PRESENTED BYPresented byFaizan Ahmad09-arid-1380M.Sc. Sociology 3rd
CRIMINAL ACTIVITY INVOLVINGINFORMATION TECHNOLOGYINFRASTRUCTURE ILLEGAL ACCESSDATA INTERFERENCEMISUSE OF DEVICESFORGE...
• Children and adolescents between the  age group of 6 – 18 years• Organised hackers• Professional hackers / crackers• Dis...
• Unauthorized access to computer systems or networks /    Hacking•   Theft of information contained in electronic form•  ...
CLASSIFICATIONAgainst Individuals Against Individual PropertyAgainst OrganizationAgainst Society at large 
Harassment via e-mails.Cyber-stalking.Dissemination of obscene material.Defamation. Unauthorized control/accessover comput...
• Computer vandalism.• Transmitting virus.• Unauthorized control/access over computer system.• Intellectual Property crime...
Unauthorized control/accessover computer systemPossession of unauthorized information.Cyber terrorism against thegovernmen...
Pornography (basically childpornography). Polluting the youth through indecentexposure. Trafficking Financial crimes Sale ...
• The hurry in which the legislation was passed, without sufficient public  debate, did not  really serve the desired purp...
HOW TO DEAL WITH THIS             PROBLEMInternational Agreements and Cooperation –Essential due to  the Worldwide Nature...
 Avoid disclosing any information pertaining to  oneself. Avoid sending any photograph online particularly  to strangers...
CONCLUSION• The only possible step is to make  people aware of their rights and  duties (to report crime as a  collective ...
Cyber crime faizan project
Cyber crime faizan project
Cyber crime faizan project
Cyber crime faizan project
Cyber crime faizan project
Cyber crime faizan project
Upcoming SlideShare
Loading in …5
×

Cyber crime faizan project

1,557 views

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,557
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
46
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cyber crime faizan project

  1. 1. PRESENTED BYPresented byFaizan Ahmad09-arid-1380M.Sc. Sociology 3rd
  2. 2. CRIMINAL ACTIVITY INVOLVINGINFORMATION TECHNOLOGYINFRASTRUCTURE ILLEGAL ACCESSDATA INTERFERENCEMISUSE OF DEVICESFORGERY AND ELECTRONIC FRAUD.
  3. 3. • Children and adolescents between the age group of 6 – 18 years• Organised hackers• Professional hackers / crackers• Discontented employees
  4. 4. • Unauthorized access to computer systems or networks / Hacking• Theft of information contained in electronic form• Email bombing• Data diddling• Salami attacks• Denial of Service attack• Virus / worm attacks• Logic bombs• Trojan attacks• Internet time thefts• Web jacking
  5. 5. CLASSIFICATIONAgainst Individuals Against Individual PropertyAgainst OrganizationAgainst Society at large 
  6. 6. Harassment via e-mails.Cyber-stalking.Dissemination of obscene material.Defamation. Unauthorized control/accessover computer system.Indecent exposureEmail spoofingCheating & Fraud
  7. 7. • Computer vandalism.• Transmitting virus.• Unauthorized control/access over computer system.• Intellectual Property crimes• Internet time thefts
  8. 8. Unauthorized control/accessover computer systemPossession of unauthorized information.Cyber terrorism against thegovernment organization.Distribution of pirated software etc.
  9. 9. Pornography (basically childpornography). Polluting the youth through indecentexposure. Trafficking Financial crimes Sale of illegal articles Online gambling Forgery
  10. 10. • The hurry in which the legislation was passed, without sufficient public debate, did not  really serve the desired purpose• Cyber laws, in their very preamble and aim, state that they are targeted at aiding e-commerce, and are not meant to regulate cybercrime• Cyber torts• Cyber crime in the Act is neither comprehensive nor exhaustive• Ambiguity in the definitions• Uniform law• Lack of awareness• Jurisdiction issues• Extra territorial application• Raising a cyber army• Hesitation to report offences
  11. 11. HOW TO DEAL WITH THIS PROBLEMInternational Agreements and Cooperation –Essential due to the Worldwide Nature of the InternetSoftware and Hardware defenses(e.g., antispam, antivirus software, firewalls)Other practical steps….
  12. 12.  Avoid disclosing any information pertaining to oneself. Avoid sending any photograph online particularly to strangers. Use latest and up date anti virus software. Keep back up volumes. Never send your credit card number to any site that is not secured. Use of firewalls may be beneficial.
  13. 13. CONCLUSION• The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime.

×