SlideShare una empresa de Scribd logo
1 de 22
What is Crime??? ? 
 An action or omission that constitutes an offense 
that may be prosecuted by the state and is 
punishable by law. 
 The greatest crimes do not arise from a want of 
feeling for others but from an over sensibility for 
ourselves and an over indulgence in our own 
desires.
What is Cyber Crime??? ? 
Crime committed using a computer and the internet to steal a person's 
identity or sell contraband or stalk victims or disrupt operations with 
malevolent programs.. 
 Cyber Crime is emerging as a serious threat. 
 Threatening Email, Assuming someone's Identity, Sexual 
Harassment, Defamation, Spam and Phishing are some examples 
where computers are used to commit crime. 
Viruses, Worms and Industrial Espionage, Software Piracy and 
Hacking are examples where computers become target of crime.
Cyber Crime Variants 
 Hacking 
 "Hacking" is a crime, which entails cracking systems and gaining 
unauthorized access to the data stored in them. Hacking had 
witnessed a 37 percent increase this year. 
 Hacker 
 Hacker (programmer subculture), who combines excellence, 
playfulness, cleverness and exploration in performed activities. 
 Kevin David Mitnick is first hacker.
Cyber Squatting :- 
 Cyber Squatting is the act of registering a famous Domain 
Name and then selling it for a fortune. 
 Phishing :- 
 Phishing is just one of the many frauds on the Internet, trying to 
fool people into parting with their money. 
 Phishing refers to the receipt of unsolicited emails by customers of 
Financial Institutions, requesting them to enter their Username, 
Password or other personal information to access their Account for 
some reason.
 The fraudster then has access to the customer's online bank 
account and to the funds contained in that account.
How it Works ??? ?
Cyber Stalking :- 
 Cyber Stalking is use of the Internet or other electronic 
means to stalk someone. 
 This term is used interchangeably with online harassment 
and online abuse. 
 Stalking generally involves harassing or threatening 
behaviour that an individual engages in repeatedly, such as 
following a person, appearing at a person's home or place 
of business, making harassing phone calls, leaving written 
messages or objects, or vandalizing a person's property.
Vishing :- 
 Vishing is the criminal practice of using social engineering and 
Voice over IP (VoIP) to gain access to private personal and 
financial information from the public for the purpose of 
financial reward. 
 The term is a combination of “Voice" and phishing. 
 Vishing exploits the public's trust via landline telephone 
services. 
 Vishing is typically used to steal credit card numbers or other 
information used in identity theft schemes from individuals.
Indian Crime Scene 
 The major Cyber Crimes reported, in India, are Denial of 
Services, Defacement of Websites, Spam, Computer Virus 
and Worms, Pornography, Cyber Squatting, Cyber Stalking 
and Phishing. 
 Given the fact that nearly $ 120 million worth of 
Mobiles are being lost or stolen in the country every year. 
 Nearly 69 per cent of information theft is carried out 
by current and ex-employees and 31 per cent by 
hackers.
Top Countries in Cyber Crime :- 
India stands 11th in the ranking for Cyber Crime in the World, constituting 
3% of the Global Cyber Crime.
Why India??? ? 
A rapidly growing online user 
base 
 121 Million Internet Users 
 65 Million Active Internet Users, up by 28% from 51 
million in 2010 
 50 Million users shop online on Ecommerce and Online 
Shopping Sites 
 46+ Million Social Network Users 
 346 million mobile users had subscribed to Data 
Packages.
The majority of cybercrimes are centered on forgery, fraud and Phishing, 
India is the third-most targeted country for Phishing attacks after the US 
and the UK, 
Social networks as well as ecommerce sites are major targets, 
6.9 million bot-infected systems in 2010, 
14,348 website defacements in 2010. 
6,850 .in and 4,150 .com domains were defaced during 2011, 
15,000 sites hacked in 2011, 
India is the number 1 country in the world for generating spam.
The police have recorded 3,038 cases but made only 2,700 
arrests in 3 years (between 2007 and 2010). 
India registered only 1,350 cases under the IT Act and IPC in 2010 
50% of cybercrimes are not even reported.
Cyber Laws in India 
The Information Technology Act, 2000 
CHAPTER XI – OFFENCES – 66. Hacking with computer 
system  Whoever with the Intent to cause Wrongful Loss or Damage to the public or 
any person Destroys or Deletes or Alters any Information Residing in 
Computer Resource or diminishes its value or utility or affects it injuriously by 
any means, commits hack 
 Whoever commits hacking shall be punished with imprisonment up to three 
years, or with fine which may extend up to two lakh rupees, or 
with both. 
 Whoever without permission of the owner of the computer :- 
• Secures Access, Downloads, Copies or extract any data, computer 
database or any information; 
• Introduce or causes to be introduce any Virus Contaminant 
Shall be liable to pay damages by way of compensation not exceeding 
one crore rupees to the person so affected.
Information Technology 
Amendment Act, 2008  Section – 43, 
 Destroys, Deletes or Alters any Information residing in a 
computer resource or diminishes its value or utility or 
affects it injuriously by any means. 
 Steals, conceals, destroys or alters any computer source 
code with an intention to cause damage; 
 Punishment for sending offensive messages through 
communication service, etc. 
 Punishment for identity theft 
 Punishment for cheating by personation by using computer 
resource 
 Punishment for violation of privacy.
Arrest And Reports For Cyber Crime in India 
o Under the IPC, 356 cybercrime cases were registered 
in 2010 (276 cases in 2009) 
o Geographic breakdown of cases reported 
o 104 from Maharashtra 
o 66 Andhra Pradesh 
o 46 Chhattisgarh 
o The majority of these crimes were either forgery or 
fraud cases. 
 Under the IT Act, 966 cybercrime cases were 
filed in 2010 420 in 2009). 
 233 persons were arrested in 2010. 
 33% of the cases registered were related to 
hacking
How to Tackle Such activity??? ? 
An important question arises that how can these crimes be 
prevented. A number of techniques and solutions have been 
presented but the problems still exists and are increasing day by 
day. 
 Antivirus And Anti Spyware Software: 
Аntivirus software consists of computer programs that 
attempt to identify, thwart and eliminate computer viruses 
and other malicious software. 
Anti spywares are used to restrict backdoor program, trojans 
and other spywares to be installed on the computer. 
 Firewalls: 
protects a computer network from unauthorized access. 
may be hardware devices, software programs, or a 
combination of the two. typically guards an internal computer 
network against malicious access from outside the network.
Cryptography: 
Cryptography is the science of encrypting and decrypting 
information. Encryption is like sending a postal mail to 
another party with a lock code on the envelope which is known 
only to the sender and the recipient. A number of 
cryptographic methods have been developed and some of them 
are still not cracked. 
Cyber Ethics and Laws: 
Cyber ethics and cyber laws are also being formulated to stop 
cyber crimes. 
Security Software like Anti Viruses and Anti SpyWares should 
be installed on all computers. 
Internet Service Providers should also provide high level of 
security at their servers.
The Future of Cyber-Crimes in India 
Continued Website Hacks and Defacements 
Data and Information theft 
Increasing phishing attacks on Ecommerce and 
Financial Websites 
Cybercriminals targeting Social and 
Professional Networks 
Threats directed at the Mobile Platform: 
Smartphones and Tablets
Conclusion:- 
Indian Laws are well drafted and are capable of 
handling all kinds of challenges as posed by 
cyber criminals. However, the enforcement 
agencies are required to be well versed with the 
changing technologies and Laws.” 
As internet technology advances so does the 
threat of cyber crime. In times like these we 
must protect ourselves from cyber crime. Anti-virus 
software, firewalls and security patches 
are just the beginning. Never open suspicious e-mails 
and only navigate to trusted sites.”
Cyber crime and laws

Más contenido relacionado

La actualidad más candente

Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studiesBhagya Bgk
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal guptakg19
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaDr. Arun Verma
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Cyber crime
Cyber crimeCyber crime
Cyber crimedixitas
 
Cyber law
Cyber law Cyber law
Cyber law Arshad_A
 
Cyber law
Cyber lawCyber law
Cyber lawabiabel
 

La actualidad más candente (20)

Cyber laws with case studies
Cyber laws with case studiesCyber laws with case studies
Cyber laws with case studies
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber law
Cyber law Cyber law
Cyber law
 
Cyber security
Cyber security Cyber security
Cyber security
 
Shilpa
ShilpaShilpa
Shilpa
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 

Similar a Cyber crime and laws

CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Sooraj Maurya
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
Internet
InternetInternet
InternetJodip
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxVipinRawat52
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 

Similar a Cyber crime and laws (20)

CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Internet
InternetInternet
Internet
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 

Último

BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 

Último (20)

BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 

Cyber crime and laws

  • 1.
  • 2. What is Crime??? ?  An action or omission that constitutes an offense that may be prosecuted by the state and is punishable by law.  The greatest crimes do not arise from a want of feeling for others but from an over sensibility for ourselves and an over indulgence in our own desires.
  • 3. What is Cyber Crime??? ? Crime committed using a computer and the internet to steal a person's identity or sell contraband or stalk victims or disrupt operations with malevolent programs..  Cyber Crime is emerging as a serious threat.  Threatening Email, Assuming someone's Identity, Sexual Harassment, Defamation, Spam and Phishing are some examples where computers are used to commit crime. Viruses, Worms and Industrial Espionage, Software Piracy and Hacking are examples where computers become target of crime.
  • 4. Cyber Crime Variants  Hacking  "Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 percent increase this year.  Hacker  Hacker (programmer subculture), who combines excellence, playfulness, cleverness and exploration in performed activities.  Kevin David Mitnick is first hacker.
  • 5. Cyber Squatting :-  Cyber Squatting is the act of registering a famous Domain Name and then selling it for a fortune.  Phishing :-  Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money.  Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason.
  • 6.  The fraudster then has access to the customer's online bank account and to the funds contained in that account.
  • 7. How it Works ??? ?
  • 8. Cyber Stalking :-  Cyber Stalking is use of the Internet or other electronic means to stalk someone.  This term is used interchangeably with online harassment and online abuse.  Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property.
  • 9. Vishing :-  Vishing is the criminal practice of using social engineering and Voice over IP (VoIP) to gain access to private personal and financial information from the public for the purpose of financial reward.  The term is a combination of “Voice" and phishing.  Vishing exploits the public's trust via landline telephone services.  Vishing is typically used to steal credit card numbers or other information used in identity theft schemes from individuals.
  • 10. Indian Crime Scene  The major Cyber Crimes reported, in India, are Denial of Services, Defacement of Websites, Spam, Computer Virus and Worms, Pornography, Cyber Squatting, Cyber Stalking and Phishing.  Given the fact that nearly $ 120 million worth of Mobiles are being lost or stolen in the country every year.  Nearly 69 per cent of information theft is carried out by current and ex-employees and 31 per cent by hackers.
  • 11. Top Countries in Cyber Crime :- India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the Global Cyber Crime.
  • 12. Why India??? ? A rapidly growing online user base  121 Million Internet Users  65 Million Active Internet Users, up by 28% from 51 million in 2010  50 Million users shop online on Ecommerce and Online Shopping Sites  46+ Million Social Network Users  346 million mobile users had subscribed to Data Packages.
  • 13. The majority of cybercrimes are centered on forgery, fraud and Phishing, India is the third-most targeted country for Phishing attacks after the US and the UK, Social networks as well as ecommerce sites are major targets, 6.9 million bot-infected systems in 2010, 14,348 website defacements in 2010. 6,850 .in and 4,150 .com domains were defaced during 2011, 15,000 sites hacked in 2011, India is the number 1 country in the world for generating spam.
  • 14. The police have recorded 3,038 cases but made only 2,700 arrests in 3 years (between 2007 and 2010). India registered only 1,350 cases under the IT Act and IPC in 2010 50% of cybercrimes are not even reported.
  • 15. Cyber Laws in India The Information Technology Act, 2000 CHAPTER XI – OFFENCES – 66. Hacking with computer system  Whoever with the Intent to cause Wrongful Loss or Damage to the public or any person Destroys or Deletes or Alters any Information Residing in Computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack  Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.  Whoever without permission of the owner of the computer :- • Secures Access, Downloads, Copies or extract any data, computer database or any information; • Introduce or causes to be introduce any Virus Contaminant Shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected.
  • 16. Information Technology Amendment Act, 2008  Section – 43,  Destroys, Deletes or Alters any Information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means.  Steals, conceals, destroys or alters any computer source code with an intention to cause damage;  Punishment for sending offensive messages through communication service, etc.  Punishment for identity theft  Punishment for cheating by personation by using computer resource  Punishment for violation of privacy.
  • 17. Arrest And Reports For Cyber Crime in India o Under the IPC, 356 cybercrime cases were registered in 2010 (276 cases in 2009) o Geographic breakdown of cases reported o 104 from Maharashtra o 66 Andhra Pradesh o 46 Chhattisgarh o The majority of these crimes were either forgery or fraud cases.  Under the IT Act, 966 cybercrime cases were filed in 2010 420 in 2009).  233 persons were arrested in 2010.  33% of the cases registered were related to hacking
  • 18. How to Tackle Such activity??? ? An important question arises that how can these crimes be prevented. A number of techniques and solutions have been presented but the problems still exists and are increasing day by day.  Antivirus And Anti Spyware Software: Аntivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software. Anti spywares are used to restrict backdoor program, trojans and other spywares to be installed on the computer.  Firewalls: protects a computer network from unauthorized access. may be hardware devices, software programs, or a combination of the two. typically guards an internal computer network against malicious access from outside the network.
  • 19. Cryptography: Cryptography is the science of encrypting and decrypting information. Encryption is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender and the recipient. A number of cryptographic methods have been developed and some of them are still not cracked. Cyber Ethics and Laws: Cyber ethics and cyber laws are also being formulated to stop cyber crimes. Security Software like Anti Viruses and Anti SpyWares should be installed on all computers. Internet Service Providers should also provide high level of security at their servers.
  • 20. The Future of Cyber-Crimes in India Continued Website Hacks and Defacements Data and Information theft Increasing phishing attacks on Ecommerce and Financial Websites Cybercriminals targeting Social and Professional Networks Threats directed at the Mobile Platform: Smartphones and Tablets
  • 21. Conclusion:- Indian Laws are well drafted and are capable of handling all kinds of challenges as posed by cyber criminals. However, the enforcement agencies are required to be well versed with the changing technologies and Laws.” As internet technology advances so does the threat of cyber crime. In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls and security patches are just the beginning. Never open suspicious e-mails and only navigate to trusted sites.”