Rajveer choudhary cyber crime presentation

423 views

Published on

Cyber crime presentation with included a case study with all the details on case study

Published in: Engineering, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
423
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
18
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Rajveer choudhary cyber crime presentation

  1. 1.  What is Cyber Crime ?  History of Cyber Crime.  Types of Cyber Crime.  Manner of Committing Cyber Crime.  What is Cyber Law ? Acts made to deal with cyber crime in  India  Case Study in India 2
  2. 2.  Cyber Crime is simply defined as crimes that are directly related to computers and using computers. It is any criminal act dealing with computers and networks.  An increasing number of criminal activities are using the internet. 3
  3. 3.  Computers and other electronic devices can be tools to commit crime. A personal computer connected to Internet without protection may be infected with malicious software in under a minute.  Cybercrime is one of the fastest-growing criminal activities on the planet, it covers huge range of illegal activity including financial scams, computer hacking and virus attacks. 4
  4. 4.  In early decades of modern IT, computer crimes were committed by individual or dishonest employees.  As telecommunications technology spread throughout the IT world, programmers started writing malicious software, including self replicating programs, to interface with personal computers.  Popular cyber crimes are computer viruses and phishing scams. 5
  5. 5. Target group of computer devices Target Personal computer devices Denial of Service Malware Computer Viruses About Person About Property About Gov. Harassment (sexual, religious) Transmission of Harmful Programs Cracking into Gov. maintained Websites 6
  6. 6.  Unauthorized Access: Unauthorized Access means any kind of access without permission of either owner or rightful person as in- charge of computer, computer system or computer network.  Hacking: Every act committed towards breaking into computer or network is Hacking. Hackers write or use ready made computer programs to attack the large computer.  Trojan Attack: The program that acts like something useful but do things that are quiet damping. The programs of this kind are called Trojans. 7
  7. 7.  Virus and Worm Attack: A program that has capability to infect other programs and make copies of itself and spread into other programs is called Virus. And the programs multiply like viruses but spread from computer to computer are called as worms.  Phishing scams and fraud: A phisher use spoof emails to direct computer user to fraud websites to react or respond on a transfer of money or credit cards details ,passwords from user.  Email Spoofing: It refers to email that appears to have been originated from one source when it was actually send from another source. 8
  8. 8.  Cyber Law is a term that encapsulates the legal issues related to use of Internet. It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include access and usage. 9
  9. 9.  e-bay.in is the most popular online shopping mall providing free online auctions for products like mobiles/cell phones, cameras, computers, etc.  Two persons, alleged mastermind Debasis Pandit, a B.Tech Student and other Rabi Narayan Sahu. 10
  10. 10.  Pandit allegedly hacked into eBay India site and gathered the details of around 700 credit cardholders. He then made purchases using their passwords.  The fraud came to the notice of eBay officials when it was detected that several purchases were made from Rourkela while the customers were based in cities such as Bangalore, Baroda and Jaipur. 11
  11. 11.  The company brought the matter to the notice of Rourkela police after some customers lodged complains.  Pandit used to address of Sahu for the delivery of the purchased goods and always be at sahu house.  Bhubaneswar: Rourkela police busted a racket involving in online fraud both of them got arrested. 12
  12. 12.  And this both were taken under remand and forwarded to the court of sub divisional judicial magistrate, Rourkela.  The case has been registered against the accused under sections 420 and 34 of the Indian Penal Code and Section 66 on the IT Act and got eight months jail with fine of six Lac. 13
  13. 13.  In 2013, the city police received almost 45 complaints of cyber crimes every month according to TOI.  India is the third most targeted country for phishing attacks.  India is the number one country in world for generating the spam.  In India 50% of cyber crime are not even reported. 14
  14. 14. 15

×