SlideShare uma empresa Scribd logo
1 de 25
CYBER CRIME
Science and crime
   Crime is a social and economic phenomenon
   “a legal wrong that can be followed by criminal
    proceedings which may result into
    punishment.”
   Legal definition : Crime is an intentional act
    of commission or omission in contravention
    to the law of the land and accordingly
    punishable when proved in judicial
    proceeding
   Conventional and new forms of crime
   White collar crime
   Organized crime
   Victimless crime
   The term “cyber crime” was first coined by
    Barry Collins in 1980’s
   “Any criminal activity that uses a computer
    either as an instrumentality, target or a means
    for perpetuating further crimes comes within
    the ambit of cyber crime”
   A generalized definition of cyber crime may
    be “ unlawful acts wherein the computer is
    either a tool or target or both”
   Capacity to store data in comparatively small
    space
   Easy to access
   Complex
   Negligence
   Loss of evidence
   The cyber criminals constitute of various
    groups/ category. The following are the
    category of cyber criminals:
•   Children and adolescents between the age
    group of 6 – 18 years
•   Organised hackers
•   Professional hackers / crackers
•   Discontented employees
   Hacking
   Theft of information contained in electronic
    form
   Email bombing
   Data diddling
   Salami attacks
   Denial of Service attack
   Virus / worm attacks
   Logic bombs
   Trojan attacks
   Internet time thefts
   Web jacking
Internal           Virus             worms              Trojan horses
Computer
crimes
Telecommunicati-   Phone breaking    Phone tapping      Hacking
on crimes

Computer           Embezzlements     Frauds
Manipulation
Crimes
Support of         Data bases to     Data bases to      Money laundering
Criminal           support drug      keep records of
Enterprises        Distribution      client
                                     transaction
Hardware and       Software piracy   Theft of computer Theft of trade
software                             and microchips    secrets
Theft
Classification of cyber crime
   1. Against            2. Against
  Individuals           Organization
a. their person &       a. Government      3. Against Society at
                               c.                  large
b. their property   Firm, Company, Group
 of an individual        of Individuals
    Harassment via e-mails.
   Cyber-stalking.
   Dissemination of obscene material.
   Defamation.
   Unauthorized control/access over computers
   Indecent exposure
   Email spoofing
    Cheating & Fraud
    Computer vandalism.
   Transmitting virus.
    Net trespass
    Unauthorized control/access over computers
   Intellectual Property crimes
    Internet time thefts
   Cyber terrorism against the government
    organization.
   Distribution of pirated software etc.
CYBER TERRORISM
Scientific war against
Governments
   Cyber terrorism is the convergence of terrorism
    and cyberspace. It is generally understood to
    mean unlawful attacks and threats of attack
    against computers, networks, and the
    information stored therein when done to
    intimidate or coerce a government or its people
    in furtherance of political or social objectives.
LTTE                     AUM

Perpetrator   Group/Individual          Group/Individual

Place         Sri                       Japan/US/Worldwide
              Lanka/London/Australia    Worldwide
Tool          Threats/Violence/Recruitm Violence/Recruitment/
              ent/Education/Strategies  Education/Strategies

Target        Government                Governments
              Officials/Recruits
Motivation    Social/Political Change   World Domination
   DETERRENCE
   CRIMINAL JUSTICE
   ENHANCED DEFENSE
   NEGOTIATIONS
    Pornography (basically child pornography)
    Polluting the youth through indecent
    exposure
    Trafficking
   Financial crimes
   Sale of illegal articles
   Online gambling
   Forgery
   The Indian parliament considered it necessary to give effect
    to the resolution by which the General Assembly adopted
    Model Law on Electronic Commerce adopted by the United
    Nations
   As a consequence of which the Information Technology Act
    2000 was passed and enforced on 17th May 2000.
   The Information Technology Act deals with the various cyber
    crimes in chapters IX & XI. The important sections are Ss.
    43,65,66,67
deals with the unauthorised access, unauthorised
Section 43   downloading, virus attacks or any contaminant, causes
             damage, disruption, denial of access, interference with
             the service availed by a person
             deals with ‘tampering with computer source documents’
Section 65   and provides for imprisonment up to 3 years or fine


             deals with ‘hacking with computer system’ and provides
Section 66   for imprisonment up to 3 years or fine


             deals with publication of obscene material and provides
section 67   for imprisonment up to a term of 10 years
   To prevent cyber stalking avoid disclosing any
    information pertaining to oneself. This is as good as
    disclosing your identity to strangers in public place.
   Always avoid sending any photograph online
    particularly to strangers and chat friends as there
    have been incidents of misuse of the photographs.
   Always use latest and up date anti virus software to
    guard against virus attacks.
   Always keep back up volumes so that one may not
    suffer data loss in case of virus contamination
   Never send your credit card number to any site that is
    not secured, to guard against frauds.
   Always keep a watch on the sites that your
    children are accessing to prevent any kind of
    harassment or depravation in children.
   Web site owners should watch traffic and check
    any irregularity on the site. Putting host-based
    intrusion detection devices on servers may do
    this
   Web servers running public sites must be
    physically separate protected from internal
    corporate network.
   History is the witness that no legislation has
    succeeded in totally eliminating crime from the globe.

   The only possible step is to make people aware of
    their rights and duties (to report crime as a collective
    duty towards the society) and further making the
    application of the laws more stringent to check crime.

   Undoubtedly the IT Act is a historical step in the cyber
    world. Further I all together do not deny that there is a
    need to bring changes in the Information Technology
    Act to make it more effective to combat cyber crime.

Mais conteúdo relacionado

Mais procurados (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber crimes presentation
Cyber crimes presentationCyber crimes presentation
Cyber crimes presentation
 
cyber security
cyber securitycyber security
cyber security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Destaque

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among studentsjune21harsh
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentationsarahj6
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Jacqueline Fick
 
Secure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSecure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSkybox Security
 
Crime Detection And Prevention Method By Using HCI
Crime Detection And  Prevention Method By Using HCICrime Detection And  Prevention Method By Using HCI
Crime Detection And Prevention Method By Using HCIPAF KIET
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crimeELDO RAJU
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)Siddharth Anand
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti SajibeKanti
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 

Destaque (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentation
 
Cybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber SpiesCybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber Spies
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...
 
Secure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSecure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual Intelligence
 
Crime Detection And Prevention Method By Using HCI
Crime Detection And  Prevention Method By Using HCICrime Detection And  Prevention Method By Using HCI
Crime Detection And Prevention Method By Using HCI
 
CRIME DETECTION
CRIME DETECTIONCRIME DETECTION
CRIME DETECTION
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crime
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 

Semelhante a Cyber crime

Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 

Semelhante a Cyber crime (20)

Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 

Mais de Paul Senthil

Mais de Paul Senthil (7)

CRPF
CRPFCRPF
CRPF
 
police force ppt.pptx
police force ppt.pptxpolice force ppt.pptx
police force ppt.pptx
 
Environmental administration
Environmental administrationEnvironmental administration
Environmental administration
 
Hr and un
Hr and unHr and un
Hr and un
 
Japan constitution
Japan constitutionJapan constitution
Japan constitution
 
Motivation
MotivationMotivation
Motivation
 
Ne gp
Ne gpNe gp
Ne gp
 

Último

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 

Último (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

Cyber crime

  • 2. Crime is a social and economic phenomenon  “a legal wrong that can be followed by criminal proceedings which may result into punishment.”  Legal definition : Crime is an intentional act of commission or omission in contravention to the law of the land and accordingly punishable when proved in judicial proceeding
  • 3. Conventional and new forms of crime  White collar crime  Organized crime  Victimless crime
  • 4. The term “cyber crime” was first coined by Barry Collins in 1980’s  “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”  A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both”
  • 5. Capacity to store data in comparatively small space  Easy to access  Complex  Negligence  Loss of evidence
  • 6. The cyber criminals constitute of various groups/ category. The following are the category of cyber criminals: • Children and adolescents between the age group of 6 – 18 years • Organised hackers • Professional hackers / crackers • Discontented employees
  • 7. Hacking  Theft of information contained in electronic form  Email bombing  Data diddling  Salami attacks  Denial of Service attack  Virus / worm attacks  Logic bombs
  • 8. Trojan attacks  Internet time thefts  Web jacking
  • 9. Internal Virus worms Trojan horses Computer crimes Telecommunicati- Phone breaking Phone tapping Hacking on crimes Computer Embezzlements Frauds Manipulation Crimes Support of Data bases to Data bases to Money laundering Criminal support drug keep records of Enterprises Distribution client transaction Hardware and Software piracy Theft of computer Theft of trade software and microchips secrets Theft
  • 10. Classification of cyber crime 1. Against 2. Against Individuals Organization a. their person & a. Government 3. Against Society at c. large b. their property Firm, Company, Group of an individual of Individuals
  • 11. Harassment via e-mails.  Cyber-stalking.  Dissemination of obscene material.  Defamation.  Unauthorized control/access over computers  Indecent exposure  Email spoofing  Cheating & Fraud
  • 12. Computer vandalism.  Transmitting virus.  Net trespass  Unauthorized control/access over computers  Intellectual Property crimes  Internet time thefts
  • 13. Cyber terrorism against the government organization.  Distribution of pirated software etc.
  • 14. CYBER TERRORISM Scientific war against Governments
  • 15. Cyber terrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
  • 16. LTTE AUM Perpetrator Group/Individual Group/Individual Place Sri Japan/US/Worldwide Lanka/London/Australia Worldwide Tool Threats/Violence/Recruitm Violence/Recruitment/ ent/Education/Strategies Education/Strategies Target Government Governments Officials/Recruits Motivation Social/Political Change World Domination
  • 17. DETERRENCE  CRIMINAL JUSTICE  ENHANCED DEFENSE  NEGOTIATIONS
  • 18. Pornography (basically child pornography)  Polluting the youth through indecent exposure  Trafficking  Financial crimes  Sale of illegal articles  Online gambling  Forgery
  • 19.
  • 20.
  • 21. The Indian parliament considered it necessary to give effect to the resolution by which the General Assembly adopted Model Law on Electronic Commerce adopted by the United Nations  As a consequence of which the Information Technology Act 2000 was passed and enforced on 17th May 2000.  The Information Technology Act deals with the various cyber crimes in chapters IX & XI. The important sections are Ss. 43,65,66,67
  • 22. deals with the unauthorised access, unauthorised Section 43 downloading, virus attacks or any contaminant, causes damage, disruption, denial of access, interference with the service availed by a person deals with ‘tampering with computer source documents’ Section 65 and provides for imprisonment up to 3 years or fine deals with ‘hacking with computer system’ and provides Section 66 for imprisonment up to 3 years or fine deals with publication of obscene material and provides section 67 for imprisonment up to a term of 10 years
  • 23. To prevent cyber stalking avoid disclosing any information pertaining to oneself. This is as good as disclosing your identity to strangers in public place.  Always avoid sending any photograph online particularly to strangers and chat friends as there have been incidents of misuse of the photographs.  Always use latest and up date anti virus software to guard against virus attacks.  Always keep back up volumes so that one may not suffer data loss in case of virus contamination  Never send your credit card number to any site that is not secured, to guard against frauds.
  • 24. Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children.  Web site owners should watch traffic and check any irregularity on the site. Putting host-based intrusion detection devices on servers may do this  Web servers running public sites must be physically separate protected from internal corporate network.
  • 25. History is the witness that no legislation has succeeded in totally eliminating crime from the globe.  The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime.  Undoubtedly the IT Act is a historical step in the cyber world. Further I all together do not deny that there is a need to bring changes in the Information Technology Act to make it more effective to combat cyber crime.