What is cyber crime
Cybercrime is a crime that involves a
computer and a network.
The computer may have been used in the
commission of a crime, or it may
be the target. Cybercrime may harm
someone's security and financial health.
•Confidential business information
•Government information and
• disable a device
It also a cyber crime when the above information is being sold.
•Confidential business information
•Government information and
• disable a device
It also a cyber crime when the above information is being sold.
•Confidential business information
•Government information and
• disable a device
It also a cyber crime when the above information is being sold.
•Confidential business information
•Government information and
• disable a device
It also a cyber crime when the above information is being sold.
•Confidential business information
•Government information and
• disable a device
It also a cyber crime when the above information is being sold.
It may use a device to access user’s
Personal information
Confidential business information
Government information and
disable a device
It also a cyber crime when the above information is being sold.
HISTORY OF CYBER CRIME
The first recorded cyber crime was in year 1820
The 1st case of use of computer theft in 1973. A
teller at local New York bank used a computer
to embezzle over$2 million dollars.
The first spam email took place in 1978 when
it was sent over the Arpanet.
The first virus was installed on apple computer
in 1982
First person to convicted a cyber crime
In 1981 LAN MURPHY KNOWN AS CAPTAIN ZAP TO
HIS FANS BEEN 1ST to convicted crime
He hacked into the AT&T network and changed
the internal clock to change off the hours rates of
peak times
He received 1000hours of community service and
2.5 years of probation, a mere slap on the wrist
compared to today’s penalties , and was the
inspiration for the movie sneakers.
Categories of cyber crime
The computer as a
target – using a
computer ,e.g.
Hacking,
virus/worms
attacks ,Dos attack
etc.
The computer as
weapon- using a
computer to
commit real world
crime e.g. cyber
terrorism , credit
card fraud and
pornography etc.,
TYPES OF CYBER CRIME
Hacking – Illegal intrusion into a computer system and
network known as CRACKING. Though hackers enjoy the
media coverage.
Motive behind the hackers - Greed, Publicity, revenge ,
adventure to access forbidden information.
OTHER TYPES OF CYBER CRIME
>Dental and service attacks
>Virus dissemination
>Computer vandalism
>Cyber terrorism >Software piracy
Law that uses to protect cyber assets is cyber law or
cyber security.
Cyber security is
to protect system
or cyber assets
Cyber law is to
protect system or
cyber assets in legal
way
s
In India cyber law was
contained in the
information technology
Act, 2000 (“IT Act)” NO21
of 2000 notified notified
on 17 October 2000.
It is the primary law in India dealing with dealing with cyber
crime and electronic commerce
ETHICAL HACKING
Citation Information
Technology Act, 2000
Enacted by Parliament of India
Enacted 9 June 2000
Assented to 9 June 2000
Signed 9 May 2000
Commenced 17 October 2000
Introduced by Pramod Mahajan Minister
of Communications and Information Technology
What are the key points of IT Act 2000?
The Act provides a legal framework for electronic
governance by giving recognition to electronic
records and digital signatures. It also defines cyber
crimes and prescribes penalties for them. The Act
directed the formation of a Controller of Certify
Authorities to regulate the issuance of digital
signatures.
Information Technology Amendment Act 2008 (IT 2008)
The Information Technology Amendment Act, 2008
(IT Act 2008) is a substantial addition to India's
Information Technology Act (ITA- 2000). The IT
Amendment Act was passed by the Indian
Parliament in October 2008 and came into force a
year later.
WHY WAS IT Act, 2000 amended in 2008?
• The IT Amendment Act was passed by the Indian Parliament in
October 2008 and came into force a year later.
• The Amendment was created to address issues that the original
bill failed to cover and to accommodate further development of
IT and related security concerns
since the original law was passed.
What are the major changes made in the amendment of
IT Act in 2008?
Section 66A - Sending of offensive or false
messages
Section 66B - receiving
stolen computer resource
S
Section 66C - Identity theft
Section 66D - Cheating by personation
Section 66E - violation of privacy