Cyber Crime.

Slides:



Advertisements
Similar presentations
Rohas Nagpal Asian School of Cyber Laws.  Information Technology Act, 2000 came into force in October 2000  Amended on 27 th October 2009  Indian Penal.
Advertisements

Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
ITA 2008: Law Enforcement & Incident Response -The way forward- By Talwant Singh Addl. Distt. & Sessions Judge Delhi
The Information Technology Act, 2000 and The Information Technology (amendment) Act, 2008 A Comparative analysis By – Sagar Rahurkar.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
INTERNET and CODE OF CONDUCT
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Greg and Jamie unit 5 internet crime. INTERNET CRIME Computer crime refers to any crime that involves a computer and a network. The computer may have.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
Cyber Crimes.
Cyber crime & Security Prepared by : Rughani Zarana.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
 a crime committed on a computer network, esp. the Internet.
“Cyber Crime in India”
Unethical use of Computers and Networks
CYBER CRIME.
Topic 5: Basic Security.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
Computer crimes.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
ON THE INTERNET, NOBODY KNOWS YOU ARE A DOG. FIRST PART THREE SUBPARTS (1) What is Cyber Laws (2) What are violations of Cyber Laws (3) What is Cyber.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cyber Security. Objectives To understand: 1.Definition of Cyber Crime 2.Classification of Cyber crimes 3.Computer Intrusions and Hacking 4.Computer Security.
Cyber Law And Ethics And Ethics.
An Introduction to Computer Crimes.  Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Chapter 19 Cyberlaw and E-Commerce. Cyberlaw  Cyberlaw is the area of the law which concerns computers and computer related crimes. Merges many legal.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Seminar by: Guided By: Nidhi Anand Sandhya Rani Sahoo Regd No:
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Security Risks Todays Lesson Security Risks Security Precautions
Network and Internet Security and Privacy
Topic : CYBER CRIME Presenter : Dr. Soreingam Ragui
DIGITAL CITIZENSHIP What You Should Know!.
GCSE ICT SECURITY THREATS.
CYBER SECURITY...
IT Security  .
Cyber Laws in Pakistan.
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
MODUS OPERANDI OF CYBER CRIME
Network security threats
IT ACT 2000 and 2008 Important Sections Awareness Presentation
Chapter 11 crime and security in the networked economy
Assalamualaikum Today, I am going to give a presentation on
COMPUTER CRIME.
Five Unethical Uses of Computers
Cyber Crime Laws and Mitigation of Cyber Crimes in Corporate Companies
Computer Ethics.
BCT 2.00 Analyze Technology Issues
Network and Internet Security and Privacy
Societal Issues in Computing (COMP466)
Cyber Laws in Pakistan Hassan Khalil.
Computer Programming I
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Laws Against Computer Hacking
Presentation transcript:

Cyber Crime

Internet in India 1995: VSNL introduces internet in India. 1996 : rediff.com launched, India first cyber café was launched 1997 : naurkri.com came into existence 1998 : launching of NASSCOM 2000: IT Act passed by Indian Parliament 2001: First Cyber crime arrest. IRCTC was launched. 2004: Bazee CEO jailed for MMS scandal.

Cont… 2005: 40 million net users (4% of the world) IRCTC online ticketing- 63% of e commerce- Rs 370 crore/-

What is cyber crime? Crime that involves computer or network. Computer can be used in commission of the crime or it may be the target. These are the offences done with a criminal motive to intentionally harm the reputation of the victim, causing physical or mental harm, loss to the victim, directly or indirectly using modern telecommunication network (chat rooms, emails) and mobiles (MMS & SMS).

Cyber Crime in india India was ranked among the top five countries to be affected by cybercrime, according to a 22 October report by online security firm Symantec Corp. Between 2011 and 2015, the number of cyber crime registered in the country has gone up by five times. Maharashtra tops the list followed by Uttar Pradesh.

Types of cyber crime? Hacking: in entails cracking the systems and gaining unauthorized access to the data stored in it Cyber Squatting: it is the act of registering a famous domain name and then selling it for fortune. This is an issue which is not tackled under IT Act 2000. Phishing: refers to the receipt of the unsolicited emails by the customers of Financial Institution requesting them to enter their Username, password and other personal information to access their account for some reason. The fraudster then has an access to customers online bank account. Data Diddling: Unauthorized and illegal data alteration. These alteration are so insignificant that in a single case it would go completely unnoticed.

Types contd.. Cyber Pornography: On of the largest businesses on the internet today. It includes magazines and websites. A school student from Delhi created www.amazing-gents.8m.net CEO of bazee.com was arrested . CEO of an IT company in Pune was arrested for sending obscene emails to a female employee. Virus/Worm Attacks: Virus are small software programs that are designed to spread from one computer to the another and interfere in its operations. While worms do not need the host to attach themselves to. Eg. Melisa Virus Confiker worm Trojans: is an authorized program which functions from inside the computer secretly, what seems to be an authorized program, thereby concealing what it is actually doing.

Cyber Stalking: it  is the use of the Internet or other electronic means to stalk or harass an individual, a group, or an organization. It includes false accusation, defamation, identity theft, threats and solicitation for sex. Email Bombing E commerce crime

Cyber Terrorism: act of terrorism committed through the use of cyberspace or computer resources. Intellectual Property Rights: These include software piracy, copyright infringement, trade mark violations, theft of computer codes. Cyber Bullying: is a form of aggressive behavior manifested by the use of force to affect others, particularly when the behavior is habitual and involves an imbalance of power

Email Spoofing: a spoofed email is one that appears to originate from one source but has been sent from another source. It is a fake mail. Espionage: it is also known as spying which involves government or individual obtaining information which is considered to be a secret or confidential without the permission of the holder of the information using illegal exploitation method through the use of cracking techniques and malicious software like trojan and spyware.

Cyber Laws in india Information Technology Act (IT Act), came into force in January 2000. It has 94 sections. The primary purpose of this act is to provide legal recognition to electric commerce and to facilitate filing of electronic records with the Government. It also penalizes the cyber crime and provide strict punishments. Chapter XI- Offences- 66. Hacking with the computer system. Whoever with then intent to cause or knowing that he is likely to cause Wrongful damage to public or person Destroys, Deletes or Alters the information residing in the computer resource. Whosoever commits hacking shall be punished with imprisonment up to three years or with a fine which may extend up to two lakh Rupees or both.

Information Technology amendment act 2008 Section 66A of the Information Technology (Amendment) Act, 2008 prohibits the sending of offensive messages though a communication device (i.e. through an online medium). The types of information this covers are offensive messages of a menacing character, or a message that the sender knows to be false but is sent for the purpose of ‘causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will.’ If you’re booked under Section 66A, you could face up to 3 years of imprisonment along with a fine. Section 66C : (Punishment for Identity theft) Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh.

Section 66E : Punishment for violation of privacy Whoever intentionally and knowingly captures, publishes or transmits the image of the private area of any person without his or her permission, under the circumstances of violating the privacy of that person, shall be punished with an imprisonment which may extend up to three years or with a fine of Rs. 2 lakhs or both. Section 67 A: Punishment for publishing or transmitting of material containing sexually explicit act, etc., in electronic form. Whoever publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees.

How to tackle such activities Antivirus and Anti Spyware software: Antivirus software consists of computer programs software. Antispyware are used to restrict backdoor program, Trojans which may attempt to identify, thwart and eliminate computer viruses and other malicious and other spyware to be installed on the computer. Firewalls: Firewall protects the computer network from unauthorized access. Network firewall may be a hardware device or a software program or a combination of two.

Cryptography: It is the science of encrypting or decrypting information. It is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender and the receiver.

Future of cyber crime Cyber Terrorism Mobile Money Frauds Net banking frauds Increasing number of phishing attack on E commerce and Financial Websites.