CYBER
CRIME
B Y - M D . A N E E S R A Z A
(D E L H I
U N I V E R S I T Y )
Cyber Crime or Computer
Crime refers to any crime that
involves computer and a network.
(a). The computer may have been
us...
Debarati Halder & Dr.
K.Jaishankar (2011) defines
cybercrimes as: “Offences that are
committed against individuals or grou...
Issues surrounding these types of
crimes have become high-profile
,particularly those surrounding
cracking, copyright, inf...
CLASSIFICATION:
Computer crime encompasses a broad range of
activities .
Generally, however, it may be divided into two
ca...
Crimes that use computer networks
or devices to advance other ends
include:
* Cyber stalking
* Fraud and Identity theft
* ...
(1). SPAM:
Spam, or the unsolicited sending of the bulk email for
commercial purposes, is unlawful in some jurisdictions.
...
A variety of internet scams target direct to
consumers.
(1) Obscene and offensive content:
The content of websites and the...
(2). Harassment:
Whereas content may be offensive in a non-
specific way, harassment directs obscenities and
derogatory co...
(3). Drug Trafficking:
Drug traffickers are increasingly taking
advantage of the Internet to sell their illegal
substances...
CYBER LAW:
Cyber law is a term use
to describe the legal
issues related to use of
communication
technology, particularly
c...
IT ACT:
An act to provide legal recognition for the
transaction carried out by means of
electronics data interchange and o...
CYBER
THEFT
CASE
Rs. 24 crore cyber theft
(a). Theft of Rs.24 crore from the YES
Bank account of RPG Group.
(b). Cops recovered more than h...
TRAILS
(a). Hackers operating from two Wi-Fi
connections in Delhi allegedly stole the
amount on may 11,2013.
(b). The mone...
IT ACT APPLICABLE &
PUNISHMENT
(a). Section 66D Punishment for cheating by
personation by using computer resource are
appl...
THANK
YOU
Upcoming SlideShare
Loading in …5
×

Cyber crime

1,703 views

Published on

Cyber Crime Presentation, Cyber Crime

Published in: Technology, News & Politics
  • Be the first to comment

Cyber crime

  1. 1. CYBER CRIME B Y - M D . A N E E S R A Z A (D E L H I U N I V E R S I T Y )
  2. 2. Cyber Crime or Computer Crime refers to any crime that involves computer and a network. (a). The computer may have been used in the commission of a crime , it may be the target. NETCRIME refers to criminal exploitation of the internet.
  3. 3. Debarati Halder & Dr. K.Jaishankar (2011) defines cybercrimes as: “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly ,using modern telecommunication networks such as internet.
  4. 4. Issues surrounding these types of crimes have become high-profile ,particularly those surrounding cracking, copyright, infringement, chi ld pornography and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
  5. 5. CLASSIFICATION: Computer crime encompasses a broad range of activities . Generally, however, it may be divided into two categories: (1). Crimes that target computers directly. (2). Crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device. Crimes that primarily target computer networks or devices include: • Computer viruses • Denial-of-service attacks • Malware (malicious code)
  6. 6. Crimes that use computer networks or devices to advance other ends include: * Cyber stalking * Fraud and Identity theft * Information Warfare *Phishing scams
  7. 7. (1). SPAM: Spam, or the unsolicited sending of the bulk email for commercial purposes, is unlawful in some jurisdictions. While anti-spam laws are relatively new, limits on unsolicited electronics communications have existed for some time. (2). FRAUD: Computer fraud is any dishonest misrepresentation of the fact intended to let another to do or refrain from doing something which causes loss. Including Bank fraud, Identity theft, extortion, and theft of classified information
  8. 8. A variety of internet scams target direct to consumers. (1) Obscene and offensive content: The content of websites and the other electronics communications may be distasteful, obscene or offensive for a variety of reasons. In some instances these communication may be illegal. One area of Internet pornography that has been the target of the strongest efforts at curtailment is child pornography.
  9. 9. (2). Harassment: Whereas content may be offensive in a non- specific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation. This often occurs in the chat rooms, through newsgroups, and by sending hate email to interested parties.(E.g. Cyber bullying, Cyber stalking, Hate Crime, and Stalking)
  10. 10. (3). Drug Trafficking: Drug traffickers are increasingly taking advantage of the Internet to sell their illegal substances through encrypted e-mail and other internet technology. (4). Cyber terrorism: Cyber terrorism Is the use of internet based attacks in terrorists activities, including acts of deliberate, large- scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
  11. 11. CYBER LAW: Cyber law is a term use to describe the legal issues related to use of communication technology, particularly cyber space, i.e. Internet. Cyber law is an attempt to apply laws designed for the physical world to human activities on the internet.
  12. 12. IT ACT: An act to provide legal recognition for the transaction carried out by means of electronics data interchange and other means of electronics communication, commonly referred to as “electronics commerce”.
  13. 13. CYBER THEFT CASE
  14. 14. Rs. 24 crore cyber theft (a). Theft of Rs.24 crore from the YES Bank account of RPG Group. (b). Cops recovered more than half of the stolen amount. (c). Police arrested 13 persons from Chennai and Delhi.
  15. 15. TRAILS (a). Hackers operating from two Wi-Fi connections in Delhi allegedly stole the amount on may 11,2013. (b). The money was deposited in 12 bank accounts across the country. (c). In June, Police located the address where the IP address originated , but it turned out false.
  16. 16. IT ACT APPLICABLE & PUNISHMENT (a). Section 66D Punishment for cheating by personation by using computer resource are applicable. (b). Section 415 & 420 of IPC are applicable for cheating and theft. (c). Punished with imprisonment of either description for a term which may extended to three years and also be liable to fine which may be extended to 1 lakh rupees.
  17. 17. THANK YOU

×