Download presentation
Published byLindsey Richard Modified over 9 years ago
1
Cyber Crime Mid Regional Police Hetauda & Regualtion in Nepal
Presented by : Suresh Kumar Thapa Inspector of Police
2
What is Cyber Crime ? In general words, we can refer to cyber crime as a crime performed using computers or a network. Cybercrime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet. sDKo'6/ / O{G6/g]6sf] k|of]uaf6 ul/g] ck/fw g} ;fO{a/ ck/fw xf] h;df sDKo'6/ / O{G6/g]6sf] kx'raf6 ljleGg j]e;fO{6x? xofs ul/G5 / cglws[t ?kdf ljleGg ;fO{6df /x]sf dxTjk"0f{ ;'rgfx?nfO{ gi6 ug]{ sfo{ ul/G5 .
3
Types of Cyber Crime ? Hacking Software piracy Harassment via Cyber pornography Defamation Morphing Phishing Impostor
4
Hacking Unauthorized access to a computer system or network without the permission of the computer owner/user.
5
Software piracy Theft of software through the iillegal copying/cracking of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
6
Harassment via e-mails :
Regular sending of harrassing/ Threatening/ Unneccessary s to someone's account.
7
Cyber Pornography Login into porno sites, publish, Print, download and transmit pornographic pictures, photos, writings etc).
8
Defamation The action of damaging the good reputation of someone; an abusive attack on a person's character or good name
9
Morphing Change or cause to change smoothly from one image to another by small gradual steps using computer animation techniques
10
Phishing ljw'lto dfWodaf6 cglws[t ?kdf c?sf] dxTjk"0f{ ;'rgf h:t} o'h/ g]d kf;j8{, a}s ljj/0f cfbL k|fKt ug]{ pb]Zon] cgfjZos sfo{ ug'{ Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by trustworthy entity in an electronic communication.
11
Impostor c?sf] JolQmut ljj/0f /fvL ;fdflhs ;+hfn h:t} km];a'sdf vftf vf]Ng' / JolQmut rl/q xTof ug]{ h:tf s[ofsnfk ug'{ . A person who pretends to be someone else in order to deceive others, esp. for fraudulent gain by creating others profile in social network sites like Facebook, twitter, hi5 etc.
12
Electronic Transaction Act - 2006
To secure and make reliable electronice Transaction, Electronic Transaction Act 2006 was introduced, which states the types of cyber crime in Chapter-9, Section : 44. To Pirate, Destroy or Alter computer source code (sDKo'6/ >f]t ;Í]tsf] rf]]/L, gi6 jf kl/jt{g ug{] ) 45. Unauthorized Access in Computer Materials (sDKo'6/ ;fdu|Ldf cglws[t kx'Fr ) 46. Damage to any Computer and Information System (sDKo'6/ / ;"rgf k|0ffnLdf Iflt k'¥ofpg ) 47. Publication of illegal materials in electronic form (ljB'tLo :j?kdf u}/sfg"gL s'/f k|sfzg ug]{) 48. Confidentiality to Divulge (uf]kgLotf eË ug]{ ) 52. To commit computer fraud (sDKo'6/ hfn;fhL ug]{ )
13
Legal Issues – Complaint, Investigation and Prosecution
The Electronic Transaction Act (ETA)(cyber law) 2006 dictates the limitation for complaint with in 35 days of first know-how of crime or being victimized. Prosecution : District Police Office Or the Police Office that has authority to prosecute will furnish initial investigation and forward the case to respective District Court (right now, only Kathmandu District Court )
14
Legal Issues – Complaint, Investigation and Prosecution
Punishment and Penalty : In an attempt to discourage the cyber crime the prevailing law ETA explains the punishment of at least 6 months to 5 years of jail term and fine of NRs.50,000 to NRs.2,00,000 or both depending on the severity of the crime.
15
Efforts of Nepal Police to combat Cyber Crime
Installation of dedicated ICT Crime Investigation Cell Establishment of Digital Forensic Lab at PHQ, Computer Directorate Public awareness programs Deployment of IT police personnel (Cyber Cops) Coordination with Cyber Cafe's to keep the details of the users Networking with Interpol and other High-Tech Crime Control Centers
16
Cyber Crimes Complaint Recorded In Crime Division
Many threat and extortion s Many renowned companies received spam mails from proxy hot mails, yahoo, G-mail demanding money on the name of mainly insurgents groups and so called armed groups. Phishing Hacking of newspaper's website by replacing the original content with threat to attack. Mutilation of a girl’s image and pasted on the porno site Impostor or Impersonating Profile (Facebook)
17
Cyber security and ethics
Use anti-virus software and firewalls - keep them upto date Keep your operating system up to date with critical security updates and patches Don't open s or attachments from unknownsources Use hard-to-guess passwords (use of symbolic and alpha numeric letters). Don’t use words found in a dictionary. Back-up your computer data on disks or CDs oftensources Don't share access to your computers with strangers If you have a wi-fi network, password protect it Disconnect from the Internet when not in use
18
Sec_rity is not complete without 'U'
Online complaints and suggestions at Mid Regional Police Office, Hetuada Makwanpur Office : Fax :
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.