SlideShare a Scribd company logo
1 of 21
Global Technical Campus, Jaipur
“IT act Case Study”
DEPARTMENT OF INFORMATION TECHNOLOGY
1
Presented by-
Jayati Tiwari
HACKING
CONTENTS
•Cyber crime - Introduction
•Types
•How it is committed?
•What is IT Law & Cyber Law?
•Case Study
•Verdict
•Quick facts about cyber crime.
•Recommendations
3
What is Cyber crime???
•Cyber crime is simply defined as crimes that
are directly related to computers and using
computers.
•A personal computer connected to the Internet
without protection may be infected with
malicious software within a minute.
Hacking
Every act committed towards breaking into a
computer and/or network is hacking. Hackers
write or use ready-made computer programs to
attack the target computer.
4
Types
Target group of
computer
devices
Target personal
computer
devices
Against
Person
Against
Property
Against
Govt.
Denial of
service
Malware
Computer
Viruses
Transmission
of indecent
material
Harassment
(racial,
religious
etc.)
Computer
Vandalism
Transmission
of harmful
programs
Terrorize
international
Govt.
Cracking
into
military
maintained
website
5
How it is Committed ???
Unauthorized access
Unauthorized access means
any kind of access without the
permission of either the
rightful owner or the person in
charge of a computer,
computer system or computer
network.
6
Hacking
Every act committed towards breaking
into a computer and/or network is
hacking. Hackers write or use ready-
made computer programs to attack the
target computer.
Trojan Attack
The program that act like
something useful but do the
things that are quiet damping.
The programs of this kind are
called as Trojans.
Virus and Worm attack:-
A program that has capability to infect
other programs and make copies of itself
and spread into other programs is called
virus.
Programs that multiply like viruses but
spread from computer to computer are
called as worms.
Email spoofing
Email spoofing refers to email that appears to
have been originated from one source when it
was actually sent from another source.
10
Phishing scams and fraud
A ‘phisher’ may use spoof emails to direct a
computer user to fraudulent websites to elicit
a transfer of money, or sensitive information
such as passwords or credit card
details, from the user.
•Cyber law or Internet law is a term that
encapsulates the legal issues related to use of
the Internet. It is less a distinct field of law
than intellectual property or contract law, as
it is a domain covering many areas of law and
regulation. Some leading topics include
internet access and usage, privacy, freedom of
expression.
What is IT Law and Cyber Law ??
•IT Law is a set of legal enactments,
currently in existence in several countries,
which governs the digital dissemination of
both (digitalized) information and software.
12
Case study
.
13
e-bay.in is the most popular online shopping mall providing free online
auctions for products like mobiles/cell phones, cameras, computers, etc.
Bhubaneswar: Rourkela police busted a racket involving an online fraud
worth Rs 12.5 lakh.
In Jan 2012 ,Two persons, including alleged mastermind Debasis Pandit,
a BCA student, were arrested and forwarded to the court of the sub
divisional judicial magistrate, Rourkela the other arrested person is Rabi
Narayan Sahu.
The ebay case
Pandit allegedly hacked into the eBay India site using XSS Scripting and gathered
the details of around 700 credit cardholders. He then made purchases by using their
passwords.
The fraud came to the notice of eBay officials when it was detected that several
purchases were made from Rourkela while the customers were based in cities such as
Bangalore, Baroda and Jaipur and even London.
The company brought the matter to the notice of Rourkela police after some
customers lodged complaints
Pandit used the address of Sahu for delivery of the purchased goods
The gang was involved in train, flight and hotel reservations.
15
What they did ???
Verdict
A case has been registered against the accused under Sections 420
and 34 of the Indian Penal Code and Section 66 of the IT Act and
further investigation is on, he said.
Section 66
Any person who sends, by means of a computer resource or a
communication device
shall be punishable with imprisonment for a term which may
extend to three years and with fine.
Section 420 Of Indian Penal Code
covers offences relating to cheating and dishonestly inducing
delivery of property, and leads to punishments of fines
and/or jail terms of up to 7 years and is liable to pay the total
amount with fine of 1 lakh.
Section 34 of Indian Panel Code :
When a criminal act is done by several persons in
furtherance of the common intention of all, each of such
persons is liable for that act in the same manner as if it
were done by him alone.
Quick Facts about Ciber Crime
29.9 million people fell victim to cybercrime,
$4 billion in direct financial losses,
$3.6 billion in time spent resolving the crime,
4 in 5 online adults (80%) have been a victim of Cybercrime,
17% of adults online have experienced cybercrime on their mobile phone.
Source: Norton Cybercrime Report 2011
18
What can be done???
More Public awareness campaigns
Training of police officers to effectively combat
cyber crimes
More Cyber crime police cells set up across the
country
Websites aid in creating awareness and
encouraging reporting of cyber crime cases
Specialised Training of forensic investigators
and experts
Active coordination between police and other
law enforcement agencies and authorities is
required.
19
Conclusions
Cybercrime greatly affects individuals, businesses, and
national security due to the pervasiveness of the Internet .
Different countries should work together and use legal,
organizational, and technological approaches to combat
cybercrime
•To reduce the damage to critical infrastructures
•To protect the Internet from being abused
"The modern thief can steal more with a computer than with
a gun. Tomorrow's terrorist may be able to do more damage
with a keyboard than with a bomb".
20
THANK YOU
21

More Related Content

What's hot

Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaDr. Arun Verma
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in Indiaamiable_indian
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistanmahrukh rafique
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Cyber law
Cyber lawCyber law
Cyber lawabiabel
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In PakistanShakeel Ahmed
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & LawYash
 

What's hot (19)

Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
Cyber law
Cyber lawCyber law
Cyber law
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber Law and Cyber Crime
Cyber Law and Cyber Crime Cyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
 

Similar to Cyber Crime(Hacking) - IT acts

Similar to Cyber Crime(Hacking) - IT acts (20)

cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 

Recently uploaded

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Cyber Crime(Hacking) - IT acts

  • 1. Global Technical Campus, Jaipur “IT act Case Study” DEPARTMENT OF INFORMATION TECHNOLOGY 1 Presented by- Jayati Tiwari
  • 3. CONTENTS •Cyber crime - Introduction •Types •How it is committed? •What is IT Law & Cyber Law? •Case Study •Verdict •Quick facts about cyber crime. •Recommendations 3
  • 4. What is Cyber crime??? •Cyber crime is simply defined as crimes that are directly related to computers and using computers. •A personal computer connected to the Internet without protection may be infected with malicious software within a minute. Hacking Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. 4
  • 5. Types Target group of computer devices Target personal computer devices Against Person Against Property Against Govt. Denial of service Malware Computer Viruses Transmission of indecent material Harassment (racial, religious etc.) Computer Vandalism Transmission of harmful programs Terrorize international Govt. Cracking into military maintained website 5
  • 6. How it is Committed ??? Unauthorized access Unauthorized access means any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. 6
  • 7. Hacking Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready- made computer programs to attack the target computer.
  • 8. Trojan Attack The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans.
  • 9. Virus and Worm attack:- A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. Programs that multiply like viruses but spread from computer to computer are called as worms.
  • 10. Email spoofing Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source. 10
  • 11. Phishing scams and fraud A ‘phisher’ may use spoof emails to direct a computer user to fraudulent websites to elicit a transfer of money, or sensitive information such as passwords or credit card details, from the user.
  • 12. •Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet. It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include internet access and usage, privacy, freedom of expression. What is IT Law and Cyber Law ?? •IT Law is a set of legal enactments, currently in existence in several countries, which governs the digital dissemination of both (digitalized) information and software. 12
  • 14. e-bay.in is the most popular online shopping mall providing free online auctions for products like mobiles/cell phones, cameras, computers, etc. Bhubaneswar: Rourkela police busted a racket involving an online fraud worth Rs 12.5 lakh. In Jan 2012 ,Two persons, including alleged mastermind Debasis Pandit, a BCA student, were arrested and forwarded to the court of the sub divisional judicial magistrate, Rourkela the other arrested person is Rabi Narayan Sahu. The ebay case
  • 15. Pandit allegedly hacked into the eBay India site using XSS Scripting and gathered the details of around 700 credit cardholders. He then made purchases by using their passwords. The fraud came to the notice of eBay officials when it was detected that several purchases were made from Rourkela while the customers were based in cities such as Bangalore, Baroda and Jaipur and even London. The company brought the matter to the notice of Rourkela police after some customers lodged complaints Pandit used the address of Sahu for delivery of the purchased goods The gang was involved in train, flight and hotel reservations. 15 What they did ???
  • 16. Verdict A case has been registered against the accused under Sections 420 and 34 of the Indian Penal Code and Section 66 of the IT Act and further investigation is on, he said. Section 66 Any person who sends, by means of a computer resource or a communication device shall be punishable with imprisonment for a term which may extend to three years and with fine. Section 420 Of Indian Penal Code covers offences relating to cheating and dishonestly inducing delivery of property, and leads to punishments of fines and/or jail terms of up to 7 years and is liable to pay the total amount with fine of 1 lakh.
  • 17. Section 34 of Indian Panel Code : When a criminal act is done by several persons in furtherance of the common intention of all, each of such persons is liable for that act in the same manner as if it were done by him alone.
  • 18. Quick Facts about Ciber Crime 29.9 million people fell victim to cybercrime, $4 billion in direct financial losses, $3.6 billion in time spent resolving the crime, 4 in 5 online adults (80%) have been a victim of Cybercrime, 17% of adults online have experienced cybercrime on their mobile phone. Source: Norton Cybercrime Report 2011 18
  • 19. What can be done??? More Public awareness campaigns Training of police officers to effectively combat cyber crimes More Cyber crime police cells set up across the country Websites aid in creating awareness and encouraging reporting of cyber crime cases Specialised Training of forensic investigators and experts Active coordination between police and other law enforcement agencies and authorities is required. 19
  • 20. Conclusions Cybercrime greatly affects individuals, businesses, and national security due to the pervasiveness of the Internet . Different countries should work together and use legal, organizational, and technological approaches to combat cybercrime •To reduce the damage to critical infrastructures •To protect the Internet from being abused "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb". 20