SlideShare uma empresa Scribd logo
1 de 28
CYBER CRIME
INTRODUCTION, TYPES,IMPACT AND REMEDIES.
AIM
▪ TO CREATE AWARENESS IN THE SOCIETY ABOUT CYBER
CRIME.
▪ TO ENGAGE YOUTH IN MEANINGFUL WAYS.
▪ MAKING THE YOUTH UNDERSTAND THE CONCEPT AND
TELL THEM HOW DANGEROUS A CYBER CRIME CAN BE.
CHAPTER 1 - INTRODUCTION
1) WHAT IS A CYBER CRIME?
2) HISTORICAL BACKGROUND OF
CYBER CRIME AND SOCIAL SECURITY
3) THE PROJECT – AN OVERVIEW
1. WHAT IS A CYBER CRIME?
▪ Cyber crime or a computer oriented crime, is a crime that involves a computer and a network.
▪ The computer may have been used in the commission of a crime, or it may be the target.
▪ Cyber crimes can be defined as: "Offences that are committed against individuals or groups of
individuals with a criminal motive to intentionally harm the reputation of the victim or cause
physical or mental harm, or loss, to the victim directly or indirectly, using modern
telecommunication networks such as Internet (networks including but not limited to Chat
rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)".
▪ Cybercrime may threaten a person or a nation's security and financial health.
▪ There are also problems of privacy when confidential information is intercepted or disclosed,
lawfully or otherwise.
2. HISTORICAL BACKGROUND OF CYBER CRIME AND
SOCIAL SECURITY
▪ In the early decades of modern information technology (IT), computer crimes were largely
committed by individual disgruntled and dishonest employees.
▪ Physical damage to computer systems was a prominent threat until the 1980s.
▪ Programmers in the 1980s began writing malicious software, including self-replicating programs,
to interfere with personal computers.
▪ As the 1990s progressed, financial crime using penetration and subversion of computer systems
increased.
▪ Illegitimate applications of e-mail grew rapidly from the mid-1990s onward, generating torrents
of unsolicited commercial and fraudulent e-mail.
▪ Issues surrounding types of crimes such as hacking, copyright infringement, unwarranted mass-
surveillance, sex tortion, child pornography, and child grooming have become high-profile in the
early 2020s.
3. THE PROJECT – AN OVERVIEW
▪ In this project, we have discussed about cyber crime, types of cyber crime, social security,
factors affecting social security i.e. what are the factors which affects the social security.
▪ In this we also discuss cyber crimes and how cyber crimes affect the social security of
individuals.
▪ Then after, we discuss societal impacts of cyber crime on commerce, on social networking, on
women, on inter-governmental relations.
▪ After that a chapter has been included which includes cyber laws like IT act, 2005.
▪ What all is given in that act and the merits and demerits of the act.
▪ Concluding it we mention the measures that should be undertaken by government to control
cyber crimes and also the social security of individuals.
CHAPTER 2 – TYPES OF CYBER CRIME
1) IDENTITY THEFT
2) RANSOM WARE
3) BOTNETS
4) SPAM AND PHISHING
5) MALVERTISING
6) PUP
7) DRIVE-BY DOWNLOADS
8) EXPLOIT KITS
9) SCAMS
10) REMOTE ADMINISTRATION TOOLS
TYPES
A. IDENTITY THEFT :
Identity theft and fraud is one of the most common types of cybercrime. The term Identity Theft is used, when a
person purports to be some other person, with a view to creating a fraud for financial gains. When this is done
online on the Internet, its is called Online Identity Theft. The most common source to steal identity information of
others, are data breaches affecting government or federal websites. It can be data breaches of private websites too,
that contain important information such as – credit card information, address, email ID’s, etc.
B. RANSOM WARE :
This is one of the detestable malware-based attacks. Ransom ware enters your computer network and encrypts
your files using public-key encryption, and unlike other malware this encryption key remains on the hacker’s server.
Attacked users are then asked to pay huge ransoms to receive this private key.
C. BOTNETS
Botnets are networks of compromised computers, controlled by remote attackers in order to perform such illicit
tasks as sending spam or attacking other computers. Computer Bots can also be used act like malware and carry out
malicious tasks. Then can be used to assemble a network of computers and then compromise them. There are
some Botnet Removal Tools that can help you detect and remove Botnets.
D. SPAM AND PHISHING
Spamming and phishing are two very common forms of cybercrimes. There is not much you can do to control
them. Spam is basically unwanted emails and messages. They use Spambots. Phishing is a method where
cyber criminals offer a bait so that you take it and give out the information they want. The bait can be in form
of a business proposal, announcement of a lottery to which you never subscribed, and anything that promises
you money for nothing or a small favour. There are online loans companies too, making claims that you can
get insecure loans irrespective of your location. Doing business with such claims, you are sure to suffer both
financially and mentally.
E. MALVERTISING
Malvertising is a method whereby users download malicious code by simply clicking at some advertisement
on any website that is infected. In most cases, the websites are innocent. It is the cyber criminals who insert
malicious advertisements on the websites without the knowledge of the latter. It is the work of advert
companies to check out if an advertisement is malicious but given the number of advertisements they have to
deal with, the malverts easily pass off as genuine ads. In other cases, the cyber criminals show clean ads for a
period of time and then replace it with malverts so that the websites and advertisements do not suspect.
They display the malverts for a while and remove it from the site after meeting their targets. All this is so
fast that the website does not even know they were used as a tool for cybercrime. Malvertising is one of
the fastest, increasing types of cybercrime.
F. PUPs
PUPs, commonly known as Potentially Unwanted Programs are less harmful but more annoying malware. It
installs unwanted software in your system including search agents and toolbars. They include spyware,
adware, as well as dialers. Bitcoin miner was one of the most commonly noticed PUPs in 2013.
G. DRIVE-BY DOWNLOADS
Drive By Downloads too, come close to malvertising. You visit a website and it triggers a download of
malicious code to your computer. These computers are then used to aggregate data and to manipulate
other computers as well. The websites may or may not know that they have been compromised. Mostly, the
cyber criminals use vulnerable software such as Java and Adobe Flash and Microsoft Silverlight to inject
malicious codes as soon as a browser visits the infected website. The user does not even know that there is
a download in progress.
H. EXPLOIT KITS
A vulnerability means some problem in the coding of a software that enables cyber criminals to gain control of
your computer. There are ready to use tools (exploit kits) in the Internet market which people can buy and use it
against you. These exploit kits are upgraded just like normal software. Only difference is these are illegal. They
are available mostly in hacking forums as well as on the Darknet.
I. SCAMS
Notable among Internet scams are, scams which misuse the Microsoft name and other general tech support
scams. Scamsters phone computer users randomly and offer to fix their computer for a fee. Every single day,
scores of innocent people are trapped by scam artists into Online Tech Support Scams and forced to shell out
hundreds of dollars for non-existent computer problems.
J. REMOTE ADMINISTRATION TOOLS
Remote Administration Tools are used to carry out illegal activities. It can be used to control the computer using
shell commands, steal files/data, send location of the computer to a remote controlling device and more.
CHAPTER 3 – SOCIETAL IMPACT OF CYBER CRIME
1) ON COMMERCE
2) ON SOCIAL NETWORKING
3) ON WOMEN
ON COMMERCE
▪ With the growth of e-business, internal and external perpetrators can exploit
traditional vulnerabilities in seconds.
▪ They can also take advantage of new weaknesses—in the software and hardware architectures
that now form the backbone of most organisations.
▪ In a networked environment, such crimes can be committed on a global basis from almost any
location in the world, and they can significantly affect an organisations overall well-being.
▪ Several computer security consulting firms produce estimates of total worldwide losses
attributable to virus and worm attacks and to hostile digital acts in general.
▪ The 2003 loss estimates by these firms range from $13 billion (worms and viruses only) to $226
billion (for all forms of overt attacks).
▪ Many do not realise that the same technological advancements that have enabled business
growth and innovation are also available to facilitate cyber misbehaviour.
▪ Direct loss of assets is just one consequence of cyber misbehaviour. Whether the attack comes
from inside or outside the organisation, victims often suffer from negative publicity, which can
harm the organisations brand and reputation, erode relationships with customers and other
stakeholders, and eat into potential revenue.
ON SOCIAL NETWORKING
▪ Many argue that a stringent punishment should be awarded in cyber crime cases since with
widespread usage of social networking sites there is a fear of cyber harassment, and
exemplary punishments can serve as deterrents.
▪ Harassment and stalking of women online is common, and can include rape threats and
other threats of violence, as well as the posting of women's personal information..
▪ Cyber stalking of intimate partners is the online harassment of a current or former spouse,
boyfriend, girlfriend or significant other.
▪ Harassers may send repeated insulting or threatening e-mails to their victims, monitor or
disrupt their victims' e-mail use, and use the victim's account to send e-mails to others
posing as the victim or to purchase good or services the victim doesn't want.
▪ They may also use the internet to research and compile personal information about the
victim, to use in order to harass her.This being a major effect of social networking websites.
ON WOMEN
▪ Cyber crime is a global phenomenon.
▪ With the advent of technology, cyber crime and victimization of women are on the high and it
poses as a major threat to the security of a person as a whole.
▪ Amongst the various cyber crimes committed against individuals and society at large the
crimes which can be mentioned as specially targeting women are as follows: – HARRASMENT
VIA EMAILS, CYBER STALKING, CYBER PORNOGRAPHY, DEFAMATION, MORPHING AND EMAIL
SPOOFING.
▪ Harassment includes blackmailing, threatening, bullying, and even cheating via email. E-
harassments are similar to the letter harassment but creates problem quite often when
posted from fake ids.
▪ Cyber stalking is one of the most talked about net crimes in the modern world. Cyber Stalking
usually occurs with women, who are stalked by men
▪ Internet has provided a medium for the facilitation of crimes like pornography. Cyber porn as
it is popularly called is widespread. Almost 50% of the web sites exhibit pornographic material
on the Internet today.
CHAPTER 4 -
CYBER LAWS
▪ Section1. Short title, extent, commencement and application - (1) This Act may be called the Information and
Technology Act, 2000.
▪ Section2. Definitions[51]
▪ Section43. Penalty for damage to computer, computer system, etc.
If any person without permission of the owner or any person who is in charge of a computer, computer system or
computer network –
(i) Accesses such computer, computer system or computer network;
(ii) downloads copies or extracts any data, computer data-base or information;
(iii) introduces or causes to be introduced any computer contaminant or computer or computer virus;
(iv) damages or causes to be damaged any computer, computer system or computer network data, computer
database or any other programmes;
(v) disrupts or causes disruption;
(vi) denies or causes the denial of access to any person authorised to access;
(vii) provides any assistance to any person to facilitate access in contravention of the provisions of this Act;
(viii) charges the services availed of by a person to the account of another person by tampering with or
manipulating any computer, computer system or computer network, he shall be liable to pay damages up to ten
lakh rupees to the person so affected.
▪ Section 65. Tampering with computer source documents.[52]
▪ If any person knowingly or intentionally conceals, destroys code or alters or causes another to conceal,
destroy , or alter any computer source used for a computer, computer program me, computer system
or computer network, he shall be punishable with imprisonment up to three years, or with fine up to
two lakh rupees, or with both.
▪ Section 66. Hacking with Computer System.
▪ Section 91. Amendment of Act 45 of 1860.[53]
▪ The Indian Penal Code shall be amended in the manner specified in the first schedule to this Act. [54]
MENACES TO BE COUNTERED BY
INFORMATION AND TECHNOLOGY ACT, 2000
1. Phishing and Spam
Though this has not been mentioned specifically but this can be interpreted in the provisions mentioned
under in section 66 A. Through this section sending of menacing, annoying messages and also misleading
information about the origin of the message has become punishable with imprisonment up to three years
and fine Stolen Computer resource or communication device newly added Section 66B has been introduced
to tackle with acts of dishonestly receiving and retaining any stolen computer resource.
2. Misuse of Digital Signature
Section 66C. Dishonest use of somebody else’s digital signature has been made punishable with
imprisonment which may extend to three years and shall also be liable to fine with may extend to rupees
one lakh.
3. Cheating
Cheating using computer resource has been made punished with imprisonment of either description for a
term which may extend to three years and shall also be liable to fine which may extend to one lakh rupee
(section 66D)
4. Cyber terrorism
The newly introduced section 66F talks about acts of cyber terror which threatens the unity, integrity or
sovereignty of India or strike terror in the people or any section of the people include[55]
a. Denial of service of resources in use by nation
b. Attempting to penetrate or access a computer resource without authorization or exceeding authorized
access
c. Introducing or causing to introduce any computer contaminant likely to cause death or injuries to
person or damage to or destruction of property or disrupts or knowing that it is likely to cause damage
or disruption of supplies or services essential to the life of the community or
d. knowingly or intentionally penetrates or accesses a computer resource without authorisation or
exceeding authorised access, and by means of such conduct obtains access to information,
5. Child Pornography
Newly introduced section 67 B attempts to address the issue of child pornography. Through this section
it has made the publication or transmission of material in any electronic form which depicts children
engaged in sexually explicit act or conduct, anyone who creates, facilitates or records these acts and
images punishable with imprisonment of five years and fine which may extend up to ten lakhs in first
offence and seven years and fine of ten lakhs on subsequent offence
AMENDMENTS TO THE ACT IN 2008
▪ Surveillance, Interception and Monitoring
In order to compact cyber terrorism the government further armed itself with drastic powers Sections 69 of
IT Act 2000 amended enhances the scope from the 2000 version to include interception and monitoring.
This has been a major change in the section which also empowers government not only to monitor any
traffic but also block any site through any intermediary. Any failure on part of the intermediary is punishable
by seven years and also fine (Section 69(4)). Earlier the provision did not mention any fine
▪ Sexually explicit content
Newly introduced section 66 E talks about acts of intentionally or knowingly captures, publishes or
transmits the image of a private area of any person without his or her consent, under circumstances
violating the privacy of that person, shall be punished with imprisonment which may extend to three years
or with fine not exceeding two lakh rupees, or with both.[
▪ Compliance with orders of Controller
Section 68(2) which earlier made failure to comply with the direction of controller punishable with three
years of imprisonment or fine of two lacks or both now has been reduced to two years punishment or fine
of one lakh of rupees or both.
CHAPTER 5 –
REMEDIAL MEASURES
Some points that should be taken care of are:
1.Reliance on terrestrial laws is an untested approach.
Despite the progress being made in many countries, most countries still rely on standard
terrestrial law to prosecute cyber crimes.The majority of countries are relying on archaic
statutes that predate the birth of cyberspace and have not yet been tested in court.
2. Weak penalties limit deterrence. The weak penalties in most updated criminal statutes
provide limited deterrence for crimes that can have large-scale economic and social effects.
3. Self-protection remains the first line of defense.
The general weakness of statutes increases the importance of private sector efforts to develop
and adopt strong and efficient technical solutions and management practices for information
security.
4. A global patchwork of laws creates little certainty.
Little consensus exists among countries regarding exactly which crimes need to be legislated
against. The kinds of gaps that remain, even in the 19 countries that have already taken steps to
address cyber crimes. In the networked world, no island is an island. Unless crimes are defined
in a similar manner across jurisdictions, coordinated efforts by law enforcement officials to
combat cyber crime will be complicated.
5. A model approach is needed.
▪ Most countries, particularly those in the developing world, are seeking a model to follow. These
countries recognize the importance of outlawing malicious computer-related acts in a timely
manner in order to promote a secure environment for e-commerce. But few have the legal and
technical resources necessary to address the complexities of adapting terrestrial criminal
statutes to cyberspace. A coordinated, public-private partnership to produce a model approach
can help eliminate the potential danger from the inadvertent creation of cyber crime havens.
▪ Further, we would like to give our point of views that is what we gained from this project and
what all one can get out of this project. First, the cyber crimes is a new phenonemenon in India
as it wasnt well known as a information and technology market till the enactment of the
Information and Technology Act ,2000 that brought what is called the IT revolution in India. The
government was made to enact this law because there were no laws that used to curb the
growing rate of Cybercrimes that were happening in the late 90s. the passing of this Act lead to
a proper governance over the internet and other services under the World Wide Web.
▪ Moreover, would like to say though the Act of 2000 may have brought a revolution but the
actual revolution was brought about by the Amendment Act of 2005 and 2008. These
amendments have now made the Act stronger and the government in a stronger position in
controlling the mishaps that happen on the web. As the number of virus attacks towards
India increased the government had to come up with new laws to curb these issues as well
as the increasing hacking, phishing and spamming on the web.
▪ From our project we have learnt that controlling the internet as in the ways of checking on
viruses, spams and worms is really a hard task to perform. Due to the increased use in the
social networking sites many accounts of the respective users are under the scanner as
advancement in technology has lead to innovative ways by which hacking is done.
▪ The online banking has also lead to the increased cybercrimes because accounts could be
hacked and money could be transferred into another account all together. Hence, lead to
many ways by which one in present time commits Cybercrime.
CHAPTER 6 –
CONCLUSION
CONCLUSION
▪ Cybercrime is emerging as a serious threat. World wide governments, police
departments and intelligence units have started to react. Initiatives to curb cross
border cyber threats are taking shape. Indian police has initiated special cyber cells
across the country and have started educating the personnel. This project was an
attempt to provide a glimpse on cyber crime in India. This article is based on various
reports from news media and news portal Cyber crime is a term used to broadly
describe criminal activity in which computers or computer networks are a tool, a
target, or a place of criminal activity and include everything from electronic cracking
to denial of service attacks. It is also used to include traditional crimes in which
computers or networks are used to enable the illicit activity.
REFERENCES
▪ www.law-projects.blogspot.in
▪ www.thewindowsclub.com
▪ www.wikipedia.org

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime report
Cyber crime reportCyber crime report
Cyber crime report
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 

Semelhante a Cyber crime (20)

111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Internet
InternetInternet
Internet
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Último

Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 

Último (20)

Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 

Cyber crime

  • 2. AIM ▪ TO CREATE AWARENESS IN THE SOCIETY ABOUT CYBER CRIME. ▪ TO ENGAGE YOUTH IN MEANINGFUL WAYS. ▪ MAKING THE YOUTH UNDERSTAND THE CONCEPT AND TELL THEM HOW DANGEROUS A CYBER CRIME CAN BE.
  • 3. CHAPTER 1 - INTRODUCTION 1) WHAT IS A CYBER CRIME? 2) HISTORICAL BACKGROUND OF CYBER CRIME AND SOCIAL SECURITY 3) THE PROJECT – AN OVERVIEW
  • 4. 1. WHAT IS A CYBER CRIME? ▪ Cyber crime or a computer oriented crime, is a crime that involves a computer and a network. ▪ The computer may have been used in the commission of a crime, or it may be the target. ▪ Cyber crimes can be defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including but not limited to Chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)". ▪ Cybercrime may threaten a person or a nation's security and financial health. ▪ There are also problems of privacy when confidential information is intercepted or disclosed, lawfully or otherwise.
  • 5. 2. HISTORICAL BACKGROUND OF CYBER CRIME AND SOCIAL SECURITY ▪ In the early decades of modern information technology (IT), computer crimes were largely committed by individual disgruntled and dishonest employees. ▪ Physical damage to computer systems was a prominent threat until the 1980s. ▪ Programmers in the 1980s began writing malicious software, including self-replicating programs, to interfere with personal computers. ▪ As the 1990s progressed, financial crime using penetration and subversion of computer systems increased. ▪ Illegitimate applications of e-mail grew rapidly from the mid-1990s onward, generating torrents of unsolicited commercial and fraudulent e-mail. ▪ Issues surrounding types of crimes such as hacking, copyright infringement, unwarranted mass- surveillance, sex tortion, child pornography, and child grooming have become high-profile in the early 2020s.
  • 6. 3. THE PROJECT – AN OVERVIEW ▪ In this project, we have discussed about cyber crime, types of cyber crime, social security, factors affecting social security i.e. what are the factors which affects the social security. ▪ In this we also discuss cyber crimes and how cyber crimes affect the social security of individuals. ▪ Then after, we discuss societal impacts of cyber crime on commerce, on social networking, on women, on inter-governmental relations. ▪ After that a chapter has been included which includes cyber laws like IT act, 2005. ▪ What all is given in that act and the merits and demerits of the act. ▪ Concluding it we mention the measures that should be undertaken by government to control cyber crimes and also the social security of individuals.
  • 7. CHAPTER 2 – TYPES OF CYBER CRIME 1) IDENTITY THEFT 2) RANSOM WARE 3) BOTNETS 4) SPAM AND PHISHING 5) MALVERTISING 6) PUP 7) DRIVE-BY DOWNLOADS 8) EXPLOIT KITS 9) SCAMS 10) REMOTE ADMINISTRATION TOOLS
  • 8. TYPES A. IDENTITY THEFT : Identity theft and fraud is one of the most common types of cybercrime. The term Identity Theft is used, when a person purports to be some other person, with a view to creating a fraud for financial gains. When this is done online on the Internet, its is called Online Identity Theft. The most common source to steal identity information of others, are data breaches affecting government or federal websites. It can be data breaches of private websites too, that contain important information such as – credit card information, address, email ID’s, etc. B. RANSOM WARE : This is one of the detestable malware-based attacks. Ransom ware enters your computer network and encrypts your files using public-key encryption, and unlike other malware this encryption key remains on the hacker’s server. Attacked users are then asked to pay huge ransoms to receive this private key. C. BOTNETS Botnets are networks of compromised computers, controlled by remote attackers in order to perform such illicit tasks as sending spam or attacking other computers. Computer Bots can also be used act like malware and carry out malicious tasks. Then can be used to assemble a network of computers and then compromise them. There are some Botnet Removal Tools that can help you detect and remove Botnets.
  • 9. D. SPAM AND PHISHING Spamming and phishing are two very common forms of cybercrimes. There is not much you can do to control them. Spam is basically unwanted emails and messages. They use Spambots. Phishing is a method where cyber criminals offer a bait so that you take it and give out the information they want. The bait can be in form of a business proposal, announcement of a lottery to which you never subscribed, and anything that promises you money for nothing or a small favour. There are online loans companies too, making claims that you can get insecure loans irrespective of your location. Doing business with such claims, you are sure to suffer both financially and mentally. E. MALVERTISING Malvertising is a method whereby users download malicious code by simply clicking at some advertisement on any website that is infected. In most cases, the websites are innocent. It is the cyber criminals who insert malicious advertisements on the websites without the knowledge of the latter. It is the work of advert companies to check out if an advertisement is malicious but given the number of advertisements they have to deal with, the malverts easily pass off as genuine ads. In other cases, the cyber criminals show clean ads for a period of time and then replace it with malverts so that the websites and advertisements do not suspect.
  • 10. They display the malverts for a while and remove it from the site after meeting their targets. All this is so fast that the website does not even know they were used as a tool for cybercrime. Malvertising is one of the fastest, increasing types of cybercrime. F. PUPs PUPs, commonly known as Potentially Unwanted Programs are less harmful but more annoying malware. It installs unwanted software in your system including search agents and toolbars. They include spyware, adware, as well as dialers. Bitcoin miner was one of the most commonly noticed PUPs in 2013. G. DRIVE-BY DOWNLOADS Drive By Downloads too, come close to malvertising. You visit a website and it triggers a download of malicious code to your computer. These computers are then used to aggregate data and to manipulate other computers as well. The websites may or may not know that they have been compromised. Mostly, the cyber criminals use vulnerable software such as Java and Adobe Flash and Microsoft Silverlight to inject malicious codes as soon as a browser visits the infected website. The user does not even know that there is a download in progress.
  • 11. H. EXPLOIT KITS A vulnerability means some problem in the coding of a software that enables cyber criminals to gain control of your computer. There are ready to use tools (exploit kits) in the Internet market which people can buy and use it against you. These exploit kits are upgraded just like normal software. Only difference is these are illegal. They are available mostly in hacking forums as well as on the Darknet. I. SCAMS Notable among Internet scams are, scams which misuse the Microsoft name and other general tech support scams. Scamsters phone computer users randomly and offer to fix their computer for a fee. Every single day, scores of innocent people are trapped by scam artists into Online Tech Support Scams and forced to shell out hundreds of dollars for non-existent computer problems. J. REMOTE ADMINISTRATION TOOLS Remote Administration Tools are used to carry out illegal activities. It can be used to control the computer using shell commands, steal files/data, send location of the computer to a remote controlling device and more.
  • 12. CHAPTER 3 – SOCIETAL IMPACT OF CYBER CRIME 1) ON COMMERCE 2) ON SOCIAL NETWORKING 3) ON WOMEN
  • 13. ON COMMERCE ▪ With the growth of e-business, internal and external perpetrators can exploit traditional vulnerabilities in seconds. ▪ They can also take advantage of new weaknesses—in the software and hardware architectures that now form the backbone of most organisations. ▪ In a networked environment, such crimes can be committed on a global basis from almost any location in the world, and they can significantly affect an organisations overall well-being. ▪ Several computer security consulting firms produce estimates of total worldwide losses attributable to virus and worm attacks and to hostile digital acts in general. ▪ The 2003 loss estimates by these firms range from $13 billion (worms and viruses only) to $226 billion (for all forms of overt attacks). ▪ Many do not realise that the same technological advancements that have enabled business growth and innovation are also available to facilitate cyber misbehaviour. ▪ Direct loss of assets is just one consequence of cyber misbehaviour. Whether the attack comes from inside or outside the organisation, victims often suffer from negative publicity, which can harm the organisations brand and reputation, erode relationships with customers and other stakeholders, and eat into potential revenue.
  • 14. ON SOCIAL NETWORKING ▪ Many argue that a stringent punishment should be awarded in cyber crime cases since with widespread usage of social networking sites there is a fear of cyber harassment, and exemplary punishments can serve as deterrents. ▪ Harassment and stalking of women online is common, and can include rape threats and other threats of violence, as well as the posting of women's personal information.. ▪ Cyber stalking of intimate partners is the online harassment of a current or former spouse, boyfriend, girlfriend or significant other. ▪ Harassers may send repeated insulting or threatening e-mails to their victims, monitor or disrupt their victims' e-mail use, and use the victim's account to send e-mails to others posing as the victim or to purchase good or services the victim doesn't want. ▪ They may also use the internet to research and compile personal information about the victim, to use in order to harass her.This being a major effect of social networking websites.
  • 15. ON WOMEN ▪ Cyber crime is a global phenomenon. ▪ With the advent of technology, cyber crime and victimization of women are on the high and it poses as a major threat to the security of a person as a whole. ▪ Amongst the various cyber crimes committed against individuals and society at large the crimes which can be mentioned as specially targeting women are as follows: – HARRASMENT VIA EMAILS, CYBER STALKING, CYBER PORNOGRAPHY, DEFAMATION, MORPHING AND EMAIL SPOOFING. ▪ Harassment includes blackmailing, threatening, bullying, and even cheating via email. E- harassments are similar to the letter harassment but creates problem quite often when posted from fake ids. ▪ Cyber stalking is one of the most talked about net crimes in the modern world. Cyber Stalking usually occurs with women, who are stalked by men ▪ Internet has provided a medium for the facilitation of crimes like pornography. Cyber porn as it is popularly called is widespread. Almost 50% of the web sites exhibit pornographic material on the Internet today.
  • 17. ▪ Section1. Short title, extent, commencement and application - (1) This Act may be called the Information and Technology Act, 2000. ▪ Section2. Definitions[51] ▪ Section43. Penalty for damage to computer, computer system, etc. If any person without permission of the owner or any person who is in charge of a computer, computer system or computer network – (i) Accesses such computer, computer system or computer network; (ii) downloads copies or extracts any data, computer data-base or information; (iii) introduces or causes to be introduced any computer contaminant or computer or computer virus; (iv) damages or causes to be damaged any computer, computer system or computer network data, computer database or any other programmes; (v) disrupts or causes disruption; (vi) denies or causes the denial of access to any person authorised to access; (vii) provides any assistance to any person to facilitate access in contravention of the provisions of this Act; (viii) charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system or computer network, he shall be liable to pay damages up to ten lakh rupees to the person so affected.
  • 18. ▪ Section 65. Tampering with computer source documents.[52] ▪ If any person knowingly or intentionally conceals, destroys code or alters or causes another to conceal, destroy , or alter any computer source used for a computer, computer program me, computer system or computer network, he shall be punishable with imprisonment up to three years, or with fine up to two lakh rupees, or with both. ▪ Section 66. Hacking with Computer System. ▪ Section 91. Amendment of Act 45 of 1860.[53] ▪ The Indian Penal Code shall be amended in the manner specified in the first schedule to this Act. [54]
  • 19. MENACES TO BE COUNTERED BY INFORMATION AND TECHNOLOGY ACT, 2000 1. Phishing and Spam Though this has not been mentioned specifically but this can be interpreted in the provisions mentioned under in section 66 A. Through this section sending of menacing, annoying messages and also misleading information about the origin of the message has become punishable with imprisonment up to three years and fine Stolen Computer resource or communication device newly added Section 66B has been introduced to tackle with acts of dishonestly receiving and retaining any stolen computer resource. 2. Misuse of Digital Signature Section 66C. Dishonest use of somebody else’s digital signature has been made punishable with imprisonment which may extend to three years and shall also be liable to fine with may extend to rupees one lakh. 3. Cheating Cheating using computer resource has been made punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupee (section 66D)
  • 20. 4. Cyber terrorism The newly introduced section 66F talks about acts of cyber terror which threatens the unity, integrity or sovereignty of India or strike terror in the people or any section of the people include[55] a. Denial of service of resources in use by nation b. Attempting to penetrate or access a computer resource without authorization or exceeding authorized access c. Introducing or causing to introduce any computer contaminant likely to cause death or injuries to person or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the life of the community or d. knowingly or intentionally penetrates or accesses a computer resource without authorisation or exceeding authorised access, and by means of such conduct obtains access to information, 5. Child Pornography Newly introduced section 67 B attempts to address the issue of child pornography. Through this section it has made the publication or transmission of material in any electronic form which depicts children engaged in sexually explicit act or conduct, anyone who creates, facilitates or records these acts and images punishable with imprisonment of five years and fine which may extend up to ten lakhs in first offence and seven years and fine of ten lakhs on subsequent offence
  • 21. AMENDMENTS TO THE ACT IN 2008 ▪ Surveillance, Interception and Monitoring In order to compact cyber terrorism the government further armed itself with drastic powers Sections 69 of IT Act 2000 amended enhances the scope from the 2000 version to include interception and monitoring. This has been a major change in the section which also empowers government not only to monitor any traffic but also block any site through any intermediary. Any failure on part of the intermediary is punishable by seven years and also fine (Section 69(4)). Earlier the provision did not mention any fine ▪ Sexually explicit content Newly introduced section 66 E talks about acts of intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both.[ ▪ Compliance with orders of Controller Section 68(2) which earlier made failure to comply with the direction of controller punishable with three years of imprisonment or fine of two lacks or both now has been reduced to two years punishment or fine of one lakh of rupees or both.
  • 23. Some points that should be taken care of are: 1.Reliance on terrestrial laws is an untested approach. Despite the progress being made in many countries, most countries still rely on standard terrestrial law to prosecute cyber crimes.The majority of countries are relying on archaic statutes that predate the birth of cyberspace and have not yet been tested in court. 2. Weak penalties limit deterrence. The weak penalties in most updated criminal statutes provide limited deterrence for crimes that can have large-scale economic and social effects. 3. Self-protection remains the first line of defense. The general weakness of statutes increases the importance of private sector efforts to develop and adopt strong and efficient technical solutions and management practices for information security. 4. A global patchwork of laws creates little certainty. Little consensus exists among countries regarding exactly which crimes need to be legislated against. The kinds of gaps that remain, even in the 19 countries that have already taken steps to address cyber crimes. In the networked world, no island is an island. Unless crimes are defined in a similar manner across jurisdictions, coordinated efforts by law enforcement officials to combat cyber crime will be complicated.
  • 24. 5. A model approach is needed. ▪ Most countries, particularly those in the developing world, are seeking a model to follow. These countries recognize the importance of outlawing malicious computer-related acts in a timely manner in order to promote a secure environment for e-commerce. But few have the legal and technical resources necessary to address the complexities of adapting terrestrial criminal statutes to cyberspace. A coordinated, public-private partnership to produce a model approach can help eliminate the potential danger from the inadvertent creation of cyber crime havens. ▪ Further, we would like to give our point of views that is what we gained from this project and what all one can get out of this project. First, the cyber crimes is a new phenonemenon in India as it wasnt well known as a information and technology market till the enactment of the Information and Technology Act ,2000 that brought what is called the IT revolution in India. The government was made to enact this law because there were no laws that used to curb the growing rate of Cybercrimes that were happening in the late 90s. the passing of this Act lead to a proper governance over the internet and other services under the World Wide Web.
  • 25. ▪ Moreover, would like to say though the Act of 2000 may have brought a revolution but the actual revolution was brought about by the Amendment Act of 2005 and 2008. These amendments have now made the Act stronger and the government in a stronger position in controlling the mishaps that happen on the web. As the number of virus attacks towards India increased the government had to come up with new laws to curb these issues as well as the increasing hacking, phishing and spamming on the web. ▪ From our project we have learnt that controlling the internet as in the ways of checking on viruses, spams and worms is really a hard task to perform. Due to the increased use in the social networking sites many accounts of the respective users are under the scanner as advancement in technology has lead to innovative ways by which hacking is done. ▪ The online banking has also lead to the increased cybercrimes because accounts could be hacked and money could be transferred into another account all together. Hence, lead to many ways by which one in present time commits Cybercrime.
  • 27. CONCLUSION ▪ Cybercrime is emerging as a serious threat. World wide governments, police departments and intelligence units have started to react. Initiatives to curb cross border cyber threats are taking shape. Indian police has initiated special cyber cells across the country and have started educating the personnel. This project was an attempt to provide a glimpse on cyber crime in India. This article is based on various reports from news media and news portal Cyber crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to enable the illicit activity.