Cyber crime
Upcoming SlideShare
Loading in...5
×
 

Cyber crime

on

  • 284 views

 

Statistics

Views

Total Views
284
Views on SlideShare
284
Embed Views
0

Actions

Likes
0
Downloads
5
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Cyber crime Cyber crime Presentation Transcript

  • IT ACT AND CYBER CRIME
  • IT Act 2000 – An Overview • Information Technology Act, 2000 is India’s mother legislation regulating the use of computers, computer systems and computer networks as also data and information in the electronic format. • It is developed to promote the IT industry, regulate ecommerce, facilitate e-governance and prevent cybercrime • Cyber law encompasses laws relating to –     Cyber crimes Electronic and digital signatures Intellectual property Data protection and privacy
  • Cyber crime on the rise • As per the cyber crime data maintained by the National Crime Records Bureau (NCRB), following were the total Cyber Crime cases registered under the Information Technology Act     2007- 217 cases 2008- 288 cases 2009- 420 cases 2010- 966 cases • The age-wise profile of persons arrested in cyber crime cases showed that 58.6% of the offenders were in the age group 18–30 years (695 out of 1184) and 31.7% of the offenders were in the age group 30-45 years • One in three adults online Indians (32%) have been either social or mobile cybercrime victims. View slide
  • Types of Cyber Crime being committed • Email spoofing It is one that appears to originate from one source but actually has been sent from another false source. • Web jacking/ Hacking This occurs when someone forcefully takes control of a website (by cracking the password and later changing it). The actual owner of the website does not have any more control over what appears on that website. View slide
  • Types of Cyber Crime being committed • Cyber Defamation India’s first case of cyber defamation was reported when a company’s employee started sending derogatory, defamatory and obscene e-mails about its Managing Director. The e-mails were anonymous and frequent, and were sent to many of their business associates to tarnish the image and goodwill of the company, Later he was Identified and accordingly penalized. • Cyber stalking Cyber stalking involves following a person’s movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms and constantly bombarding the victim with emails etc.
  • Types of Cyber Crime being committed • Email bombing Email bombing refers to sending a large number of emails to the victim resulting in the victim’s email account or mail servers crashing. Example: In one case, a foreigner who had been residing in Simla, India for almost thirty years wanted to avail of a scheme introduced by the Simla Housing Board to buy land at lower rates. When he made an application it was rejected on the grounds that the scheme was available only for citizens of India. He decided to take his revenge. Consequently he sent thousands of mails to the Simla Housing Board and repeatedly kept sending e-mails till their servers crashed • Virus / worm attacks Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it.
  • Cyber Pornography Accessing pornography or sharing obscene content is illegal and punishable under the law In pornography, the service provider, misrepresents his identity and dispatches a mail to a child user of computer for sending photographs for a carrier of fashion or modeling, with an offer of incentive or money and sometimes they assure their victims that such pictures are for personal or confidential use. When they receive such pictures they interpolate the same through graphic program and convert them to pornographic pictures such as putting the face of the victim on the nude body of the person or convert them into intimate postures and release through Modem for hacking by users, with out the knowledge of the victim.
  • Social Networking Sites- Source to Cyber Crime • The recent incident of a 17-year-old girl from a south Delhi Public School alleging that she was sexually assaulted by two MNC employees , whom she had befriended on a social networking website, is a reminder on how the internet can be a source of danger for young generation.
  • Emergency Contact • Indian Computer Emergency Response Team Department of Information Technology, Ministry of Communications and Information Technology, Government of India Electronics Niketan, 6 CGO Complex, Lodhi Road, New Delhi – 110003 ph. – 011-24368572