What Constitutes a Cyber Crime In the Country              By- Ujjwal Tripathi                  Engg. College Ajmer
What is Cyber Crime ?   The commission of illegal acts through    the use of a computer or against a    computer system....
Types of Cyber CrimeCriminal activity involving Hacking Virus Dissemination Intellectual Property Crimes Software Pira...
• Hacking-       Hacking in simple terms means an illegalintrusion into a computer system without permission ofcomputer ow...
   Email spoofing - A spoofed email is one    that appears to originate from one source but    actually has been sent fro...
Existing Laws Used for Computer             Crimes
U.S. Computer Fraud and Abuse Act Unauthorized access to a computer  containing data protected for the national  defense ...
U.S. Computer Fraud and Abuse Act Accessing without permission a  “protected computer,” which the courts  now interpret t...
INFORMATION TECHNOLOGY            ACT, 2000   We in India also have had a vision to    become the 12th nation in the worl...
THE IT ACT, 2000 –OBJECTIVES To provide legal recognition for  transactions. Carried out by means of electronic data  in...
I.T. ACT 2000 – CONCLUSION   The other steps have to follow.    However, the government has to be    quick in responding ...
Thank You
What constitutes a cyber crime in the country
Upcoming SlideShare
Loading in …5
×

What constitutes a cyber crime in the country

2,389
-1

Published on

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,389
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
118
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

What constitutes a cyber crime in the country

  1. 1. What Constitutes a Cyber Crime In the Country By- Ujjwal Tripathi Engg. College Ajmer
  2. 2. What is Cyber Crime ? The commission of illegal acts through the use of a computer or against a computer system. Cybercrime is nothing but where the computer used as an object or subject of crime.
  3. 3. Types of Cyber CrimeCriminal activity involving Hacking Virus Dissemination Intellectual Property Crimes Software Piracy Email spoofing Phishing
  4. 4. • Hacking- Hacking in simple terms means an illegalintrusion into a computer system without permission ofcomputer owner/user. Hackers write or use ready-madecomputer programs to attack the target computer. Virus Dissemination - Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious. Software Piracy - Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. The unauthorized copying of software.
  5. 5.  Email spoofing - A spoofed email is one that appears to originate from one source but actually has been sent from another source. Phishing - The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has .
  6. 6. Existing Laws Used for Computer Crimes
  7. 7. U.S. Computer Fraud and Abuse Act Unauthorized access to a computer containing data protected for the national defense or foreign relations concerns Unauthorized access to a computer containing certain banking or financial information Unauthorized access, use, modification, destruction, or disclosure of a computer or information in a computer operated on behalf of the U.S. government
  8. 8. U.S. Computer Fraud and Abuse Act Accessing without permission a “protected computer,” which the courts now interpret to include any computer connected to the Internet . Computer fraud . Transmitting code that causes damage to a computer system or network . Trafficking in computer passwords .
  9. 9. INFORMATION TECHNOLOGY ACT, 2000 We in India also have had a vision to become the 12th nation in the world to enact a Cyber law. We have enacted the Information Technology Act, 2000.
  10. 10. THE IT ACT, 2000 –OBJECTIVES To provide legal recognition for transactions. Carried out by means of electronic data interchange. Other means of electronic communication, commonly referred to as "electronic commerce", involving the use of alternatives to paper-based methods of communication and storage of information.
  11. 11. I.T. ACT 2000 – CONCLUSION The other steps have to follow. However, the government has to be quick in responding to the challenges raised by the constantly changing technologies. Just as time does not wait for anyone, so does Internet. The time to act is right now.
  12. 12. Thank You
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×