Cyber Crimeand Cyber Laws

2,385 views
2,280 views

Published on

Published in: Internet, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,385
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
243
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Cyber Crimeand Cyber Laws

  1. 1. Presented by: Jayashree Dora Regd. No:1205106025 4th Sem, MCA Guided by: Mr. Manjit Ku. Nayak Dept. of CSA
  2. 2. History of Cyber Crime Introduction to Cyber Crime Classification of Cyber Crime Categories of Cyber Crime Types of Cyber Crime Who are Cyber Criminals? Cyber Crime in India Need of Cyber Laws
  3. 3.  The first recorded cyber crime took place in the year 1820!  In1981 Ian Murphy, becomes first felon convicted of a computer crime.  In 1982 Elk Cloner, an Apple II boot virus, is written.  In 1985 Online hacking magazine Phrack established.  In 1986 Pakistani Brain, the oldest virus created under unauthorized circumstances, infects IBM computers.  In 1987 Computer Emergency Response Team (CERT) created.  In 1988 Kevin Mitnick secretly monitors the e-mail of MCI and Digital Equipment corporation (DEC) security officials. He is convicted and sentenced to a year in jail.
  4. 4. In 1989 Hackers in West Germany are arrested for breaking into US government and corporate computers and selling operating-system source code to the KGB. In 1990 The Electronic Frontier Foundation (EFF) is formed. Legion of Doom and Masters of Deception engaged in online warfare - jamming phone lines, monitoring calls, trespassing in each other's private computers.
  5. 5.  Cyber Crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks.  It’s an unlawful act where in the computer is either a tool or a target or both.  Computer crime mainly consists of unauthorized access to computer systems data alteration, data destruction, theft of intellectual property. Cyber crime in the context of national security may involve hacking, traditional espionage,.
  6. 6.  Cybercrime includes a wide variety of crime  Offences under cyber crime: o Offences against the confidentiality, integrity and availability of computer data and systems o Copyright-related offences
  7. 7. Cyber crimes can be basically divided into 3 major categories: 1. Cyber crimes against persons 2. Cyber crimes against property 3. Cyber crimes against government
  8. 8. Kids (age group 9-16 etc.) Organized hack activists Disgruntled employees Professional hackers (corporate espionage)
  9. 9. India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the Global Cyber Crime.
  10. 10. 121 Million Internet Users 65 Million Active Internet Users, up by 28% from 51 million in 2010 50 Million users shop online on Ecommerce and Online Shopping Sites 46+ Million Social Network Users 346 million mobile users had subscribed to Data Packages.
  11. 11. The majority of cybercrimes are centered on forgery, fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK,  Social networks as well as ecommerce sites are major targets,  6.9 million bot-infected systems in 2010,  14,348 website defacements in 2010,  6,850 .in and 4,150 .com domains were defaced during 2011,  15,000 sites hacked in 2011,  India is the number 1 country in the world for generating spam.
  12. 12. • 29.9 million people fell victim to cybercrime, • $4 billion in direct financial losses, • $3.6 billion in time spent resolving the crime, • 4 in 5 online adults (80%) have been a victim of Cybercrime, • 17% of adults online have experienced cyber crime on their mobiles.
  13. 13. Cyber Law is the law governing cyber space. Cyber space is a very wide term and includes computers, networks, software, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc.
  14. 14.  TACKLING CYBER CRIMES  Laws are necessary in all segments of society, and e-commerce.  All Internet users, including minors, need to be assured of their privacy and the safety of their personal information online.
  15. 15. • The primary source of cyber law in India is the Information Technology Act, 2000 (IT Act) which came into force on 17 October 2000. • The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government. • The IT Act also penalizes various cyber crimes and provides strict punishments (imprisonment terms up to 10 years and compensation up to Rs 1(crore)
  16. 16. • email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. • Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. • Digital signatures have been given legal validity and sanction in the Act.
  17. 17.  HACKING WITH COMPUTER SYSTEM  PUBLISHING OBSCENE MATERIAL ON INTERNET  BREACHING OF CONFIDENTIALITY AND PRIVACY
  18. 18. • INDIAN PENAL CODE,1860 • INDIAN EVIDENCE ACT,1872
  19. 19. • Under the IT Act, 966 cybercrime cases were filed in 2010 420 in 2009) • 233 persons were arrested in 2010 • 33% of the cases registered were related to hacking • Under the IPC, 356 cybercrime cases were registered in 2010 • The majority of these crimes were either forgery or fraud cases
  20. 20. “As internet technology advances so does the threat of cyber crime. In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls and security patches are just the beginning. Never open suspicious e-mails and only navigate to trusted sites • CYBER LAWS_ ESSENTIAL FEATURE IN TODAYS WORLD OF INTERNET • • ACHIEVING GLOBAL PEACE AND HARMONY
  21. 21. • www.slideshares.net • en.wikipedia.org • please.hackmii.com

×