2. Crime committed using a computer and the internet to
steal a person’s identity or illegal imports or malicious
programs cybercrime is nothing but where the computer
used as an object or subject of crime
3. The first recorded cyber crime took place in the year
1820 That is not surprising considering the fact that the
abacus, which is thought to be the earliest form of a
computer, has been around since 3500 B.C.
4. The Computer as a Target : using a computer to
attack other computers.
The computer as a weapon : using a computer to
commit real world crimes.
6. Hacking in simple terms means an illegal intrusion into a
computer system and/or network. It is also known as
CRACKING. Government websites are the hot targets of the
hackers due to the press coverage, it receives. Hackers
enjoy the media coverage.
The Internet is being highly used by its abusers to reach
and abuse children sexually, worldwide. As more homes
have access to internet, more children would be using
the internet and more are the chances of falling victim to
the aggression of pedophiles.
7. This is an act by the criminal, who floods the bandwidth of the
victims network or fills his e-mail box with spam mail depriving
him of the services he is entitled to access or provide
Malicious software that attaches itself to other software.
(virus, worms, Trojan Horse, web jacking, e-mail bombing
etc)
8. Damaging or destroying data rather than stealing or
misusing them is called cyber vandalism. Transmitting
virus: These are programs that attach themselves to a file
and then circulate .
Terrorist attacks on the Internet is by distributed denial of
service attacks, hate websites and hate emails, attacks
on sensitive computer networks, etc.
9. Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of
products intended to pass for the original.
10. There are Provisions in amendments IT Act :-
•IT Act ,2000
a.Illegal access, introduction of virus, denial of services, causing damage and
manipulating computer accounts (Section 43)
b.Tampering, destroying and concealing computer code (Section 65)
c.Acts of hacking leading to wrongful loss or damage (Section 66)
d.Acts related to publishing, transmission or causing Publication of obscene/
lascivious in nature (section 67)
Act of causing denial of service, introduction of virus etc as defined in section
43 only amounts to payment of damages which could be upto one crore.
Punishment in section 65 and 66 is three years or fine up to two lakh rupees or
both.
For section 67 the first time offenders can be punished up to 5 years with fine
up to one lakhs of rupees. Subsequent offence can lead to ten years of
punishment and fine up to two lakhs of rupees. Cntd..
11. •IT Act ,2008
Introduction of virus, manipulating accounts, denial of services etc made
punishable.
Cntd…
Cyber Crime Section of IT Act Punishment
Phishing and Spam 66 A three years and fine
Stolen Computer resource
or communication device
66B three years or fine of one
lakh rupees or both
Misuse of Digital Signature 66C to three years and shall also
be liable to fine with may
extend to rupees one lakh.
Cheating 66D three years or one lakh rupee
Cyber terrorism 66F Imprisonment for life.
Child Pornography 67 B five years and ten lakhs in
first offence and seven years
and fine of ten lakhs
12. Cyber Crime Section of IT Act Punishment
Intermediary’s liability 67C three years and fine
Surveillance, Interception
and Monitoring
69(4) Seven years
Cognizance of cases 77B three years
Investigation of Offences 78 three years or one lakh rupee
Sexually explicit content 66E three years or with fine not exceeding
two lakh rupees, or with both
Compliance with orders of
Controller
68(2) fine of two lacks or both now has been
reduced to two years punishment or
fine of one lakh of rupees or both.
13. Use antivirus software’s
insert firewalls
uninstall unnecessary software
maintain backup
check security settings
Never give your full name or address to strangers