6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
Cyber crimes its classifications and preventions
1.
2. Information Communication technology has become an integral part of our day to day
life. It has just transformed the way we communicate; make friends, share updates,
play games, and do shopping and so on. The technology has impacted most aspect of
our day to day life.
Our new generation is getting exposure to cyber space at a very young age. More and
more people are investing time online to play games, makes friends, and use social
networking sites and so on. In fact with smart phones access to social networking,
online games, shopping etc. has increased significantly. The cyber space connects us
virtually with crores of online users from across the globe. With increasing use of
cyber space, cybercrimes are also increasing rapidly.
3. The term “cyberspace” was first used by the cyberpunk science fiction
author William Gibson.
Cyberspace is the electronic medium of computer networks, in which
online communication taken place and where individuals can interact,
exchange ideas, share information, provide social support, conduct
business, direct actions, create artistic media, play games, engage in
political discussion, and so on.
4. The first recorded cybercrime took place in the year 1820.
Cyber Crime may be said to be those species of which, genus is the
conventional crime, and where either the computer is an object or
subject of the constituting crime.
According to UNO Expert recommendations, the term of
“cybercrimes” covers any crime committed by using computer
system or networks, within their framework or against them.
US Department of Justice broadly refers to cyber crimes as “forms
of crimes that involve computers and networks”.
5. Professor S.T. Viswanathan has given three definitions in his book The Indian Cyber
Laws with Cyber Glossary is as follows -
“Any illegal action in which a computer is the tool or object of the crime i.e. any
crime, the means or purpose of which is to influence the function of a computer”.
“Any incident associated with computer technology in which a victim suffered or
could have suffered loss and a perpetrator, by intention, made or could have made
a gain”
“Computer abuse is considered as any illegal, unethical or unauthorized behavior
relating to the automatic processing and transmission of data.”
In simple words Cyber Crime means unlawful acts wherein the computer is
either a tool or a target or both.
6. 1. Cyber Crime against Individual
2. Cyber Crime against Property
3. Cyber Crime against Organization
4. Cyber Crime against Society at large
7. Harassment via e-mail
Cyber Stalking
Dissemination of Obscene materials
Defamation
Unauthorise Access of computer system
E-mail spoofing
Cheating & Fraud
8. Computer Vandalism
Transmitting Virus
Intellectual Property Crimes
Internet time theft
9. Unauthorise access over Computer System/Hacking
Denial of Service
Email bombing
Salami Attack
Logic bomb
Trojan Horse
Data Diddling
10. Cyber Pornography
Financial Crimes
Cyber Terrorism
Sale of illegal Articles
Online Gambling
Forgery
11. Information Technology Act 2000
Sec. 65, Sec. 66, Sec. 66B, Sec. 65C, Sec. 66 D Sec. 66E
Sec. 66F Sec. 67 Sec. 67A Sec. 67B Sec. 67C Sec. 68 69
Sec. 69A Sec. 69B Sec. 70A Sec. 70B Sec. 71, Sec. 72, Sec.
72A, Sec. 73 , Sec. 74
Indian Penal Code 1860
Sec. 503, Sec. 499, Sec. 463, Sec. 420, Sec. 463, Sec. 383,
Sec.500
12. Online Defamation
SMC Pneumatics (India) Pvt ltd v Jogesh Kwata
Shreya Singhal v. UOI
Data mining or corporate espionage
Abhinav Gupta v. State of Haryana
Phishing
Shri Umashankar Sivasubramanian v. ICICI Bank
Cyber stalking
Unknown v. Jawaharlal Nehru University
Computer Forgery
Abdul Kareem Telgi scam
Parliament Attack case
Hate Speech
Sandeep Varghese v. State of Kerala
Piracy of music, films and other
copyrighted materials
Supercasette Industries v. My space inc
13. 1) Education
2) Use a firewall
3) Click with caution
4) Practice safe surfing
5) Practice safe shopping
6) Use comprehensive security software and keep your system updated
7) Secure your wireless network
8) Use strong passwords
9) Use common sense
10) Be suspicious
14. 11) Block spyware attacks
12) Be Social-Media Savvy
13) Secure your Mobile Devices
14) Protect your Data
15) Protect your e-identity
16) Avoid being scammed
17) Call the right person for help
18) National Cyber Crime Reporting Portal:
https://cybercrime.gov.in/
15. The Information Technology Act 2000 incorporates within
its understanding the various cyber offences that the world
is under the threat of in the contemporary era. Proper and
timely implementation of the Act may help to curb the
cyber menace and also make the cyber space a more
secure, safe and easy space for storage, transactions and
definitely sharing. Its proper interpretation and
implementation is what is the need of the hour.