Cyber Crime..
Cyber Crime..
Penology &Victimology
LDT-531
Faculty Name : MS. DOLI ARORA
Course Objectives
· To acquaint the students with the basic concepts about Penology and Victimology.
· To provide a deep understanding of the nature and ideological thinking
of Penology studies.
· To provide knowledge about the applicability and relevancy of different
penological measures for punishment and correction of the criminal and
corresponding rights of the victims.
· The students will be able to understand the measurement, detection, and
prevention of crime, criminality, and delinquency.
· It will be helpful for the students to determine the root causes of criminal
behaviour and to develop effective and humane means for addressing and preventing
it.
2
COURSE OUTCOMES
CO The students are able to recognize the basic concepts about, Penology and
1 Victimology.
CO The students are able to outline logical thinking in regard to specific penological and
3 other measures available for dealing with the criminal and how far these measures
are appropriate in protecting the rights of the Victims.
• Cybercrime : an overview
• Cybercrime is defined as illegal behaviour involving a
computer, a computer network, or a networked device.
Most, but not all, cybercrime is conducted by profit-
driven cybercriminals or hackers. Some cybercrimes
target computers or devices directly in order to harm or
disable them, while others target computers or
networks in order to disseminate malware, unlawful
information, pictures, or other things. Some cybercrime
targets computers in order to infect them with a
computer virus, which subsequently spreads to other
computers and, in some cases, whole networks.
Cyber Crime
• How do cybercrimes work
• Cybercrime may start everywhere there is digital data,
opportunity, or motivation. From a lone user engaging in
cyberbullying to state-sponsored attackers, cybercriminals
come in many shapes and sizes. Cybercrime does not
happen in a vacuum; it is, in many respects, a dispersed
phenomenon. That is, hackers frequently enlist the help of
other parties to execute their schemes. This is true whether
it’s a malware developer selling code on the dark web, a
distributor of illicit medicines utilizing cryptocurrency brokers
to keep virtual money in escrow, or state threat actors
stealing intellectual property through technological
subcontractors. Cybercriminals employ a variety of attack
vectors to carry out their cyberattacks, and they are always
looking for new ways to achieve their objectives while
evading discovery and prosecution.
Cyber Crime
• Types of cybercrimes
• Cybercrime can be conducted by targeting anything
useful for a person or a country and hence, cybercrimes
are divided into certain types. Let us have a look at these
types accordingly.
• Identity theft
• When a criminal obtains access to a
user’s personal information, they can use it to steal
money, access private information, or commit tax or
health insurance fraud. They can also use the individual’s
name to create a phone/internet account, organize
criminal activities, and claim government benefits in your
name. They might do so by breaking into users’
passwords, stealing personal information from social
media, or sending out phishing emails.
Cyber Crime
• Phishing
• Hackers send malicious email attachments or URLs to users in order
to obtain access to their accounts or computers in instances of such
attacks. Many of these emails are not identified as spam because
cybercriminals are getting more established. Users are duped into
clicking on links in emails that suggest they need to change their
password or update their payment information, allowing thieves
access to their accounts.
• Social Engineering
• Criminals use social engineering to make direct contact with you,
generally via phone call or email. They generally act as a customer
service person in order to earn your trust and obtain the information
they want. This information can include your passwords, your
employer’s name, or your bank account number. Cybercriminals will
gather as much information about you as possible on the internet
before attempting to add you as a buddy on social media sites. They
can sell your information or open accounts in your name after they
obtain access to an account.
Cyber Crime
• Cyberstalking
• Cyberstalking is something in which the criminals stalk you on
your social media accounts to gather your private information
so that they can use that information to get benefits in your
name. They can gather your information in a number of ways.
They could do so by gaining access to users’ credentials,
stealing personal information from social media, or sending out
phishing emails. Threats, libel, slander, sexual harassment, and
other activities to control, influence, or intimidate their victim,
are all examples of this type of behaviour.
• Botnets
• Botnets are networks made up of infected machines that are
managed from afar by hackers. These botnets are then used by
remote hackers to transmit spam or attack other computers.
Botnets may also be used to conduct harmful operations and
serve as malware.
Cyber Crime
• Prohibited content
• In this type of cybercrime, the cybercriminals share those
contents which are offensive and highly disturbing. Here,
offensive and disturbing content is not only limited to
sexual activities but also includes violent videos, criminal
videos, and videos related to terrorist activities. This sort of
information may be found on both the public internet and
the dark web, which is an anonymous network.
• Cybercrime under IPC and the IT Act
• There are a lot of statutes and regulations enacted by
various authorities that penalize cybercrime.
The Indian Penal Code, 1860 (IPC) and the
Information Technology Act, 2000 (IT Act) both penalize a
variety of cybercrimes and unsurprisingly, many clauses in
the IPC and the IT Act overlap.
Cyber Crime
• Laws governing cybercrimes in India
• Cybercrime refers to illegal activities in which a computer is
used as a tool, a target, or both. Traditional criminal actions
such as theft, fraud, forgery, defamation, and mischief, all of
which are covered under the Indian Penal Code, might be
included in cybercrimes. The Information Technology Act of
2000 addresses a variety of new-age offences that have arisen
as a result of computer abuse. The Indian Penal Code 1860,
the Bankers’ Books Evidence Act 1891, the
Indian Evidence Act 1872, and the
Reserve Bank of India Act 1934 were all swiftly amended by
the IT Act. The Amendments brought under the Sections of
these Acts were to make them compliant with new
technologies. By establishing stringent legal recognition, these
modifications attempted to tone down all electronic
transactions/communications, bringing them beneath the radar.
Assessment Pattern
Students are assessed on the
basis of the following
parameters:
• Assignments
• Surprise Test
• Quiz
• Discussion
paulhraymer.com 13
References
• . Textbooks / Reference Books
• 2. S.M.A. Qadri, Criminology, Penology and Victimology (Eastern Book Company, 2017)
• 3. S.R. Myneni, Penology & Victimology (Allahabad Law Agency, Faridabad, 2017)
• 4. Dr. Ashok K.Jain, Criminology, Penology and Victimology (Ascent Publications, Delhi, 2017)
• 5. Prof. N.V.Paranjpee- Criminology & Penology with Victimology (Central Law Publications,
2014)
• 7. Dr. Malvika Singh & Dr. K. P. Singh- Criminology, Penology &Victimology (Bright Law
House's)
14
THANK YOU
For queries
Email: [email protected]