SlideShare uma empresa Scribd logo
1 de 16
TYPES OF CYBER CRIMES
Submitted by – Payal Nagar
What is cyber crime?
 Cyber crime or computer crime means any illegal activity which is commited
using computer or internet and that activity is prohibited under law.
 Cyber crime is defined as a crime in which a computer is the object of the crime
(hacking, phishing, spamming) or is used as a tool to commit an offence (child
pornography, hate crimes).
 After the implementation of IT Act in 2000 onwards cyber crime was prohibited.
Types of cyber crimes -:
 Cyber Stalking
 Pornography
 Hacking and Cracking
 Computer /Cyber Terrorism
Cyber Stalking
 Stalking generally means a harassing behaviour which one person exhibits
towards the others.
 Stalking may comprise of following a person, appearing at a persons home or
place of business, making harassing phone calls, leaving written messages or
objects.
Nature of cyber stalking
 Computer or cyber stalking is one of the very popular means by which the cyber
stalker exploits the internet and the windows operating system in order to
assume control over the computer of the user.
 Email account of the user may also be used as a tool for cyber stalking. Access
to an email account of an innocent user may be gained by the hacker and that
address may be used to send messages that may be threatening or offensive.
 Online stalkers may post insulting messages on electronic bulletin boards signed
with the email address of the person being harassed or statements about the
victim.
Punishment for cyber stalking
 Section 66(A) of Indian Information Technology Act, 2008 penalizes sending false and
offensive messages through communication services.
 Any person who sends, by the means of a computer resource or a communication
devices –
(A) Any information that is grossly effective or has menacing character, or
(B) Any information which he /she knows to be false, but for the purpose of causing
annoyance, inconvenience, danger, obstruction, insult, criminal intimidation, hatred or
ill will, persistently makes by making use of such computer resource or a
communication device,
(C) Any electronic mail or electronic mail messages for the purpose of causing
annoyance or inconvenience or to deceive or to mislead the addressee or recipient
about the origin of such messages,
shall be punishable with imprisonment for a term which may extend to 3 years
with fine.
Pornography
 Cyber Pornography
 Child Pornography
 Cyber pornography is the act of using cyberspace to create, display, distribute,
import or publish pornography or obscene materials, especially materials
depicting children engaged in sexual acts with adults. Cyber pornography is a
criminal offense classified as causing harm to persons.
 Child pornography means to make ,produce, posses, distribute and sale
pornographic materials that exploits minor childs (under the age of 18 ).
Increasingly child pornography laws are being utilized to punish use of
computer technology and the internet to obtain, share and distribute pornography
material involving childrens.
Punishment for cyber pornography
 Under section 67 of the Information Technology Act, 2000 makes the following
acts punishable with imprisonment upto 3 years and fine upto 5 lakhs :
Publication – it includes uploading on website, whats app group or any other
digital portal where third parties can have access to such content.
Transmission – it includes seding obscene photos or images to any person via email,
messaging ,whats app or any other form of digital media.
 Section 67 (A) of the Information Technology Act makes
publication ,transmission and causing to be transmitted and piblished in
electronic form any material containing sexually explicit act or conduct,
punishable with imprisonment upto 5 years and fine upto 10 lakhs.
Hacking and Cracking
 Hacking is the act of finding the possible entry points that exist in a computer system or a
computer network finally entering into them.
 Hacking is usually done to gain unauthorized access to a computer system or
network ,either to harm the system or to steal sensitive information available on the
computer.
 Cracking on the other hand is a kind of hacking in which the person who cracks the security
of the computer can download the information along with that it can modify the data
also.
Types of hacking
 Website Hacking-: Hacking a website means taking control over a web server
and its associated software.
 Network Hacking-: Hacking a network means gathering information about a
network by using tools like telnet, ping, tracert etc with intent to harm the
network system and hamper its operation.
 Email Hacking-: It includes getting unauthorized access on an email account
and using it without the consent ot its owner.
 Password Hacking-: This is the process of recovering secret passwords from
data that has been stored in or transmitted by a computer system.
 Computer Hacking-:This is the process of stealing computer ID and password
by applying hacking methods and getting unauthorized access to computer
system.
 Ethical Hacking-:Ethical hacking involves finding weaknesses in a computer or
network system for testing purpose anf finally getting them fixed. Ethical
hacking is legal in india.
Punishment for Hacking
 Chapter Xl Section 66 of IT ACT, 2000 particularly deals with the act of hacking.
 Section 66(1) defines a hack as any person, dishonestly or fraudulently does any
act referred to in section 43 is called hacking and, section 66(2) prescribes the
punishment for it. Hacking is punishable offense in India with imprisonment
upto 3 years, or with fine upto 2 lakh rupees or both.
 Chapter Xl Section 43 of IT ACT, 2000 prescribes a penalty for the damage to
computer or computer system.
 Chapter Xl Section 65 of the said act makes tampering with computer source
documents an offence.
Cyber Terrorism
Cyber terrorism means doing unlawful things, through internet for political purposes to
create hate in minds of people. It is any act which is done through cyberspace to create
a threat in the minds of people or to breach the sovereignty, unity, or integrity of a
country, or to provoke people or group of the people against the government.
Punishment for cyber terrorism
 Section 66 (f) provides punishment for cyber terrorism . Whoever -
(A) With intent to threaten the unity, integrity, security or sovereignty of India or to strike terror
in people or any section of the people by-
(i) Denying or cause the denial of access to any person authorized to access computer
resource or,
(B) Knowingly or intentionally gaining access to any computer resource and revealing the
restricted information which may be used to cause injury to the intrests of the integrity of India,
security of the state, friendly relations with foreign states, public order and decency or morality
of the country.
Whoever commits or conspires to commit cyber terrorism or above mentioned acts shall be
punishable with imprisonment which may extend to imprisonment for life.
Some more computer crimes are-:
 Spoofing
A Spoofing attack is a situation in which a person or program successfully
masquerades (mask) as another by falsifying data, to gain Iligitimate advantage.
• Email address spoofing
• IP address spoofing
 Phishing
Phishing is the fraudulent attempt to obtain sensitive information such as
username, passwords or credit card details, often for malicious reasons.
Phishing is typically carried out by email spoofing or instant messaging and it often
directs users to enter personal information at a fake website, which looks like the
ligitimate site, the only difference being the URL of the website in concern.
 Email bombing
No. of mails (around 1000) at a time are send continuously at someones computers
system or server, so that traffic can be created. Due to this the authorized person
not be able to reach the real information. It is also a kind of Denial of Service attack
(DOS).

Mais conteúdo relacionado

Mais procurados (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 

Semelhante a Types of Cyber Crimes

cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentcparimala
 

Semelhante a Types of Cyber Crimes (20)

cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 

Mais de DINESH KAMBLE

Mais de DINESH KAMBLE (11)

Cyber investigation Protocol
Cyber investigation ProtocolCyber investigation Protocol
Cyber investigation Protocol
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Fundamental of computer hardware
Fundamental of computer hardwareFundamental of computer hardware
Fundamental of computer hardware
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Memory
MemoryMemory
Memory
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
CHA & LBA Addressing
CHA & LBA Addressing  CHA & LBA Addressing
CHA & LBA Addressing
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 

Último

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Último (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Types of Cyber Crimes

  • 1. TYPES OF CYBER CRIMES Submitted by – Payal Nagar
  • 2. What is cyber crime?  Cyber crime or computer crime means any illegal activity which is commited using computer or internet and that activity is prohibited under law.  Cyber crime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offence (child pornography, hate crimes).  After the implementation of IT Act in 2000 onwards cyber crime was prohibited.
  • 3. Types of cyber crimes -:  Cyber Stalking  Pornography  Hacking and Cracking  Computer /Cyber Terrorism
  • 4. Cyber Stalking  Stalking generally means a harassing behaviour which one person exhibits towards the others.  Stalking may comprise of following a person, appearing at a persons home or place of business, making harassing phone calls, leaving written messages or objects.
  • 5. Nature of cyber stalking  Computer or cyber stalking is one of the very popular means by which the cyber stalker exploits the internet and the windows operating system in order to assume control over the computer of the user.  Email account of the user may also be used as a tool for cyber stalking. Access to an email account of an innocent user may be gained by the hacker and that address may be used to send messages that may be threatening or offensive.  Online stalkers may post insulting messages on electronic bulletin boards signed with the email address of the person being harassed or statements about the victim.
  • 6. Punishment for cyber stalking  Section 66(A) of Indian Information Technology Act, 2008 penalizes sending false and offensive messages through communication services.  Any person who sends, by the means of a computer resource or a communication devices – (A) Any information that is grossly effective or has menacing character, or (B) Any information which he /she knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, criminal intimidation, hatred or ill will, persistently makes by making use of such computer resource or a communication device, (C) Any electronic mail or electronic mail messages for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages, shall be punishable with imprisonment for a term which may extend to 3 years with fine.
  • 8.  Cyber pornography is the act of using cyberspace to create, display, distribute, import or publish pornography or obscene materials, especially materials depicting children engaged in sexual acts with adults. Cyber pornography is a criminal offense classified as causing harm to persons.  Child pornography means to make ,produce, posses, distribute and sale pornographic materials that exploits minor childs (under the age of 18 ). Increasingly child pornography laws are being utilized to punish use of computer technology and the internet to obtain, share and distribute pornography material involving childrens.
  • 9. Punishment for cyber pornography  Under section 67 of the Information Technology Act, 2000 makes the following acts punishable with imprisonment upto 3 years and fine upto 5 lakhs : Publication – it includes uploading on website, whats app group or any other digital portal where third parties can have access to such content. Transmission – it includes seding obscene photos or images to any person via email, messaging ,whats app or any other form of digital media.  Section 67 (A) of the Information Technology Act makes publication ,transmission and causing to be transmitted and piblished in electronic form any material containing sexually explicit act or conduct, punishable with imprisonment upto 5 years and fine upto 10 lakhs.
  • 10. Hacking and Cracking  Hacking is the act of finding the possible entry points that exist in a computer system or a computer network finally entering into them.  Hacking is usually done to gain unauthorized access to a computer system or network ,either to harm the system or to steal sensitive information available on the computer.  Cracking on the other hand is a kind of hacking in which the person who cracks the security of the computer can download the information along with that it can modify the data also.
  • 11. Types of hacking  Website Hacking-: Hacking a website means taking control over a web server and its associated software.  Network Hacking-: Hacking a network means gathering information about a network by using tools like telnet, ping, tracert etc with intent to harm the network system and hamper its operation.  Email Hacking-: It includes getting unauthorized access on an email account and using it without the consent ot its owner.  Password Hacking-: This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.  Computer Hacking-:This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to computer system.  Ethical Hacking-:Ethical hacking involves finding weaknesses in a computer or network system for testing purpose anf finally getting them fixed. Ethical hacking is legal in india.
  • 12. Punishment for Hacking  Chapter Xl Section 66 of IT ACT, 2000 particularly deals with the act of hacking.  Section 66(1) defines a hack as any person, dishonestly or fraudulently does any act referred to in section 43 is called hacking and, section 66(2) prescribes the punishment for it. Hacking is punishable offense in India with imprisonment upto 3 years, or with fine upto 2 lakh rupees or both.  Chapter Xl Section 43 of IT ACT, 2000 prescribes a penalty for the damage to computer or computer system.  Chapter Xl Section 65 of the said act makes tampering with computer source documents an offence.
  • 13. Cyber Terrorism Cyber terrorism means doing unlawful things, through internet for political purposes to create hate in minds of people. It is any act which is done through cyberspace to create a threat in the minds of people or to breach the sovereignty, unity, or integrity of a country, or to provoke people or group of the people against the government.
  • 14. Punishment for cyber terrorism  Section 66 (f) provides punishment for cyber terrorism . Whoever - (A) With intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in people or any section of the people by- (i) Denying or cause the denial of access to any person authorized to access computer resource or, (B) Knowingly or intentionally gaining access to any computer resource and revealing the restricted information which may be used to cause injury to the intrests of the integrity of India, security of the state, friendly relations with foreign states, public order and decency or morality of the country. Whoever commits or conspires to commit cyber terrorism or above mentioned acts shall be punishable with imprisonment which may extend to imprisonment for life.
  • 15. Some more computer crimes are-:  Spoofing A Spoofing attack is a situation in which a person or program successfully masquerades (mask) as another by falsifying data, to gain Iligitimate advantage. • Email address spoofing • IP address spoofing  Phishing Phishing is the fraudulent attempt to obtain sensitive information such as username, passwords or credit card details, often for malicious reasons. Phishing is typically carried out by email spoofing or instant messaging and it often directs users to enter personal information at a fake website, which looks like the ligitimate site, the only difference being the URL of the website in concern.
  • 16.  Email bombing No. of mails (around 1000) at a time are send continuously at someones computers system or server, so that traffic can be created. Due to this the authorized person not be able to reach the real information. It is also a kind of Denial of Service attack (DOS).