SlideShare uma empresa Scribd logo
1 de 16
B.K. BIRLA INSTITUTE OF ENGINEERING &
TECHNOLOGY
Hemant
10EBKCS021
Contents
 Introduction
 Origination
 Cyber Crime Acts
 Categories
 Methodologies
 Investigation challenges
 IT Act 2000 & IPC
 ITAA 2008
 Case Study of Cyber Crime in INDIA
 Preventions
Introduction
 ‘Cyber crime’ is crime committed over INTERNET. (Oxford
online Reference)
 ‘Cyber crime’ as any crime that is committed by means of
special knowledge or expert use of computer technology.
(Britannica Reference)
 ‘Cyber crime’ can generally defined as a criminal activity in
which information technology systems are the means used for
the commission of the crime.
 A generalized definition of cyber crime may be “unlawful acts
wherein the computer is either a tool or target or both”.
Origination of Cyber crime
 The Cyber crime originated even from the year 1820.
 Joseph-Marie Jacquard, a textile manufacturer in France,
produced the loom. This device allowed the repetition of a
series of steps in the weaving of special fabrics.
 This resulted in a fear amongst Jacquard's employees that their
traditional employment and livelihood were being threatened.
 They committed acts of sabotage to discourage Jacquard from
further use of the new technology.
 This is the first recorded cyber crime.
Cyber Crime Acts
(Govt. of INDIA)
The IT Act provides legal recognition for transactions carried
out by means of electronic data interchange, and other means
of electronic communication, involving the use of alternatives
to paper-based methods of communication and storage of info.
The IT Act facilitates E-filing of documents with the Govt.
agencies.
 Information Technology Act 2000.
 Information Technology Amendment Act 2008.
IT Act 2000
 Based on the UN Gen. Assembly resolution of January 30,1997,
the GOI passed the IT Act 2000 (Act No.21 of 2000) and
notified it on October 17, 2000.
 The IT Act, 2000, is the first step taken by the GOI towards
promoting the growth of the E-commerce and it was enacted
with a view to provide legal recognition to E-commerce and E-
transactions, to facilitate E-governance and prevent computer-
based crimes.
 It is a first historical step.
 The Information Technology Act, 2000, does not define the
term ‘cyber crime’.
ITA Act 2008
 The rapid increase in the use of Internet has led to a spate in
crime like child pornography, cyber terrorism, publishing
sexually explicit content in electronic form and video voyeurism.
 The need for comprehensive amendment was consistently felt
and after IT Amendment Act 2008 was passed.
 It got the President’s assent in February 2009 and was notified
with effect from 27.10.2009.
 It has brought a large number of cyber crimes under the ambit of
the law.
 Some of the significant points in the Amendment Act include
introduction of corporate responsibility for data protection with
the concept of ‘reasonable security practices’ (Sec.43A),
recognition of Computer Emergency Response Team–India
(CERT-In) as the national nodal agency empowered to monitor
and even block web-sites under specific circumstances.
Cyber Crimes - Three categories
 Against Property–
Financial crimes, cheating on-line, illegal funds transfer.
 Against Persons–
On-line harassment, Cyber Stalking, Obscenity.
 Against Nations–
Cyber Terrorism, Damaging critical information infrastructures.
Financial
Crimes
Offensive
Messages
Offensive
Calls
DOS Attack
Internet
violations of
copyrights
Web Page
Hacking
Spam /
Malware /
Espionage
Mobile
device
Attacks
Violations of
Privacy
Social
Engineering
Deceptive
Messages
Cyber
Terrorism
Obscenity &
Pornography
Cyber Crime
Methodologies
Investigation Challenges
 The investigation of Cyber crime is more complex.
 The evidence is often in an intangible form.
 The increased use of Internet has added to this complexity. It
is possible for a person sitting in INDIA to steal a computer
resource in AUSTRALIA using a computer situated in
SOUTH AFRICA as a launch pad for his attack.
 The challenges in such cases are not only technical, but also
jurisdictional.
 Cyber crime being technology driven evolves continuously
and ingeniously making it difficult for investigators to cope
up with changes.
Information Technology Act, 2000 &
Indian Penal Code
Sending threatening message by email Section 506 IPC
Forgery of electronic records Section 465 IPC
Bogus websites, cyber frauds, phishing Section 420 IPC
Email spoofing Sections 465, 419 IPC
Criminal breach of trust Sections 406, 409 IPC
Online sale of Narcotics NDPS Act
Pornography Section 67 of IT Act
Denial of Service Attack Section 43 of IT Act
ITA Act 2008
 66- As proposed in ITAA, 2008, this Section combines
contraventions indicated in Section 43 with penal effect .It also
introduces the pre-conditions of "Dishonesty" and "Fraud" to
the current Section 66.
 66A- Punishment for sending offensive messages through
communication service, etc.
 66B-Punishment for dishonestly receiving stolen computer
resource or communication device.
 66C-Punishment for identity theft.
 66E-Punishment for violation of privacy
 67-Punishment for publishing or transmitting obscene material
in electronic form.
 67A-Punishment for publishing or transmitting of material
containing sexually explicit act, etc., in electronic form.
 67C-Preservation and retention of information by
intermediaries.
 71-Misrepresentation to the Controller or the Certifying
Authority.
 73-Publishing Digital Signature Certificate false in certain
particulars.
 74-Creation, publication or otherwise making available a
Digital Signature Certificate for any fraudulent or unlawful
purpose.
Case Study of Cyber Crime in INDIA
Cases Registered Person Arrested
2008 2009 2010 2011 2008 2009 2010 2011
288 420 966 1791 154 178 288 1184
Preventions
 Use latest and updated anti virus software to guard against virus
attacks.
 Never send your credit card number to any site that is not secured, to
guard against frauds.
 Use of firewalls may be beneficial.
 Web servers running public sites must be physically separate protected
from internal corporate network.
 In respect of using mobile phones, the public should not be carried
away by S.M.S. messages offering attractive gifts and thereby
inducing to part with huge amounts.
 Choose strong passwords and keep them safe.
 Review bank and credit card statements regularly.
Cyber crime p pt

Mais conteúdo relacionado

Mais procurados

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
Taha Mehmood
 

Mais procurados (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
An overview on laws against spamming in India
An overview on laws against spamming in IndiaAn overview on laws against spamming in India
An overview on laws against spamming in India
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber defamtion
Cyber defamtionCyber defamtion
Cyber defamtion
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Destaque

Custora E-Commerce Pulse Holidata 2015 Recap
Custora E-Commerce Pulse Holidata 2015 RecapCustora E-Commerce Pulse Holidata 2015 Recap
Custora E-Commerce Pulse Holidata 2015 Recap
Michael Baumgarten
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
VidaB
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
Karan Bhagatwala
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya
 

Destaque (17)

Custora E-Commerce Pulse Holidata 2015 Recap
Custora E-Commerce Pulse Holidata 2015 RecapCustora E-Commerce Pulse Holidata 2015 Recap
Custora E-Commerce Pulse Holidata 2015 Recap
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Magnetic stripe on the back of credit card
Magnetic stripe on the back of credit cardMagnetic stripe on the back of credit card
Magnetic stripe on the back of credit card
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
ATM Fraud - Ignite Style
ATM Fraud - Ignite StyleATM Fraud - Ignite Style
ATM Fraud - Ignite Style
 
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Mobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessmentMobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessment
 

Semelhante a Cyber crime p pt

Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
Aditya Shukla
 
cyber crime
cyber crimecyber crime
cyber crime
Mukund10
 
English in written
English in writtenEnglish in written
English in written
azhar manap
 

Semelhante a Cyber crime p pt (20)

Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
English in written
English in writtenEnglish in written
English in written
 
Business law
Business lawBusiness law
Business law
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Information technology act
Information technology actInformation technology act
Information technology act
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Último

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 

Cyber crime p pt

  • 1. B.K. BIRLA INSTITUTE OF ENGINEERING & TECHNOLOGY Hemant 10EBKCS021
  • 2. Contents  Introduction  Origination  Cyber Crime Acts  Categories  Methodologies  Investigation challenges  IT Act 2000 & IPC  ITAA 2008  Case Study of Cyber Crime in INDIA  Preventions
  • 3. Introduction  ‘Cyber crime’ is crime committed over INTERNET. (Oxford online Reference)  ‘Cyber crime’ as any crime that is committed by means of special knowledge or expert use of computer technology. (Britannica Reference)  ‘Cyber crime’ can generally defined as a criminal activity in which information technology systems are the means used for the commission of the crime.  A generalized definition of cyber crime may be “unlawful acts wherein the computer is either a tool or target or both”.
  • 4. Origination of Cyber crime  The Cyber crime originated even from the year 1820.  Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics.  This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened.  They committed acts of sabotage to discourage Jacquard from further use of the new technology.  This is the first recorded cyber crime.
  • 5. Cyber Crime Acts (Govt. of INDIA) The IT Act provides legal recognition for transactions carried out by means of electronic data interchange, and other means of electronic communication, involving the use of alternatives to paper-based methods of communication and storage of info. The IT Act facilitates E-filing of documents with the Govt. agencies.  Information Technology Act 2000.  Information Technology Amendment Act 2008.
  • 6. IT Act 2000  Based on the UN Gen. Assembly resolution of January 30,1997, the GOI passed the IT Act 2000 (Act No.21 of 2000) and notified it on October 17, 2000.  The IT Act, 2000, is the first step taken by the GOI towards promoting the growth of the E-commerce and it was enacted with a view to provide legal recognition to E-commerce and E- transactions, to facilitate E-governance and prevent computer- based crimes.  It is a first historical step.  The Information Technology Act, 2000, does not define the term ‘cyber crime’.
  • 7. ITA Act 2008  The rapid increase in the use of Internet has led to a spate in crime like child pornography, cyber terrorism, publishing sexually explicit content in electronic form and video voyeurism.  The need for comprehensive amendment was consistently felt and after IT Amendment Act 2008 was passed.  It got the President’s assent in February 2009 and was notified with effect from 27.10.2009.  It has brought a large number of cyber crimes under the ambit of the law.  Some of the significant points in the Amendment Act include introduction of corporate responsibility for data protection with the concept of ‘reasonable security practices’ (Sec.43A), recognition of Computer Emergency Response Team–India (CERT-In) as the national nodal agency empowered to monitor and even block web-sites under specific circumstances.
  • 8. Cyber Crimes - Three categories  Against Property– Financial crimes, cheating on-line, illegal funds transfer.  Against Persons– On-line harassment, Cyber Stalking, Obscenity.  Against Nations– Cyber Terrorism, Damaging critical information infrastructures.
  • 9. Financial Crimes Offensive Messages Offensive Calls DOS Attack Internet violations of copyrights Web Page Hacking Spam / Malware / Espionage Mobile device Attacks Violations of Privacy Social Engineering Deceptive Messages Cyber Terrorism Obscenity & Pornography Cyber Crime Methodologies
  • 10. Investigation Challenges  The investigation of Cyber crime is more complex.  The evidence is often in an intangible form.  The increased use of Internet has added to this complexity. It is possible for a person sitting in INDIA to steal a computer resource in AUSTRALIA using a computer situated in SOUTH AFRICA as a launch pad for his attack.  The challenges in such cases are not only technical, but also jurisdictional.  Cyber crime being technology driven evolves continuously and ingeniously making it difficult for investigators to cope up with changes.
  • 11. Information Technology Act, 2000 & Indian Penal Code Sending threatening message by email Section 506 IPC Forgery of electronic records Section 465 IPC Bogus websites, cyber frauds, phishing Section 420 IPC Email spoofing Sections 465, 419 IPC Criminal breach of trust Sections 406, 409 IPC Online sale of Narcotics NDPS Act Pornography Section 67 of IT Act Denial of Service Attack Section 43 of IT Act
  • 12. ITA Act 2008  66- As proposed in ITAA, 2008, this Section combines contraventions indicated in Section 43 with penal effect .It also introduces the pre-conditions of "Dishonesty" and "Fraud" to the current Section 66.  66A- Punishment for sending offensive messages through communication service, etc.  66B-Punishment for dishonestly receiving stolen computer resource or communication device.  66C-Punishment for identity theft.  66E-Punishment for violation of privacy  67-Punishment for publishing or transmitting obscene material in electronic form.
  • 13.  67A-Punishment for publishing or transmitting of material containing sexually explicit act, etc., in electronic form.  67C-Preservation and retention of information by intermediaries.  71-Misrepresentation to the Controller or the Certifying Authority.  73-Publishing Digital Signature Certificate false in certain particulars.  74-Creation, publication or otherwise making available a Digital Signature Certificate for any fraudulent or unlawful purpose.
  • 14. Case Study of Cyber Crime in INDIA Cases Registered Person Arrested 2008 2009 2010 2011 2008 2009 2010 2011 288 420 966 1791 154 178 288 1184
  • 15. Preventions  Use latest and updated anti virus software to guard against virus attacks.  Never send your credit card number to any site that is not secured, to guard against frauds.  Use of firewalls may be beneficial.  Web servers running public sites must be physically separate protected from internal corporate network.  In respect of using mobile phones, the public should not be carried away by S.M.S. messages offering attractive gifts and thereby inducing to part with huge amounts.  Choose strong passwords and keep them safe.  Review bank and credit card statements regularly.