computer system without the permission of the computer owner/user.  E.g : Hacking into Best Western Database. 
  • 15. Types of Cyber Crimes i. Child Pornography: The use of computer networks to create, distribute, or access materials that sexually use underage children. ii. Cyber Contraband: Transferring illegal items through the internet (such as encryption technology) that is barred in some locations. iii. Cyber laundering: Electronic transfer of illegally-obtained money with the goal of hiding its source and possibly its destination.
  • 16. Cont .. iv. v. Cyber Stalking: Threats that creates fear through the use of computer technology such as email, phones, text messages, webcams, websites or videos. Cyber Theft: Using a computer to steal. This includes activities related to: breaking and entering, unlawful appropriation, identity theft, fraud, malicious hacking and piracy.
  • 17. Cyber Security   Cyber security involves protection of sensitive personal and business information through prevention, detection, and response to different online attacks. Cyber security actually protects your personal information by responding, detecting and preventing the attacks.
  • 18. Protecting Your Privacy Privacy policy : Before submitting your name, email address, or other personal information on a web site, look for the site's privacy policy.  Evidence that your information is being encrypted : To protect attackers from hijacking your information, any personal information submitted online should be encrypted. Many sites use SSL or secure sockets layer, to encrypt information. 
  • 19. How Can We Protect Keep software up to date: If the seller releases patches for the software operating your device, install them as soon as possible. Installing them will prevent attackers from being able to take advantage.  Use good passwords: Select passwords that will be difficult for thieves to guess. Do not choose options that allow your computer to remember your passwords. 
  • 20. Cont …  Disable remote connectivity: Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use.
  • 21. Extent of Progress on Updating Cyber Crime Laws Substantially or Fully Updated (10): Australia, Canada, Estonia, India, Japan, Mauritius, Peru, Philippines, Turkey, United States Partially Updated (9): Brazil, Chile, China, Czech Republic, Denmark, Malaysia, Poland, Spain, United Kingdom No Updated Laws (33): Albania, Bulgaria, Burundi, Cuba, Dominican Republic, Egypt, Ethiopia, Fiji, France, Gambia, Hungary, Iceland, Iran, Italy, Jordan, Kazakhstan, Latvia, Lebanon, Lesotho, Malta, Moldova, Morocco, New Zealand, Nicaragua, Nigeria, Norway, Romania, South Africa, Sudan, Vietnam, Yugoslavia, Zambia, Zimbabwe
  • 22. Cyber Laws in INDIA India has enacted the first I.T.Act, 2000 based on the UNCIRAL model recommended by the general assembly of the United Nations.  Offence under IT Acts   Tampering with Computer source documents  Hacking with Computer systems, Data alteration  Publishing obscene information Un-authorised access to protected system  Breach of Confidentiality and Privacy  Publishing false digital signature certificates
  • 23. Computer Related Crimes Covered under IPC & Special Laws          Sending threatening messages by email Sending defamatory messages by email Forgery of electronic records Bogus websites, cyber frauds Email spoofing Web-Jacking E-Mail Abuse Online sale of Drugs Online sale of Arms
  • 24. DRAWBACKS OF PRESENT CYBER LAWS  Jurisdiction is the highly debatable issue  Due to growing arms of cyber space the territorial boundaries seem to vanish  Loss of evidence because  data are routinely destroyed  collection of data outside the territorial extent  Cyber Army  Requirement for highly technical staff  High technology crime & investigation infrastructure  A law regulating the cyber-space
  • 25. Conclusion  Weak penalties limit deterrence  These crimes have large-scale economic and social effects.  Self-protection remains the first line of defense for e.g.  Finding the holes in the network  Using intrusion alert programs  Using Encryption  A law regulating the cyber-space
  • 26. Cont …  Co-operation for exchange of material and evidence of computer crimes between law enforcement agencies.