0% found this document useful (0 votes)
86 views

Cybercrime

Cyber crime broadly describes criminal activity where computers or networks are used as tools, targets, or places of criminal activity. It includes hacking, denial of service attacks, and using computers to enable traditional crimes like fraud. Cyber crimes can target computers directly through hacking or use computers as weapons to commit real-world crimes like cyber terrorism, credit card fraud, or child pornography. Indian law defines and punishes cyber crimes through the Information Technology Act of 2000 and its 2008 amendment. Effective cyber security and following cyber ethics and laws are important to reduce the growing threat of cyber crimes.

Uploaded by

Quela Belz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views

Cybercrime

Cyber crime broadly describes criminal activity where computers or networks are used as tools, targets, or places of criminal activity. It includes hacking, denial of service attacks, and using computers to enable traditional crimes like fraud. Cyber crimes can target computers directly through hacking or use computers as weapons to commit real-world crimes like cyber terrorism, credit card fraud, or child pornography. Indian law defines and punishes cyber crimes through the Information Technology Act of 2000 and its 2008 amendment. Effective cyber security and following cyber ethics and laws are important to reduce the growing threat of cyber crimes.

Uploaded by

Quela Belz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

24/08/22

Cyber Crime
Cyber Crime is a term used to broadly describe
criminal activity in which computers or computer
networks are a tool, a target, or a place of criminal
activity and include everything from electronic
cracking to denial of service attacks. It also
include traditional crimes in which computers or
networks are used to enable the illicit activity.
Categories of Cyber Crime

We can categorize cyber crime in two ways:

• The computer as a target :- using a computer to attacks other


computer, e.g. Hacking, virus/worms attacks etc.
• The computer as a weapon :- using a computer to commit real world
crime e.g. cyber terrorism, credit card fraud and pornography etc.
TYPES OF
CYBER CRIME
Cyber Crimes

Hacking
 Hacking is not defined in the amended IT Act, 2000.
Hacking means unauthorized attempts to bypass the
security mechanisms of an information system or
network.
 In simple words Hacking is the unauthorized access to a
computer system, programs, data and network resources.
 Government websites are the hot target of the hackers.
Data Theft(According to IT Act, 2008, crime of data theft u/s 43 (b))
 If any person without permission of the owner or any other
person, who is in charge of a computer, computer system of
computer network - downloads, copies or extracts any data,
computer data base or information from such computer,
computer system or computer network including information
or data held or stored in any removable storage medium, then
it is data theft.
Trojan attacks
 Malicious software that attaches itself to other software and act like
something useful for the system but do the things that are quiet
damping. For eg. VIRUS , WORMS, TROJAN HORSE
 In most of the cases, viruses can do any amount of damage, the
creator intends them to do. They can send your data to a third party
and even delete your data from your computer.
CHILD PORNOGRAPHY
 The Internet is being highly used by its abusers to reach and abuse
children sexually, worldwide.
 Pornography is describing or showing sexual acts in order to cause
sexual excitement through books, films, pornography websites etc.
Computer Vandalism
Damaging or destroying data rather than stealing or
misusing them is called cyber vandalism. These are
program that attach themselves to a file and then circulate.
E-mail spamming
Sending email to thousand and thousand of user- similar
to a chain letter.
Cyber Stalking
• Cyber Stalking is use of the Internet or other electronic means to stalk
someone. Stalking generally involves harassing or threatening
behaviour that an individual engages repeatedly.
E-mail bombing
Characterised by abusers repeatedly sending an
identical email message to a particular address.
Sale of illegal article
This would include trade of narcotics, weapons etc.,
by posting websites, auction websites, bulletin
boards by using email communication.
Online gambling
Also known as i-gambling or internet gambling.
Generally gambling offered through internet is
termed as online gambling.
Cyber terrorism
• The intentional use of computer, networks and, public internet to
cause destruction and harm for personal objectives. Objectives may
be political , religious or ideological.
Software Piracy
• Theft of software through the illegal copying of genuine programs or
the counterfeiting and distribution of products intended to pass for the
original.
Phishing

• Phishing is just one of the many frauds on the Internet, trying


to fool people into parting with their money. Phishing refers
to the receipt of unsolicited emails by customers of Financial
Institutions, requesting them to enter their Username,
Password or other personal information to access their
Account for some reason.

• The fraudster then has access to the customer's online bank


account and to the funds contained in that account.
cyber crimes THREATENS
NATIONAL SECURITY
Cyber Crimes threatens National Security and rising level of cyber crime is an
indication of enormous threat to national security. Fan clubs of Underworld
Dons like Dawood Ibrahim and Chhota Shakeel and other wanted
underworld dons are also doing the rounds on orkut. There is huge potential
for damage to national security through cyber attacks. The internet is a
means for money bounding and funding terrorist attacks in an organized
manner.
Growing Cyber Crime
Cyber Security

Under Section (2) (b) of IT Act, 2008,”cyber security means protecting


information, equipment, devices computer, computer resource,
communication device and information stored therein from
unauthorized access, use, disclosure, disruption, modification or
destruction.”
In India, The IT Act, 2000 as amended by The IT (Amendment) Act,
2008 is known as the Cyber law
How to Tackle Such Activities?

Antivirus And Anti Spyware Software:


• Antivirus software consists of computer programs that
attempt to identify, thwart and eliminate computer viruses
and other malicious software. Anti spy wares are used to
restrict backdoor program, Trojans and other spy wares to
be installed on the computer.
Firewalls:
• A firewall protects a computer network from unauthorized
access. Network firewalls may be hardware devices,
software programs, or a combination of the two. A network
firewall typically guards an internal computer network
against malicious access from outside the network.
Cyber Security : Cyber Security involves protection of sensitive
personal and business information through prevention, detection and
response to different online attacks. Cyber security actually
preventing the attacks, cyber security.
Privacy Policy : Before submitting your name , e-mail , address, on a
website look for the site’s privacy policy.
Cryptography: Cryptography is the science of encrypting and
decrypting information. Encryption is like sending a postal
mail to another party with a lock code on the envelope which
is known only to the sender and the recipient.
Cyber Ethics and Laws: Cyber ethics and cyber laws are also
being formulated to stop cyber crimes. It is a responsibility
of every individual to follow cyber ethics and cyber laws so
that the increasing cyber crimes shall reduce. Security
Software like Anti Viruses and Anti Spy Wares should be
installed on all computers, in order to remain secure from
Cyber Crimes.
CYBER LAW OF INDIA

Cyber crime can involve criminal activities that are traditional in


nature, such as theft, fraud, deformation and mischief, all of which
were subjected to the India Penal code. In simple way we can say that
cyber crime is unlawful acts where in the computer is either a tool or
both.
The abuse of computer has also given birth of new age crime that are
addressed by the Information Technology Act, 2000.
Information Technology Amendment Act,
2008
“If any person, dishonestly, or fraudulently,
Destroys, Deletes or Alters any Information residing in a computer
resource or diminishes its value or utility or affects it injuriously by
any means;
Steals, conceals, destroys or alters or causes any person to steal,
conceal, destroy or alter any computer source code used for a
computer resource with an intention to cause damage;
he shall be punishable with imprisonment for a term which may
extend to two to three years or with fine which may extend to five lakh
rupees or with both.”
Conclusion

Cybercrime is indeed getting the recognition it deserves.


However, it is not going to restricted that easily . In fact , it
is highly likely that cyber crime and its hackers will
continue developing and upgrading to stay ahead of the
law. So, to make us safer we must need cyber security.
 Indian Laws are well drafted and are capable of handling
all kinds of challenges as posed by cyber criminals.
However, the enforcement agencies are required to be well
versed with the changing technologies and Laws.”
THANK YOU!!!

You might also like