Download presentation
Presentation is loading. Please wait.
1
Cyber Crime
2
Internet in India 1995: VSNL introduces internet in India.
1996 : rediff.com launched, India first cyber café was launched 1997 : naurkri.com came into existence 1998 : launching of NASSCOM 2000: IT Act passed by Indian Parliament 2001: First Cyber crime arrest. IRCTC was launched. 2004: Bazee CEO jailed for MMS scandal.
3
Cont… 2005: 40 million net users (4% of the world)
IRCTC online ticketing- 63% of e commerce- Rs 370 crore/-
4
What is cyber crime? Crime that involves computer or network.
Computer can be used in commission of the crime or it may be the target. These are the offences done with a criminal motive to intentionally harm the reputation of the victim, causing physical or mental harm, loss to the victim, directly or indirectly using modern telecommunication network (chat rooms, s) and mobiles (MMS & SMS).
6
Cyber Crime in india India was ranked among the top five countries to be affected by cybercrime, according to a 22 October report by online security firm Symantec Corp. Between 2011 and 2015, the number of cyber crime registered in the country has gone up by five times. Maharashtra tops the list followed by Uttar Pradesh.
7
Types of cyber crime? Hacking: in entails cracking the systems and gaining unauthorized access to the data stored in it Cyber Squatting: it is the act of registering a famous domain name and then selling it for fortune. This is an issue which is not tackled under IT Act 2000. Phishing: refers to the receipt of the unsolicited s by the customers of Financial Institution requesting them to enter their Username, password and other personal information to access their account for some reason. The fraudster then has an access to customers online bank account. Data Diddling: Unauthorized and illegal data alteration. These alteration are so insignificant that in a single case it would go completely unnoticed.
8
Types contd.. Cyber Pornography: On of the largest businesses on the internet today. It includes magazines and websites. A school student from Delhi created CEO of bazee.com was arrested . CEO of an IT company in Pune was arrested for sending obscene s to a female employee. Virus/Worm Attacks: Virus are small software programs that are designed to spread from one computer to the another and interfere in its operations. While worms do not need the host to attach themselves to. Eg. Melisa Virus Confiker worm Trojans: is an authorized program which functions from inside the computer secretly, what seems to be an authorized program, thereby concealing what it is actually doing.
10
Cyber Stalking: it is the use of the Internet or other electronic means to stalk or harass an individual, a group, or an organization. It includes false accusation, defamation, identity theft, threats and solicitation for sex. Bombing E commerce crime
11
Cyber Terrorism: act of terrorism committed through the use of cyberspace or computer resources.
Intellectual Property Rights: These include software piracy, copyright infringement, trade mark violations, theft of computer codes. Cyber Bullying: is a form of aggressive behavior manifested by the use of force to affect others, particularly when the behavior is habitual and involves an imbalance of power
12
Spoofing: a spoofed is one that appears to originate from one source but has been sent from another source. It is a fake mail. Espionage: it is also known as spying which involves government or individual obtaining information which is considered to be a secret or confidential without the permission of the holder of the information using illegal exploitation method through the use of cracking techniques and malicious software like trojan and spyware.
13
Cyber Laws in india Information Technology Act (IT Act), came into force in January 2000. It has 94 sections. The primary purpose of this act is to provide legal recognition to electric commerce and to facilitate filing of electronic records with the Government. It also penalizes the cyber crime and provide strict punishments. Chapter XI- Offences- 66. Hacking with the computer system. Whoever with then intent to cause or knowing that he is likely to cause Wrongful damage to public or person Destroys, Deletes or Alters the information residing in the computer resource. Whosoever commits hacking shall be punished with imprisonment up to three years or with a fine which may extend up to two lakh Rupees or both.
14
Information Technology amendment act 2008
Section 66A of the Information Technology (Amendment) Act, 2008 prohibits the sending of offensive messages though a communication device (i.e. through an online medium). The types of information this covers are offensive messages of a menacing character, or a message that the sender knows to be false but is sent for the purpose of ‘causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will.’ If you’re booked under Section 66A, you could face up to 3 years of imprisonment along with a fine. Section 66C : (Punishment for Identity theft) Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh.
15
Section 66E : Punishment for violation of privacy
Whoever intentionally and knowingly captures, publishes or transmits the image of the private area of any person without his or her permission, under the circumstances of violating the privacy of that person, shall be punished with an imprisonment which may extend up to three years or with a fine of Rs. 2 lakhs or both. Section 67 A: Punishment for publishing or transmitting of material containing sexually explicit act, etc., in electronic form. Whoever publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees.
16
How to tackle such activities
Antivirus and Anti Spyware software: Antivirus software consists of computer programs software. Antispyware are used to restrict backdoor program, Trojans which may attempt to identify, thwart and eliminate computer viruses and other malicious and other spyware to be installed on the computer. Firewalls: Firewall protects the computer network from unauthorized access. Network firewall may be a hardware device or a software program or a combination of two.
17
Cryptography: It is the science of encrypting or decrypting information. It is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender and the receiver.
18
Future of cyber crime Cyber Terrorism Mobile Money Frauds
Net banking frauds Increasing number of phishing attack on E commerce and Financial Websites.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.