SlideShare a Scribd company logo
Renu Verma 1
Renu Verma 2
Introduction
• Computer Crime, E-Crime, Hi-Tech Crime
or Electronic Crime is where a computer is
the target of a crime or is the means adopted
to commit a crime.
• Most of these crimes are not new. Criminals
simply devise different ways to undertake
standard criminal activities such as fraud,
theft, blackmail, forgery, and embezzlement
using the new medium, often involving the
Internet
BRIEF HISTORY
The first recorded cyber crime took place in the year
1820. That is not surprising considering the fact
that the abacus, which is thought to be the earliest
form of a computer, has been around since 3500
B.C. in India, Japan and China. The era of modern
computers, however, began with the analytical
engine of Charles Babbage.
In 1820, Joseph-Marie Jacquard, a textile
manufacturer in France, produced the loom. This
device allowed the repetition of a series of steps in
the weaving of special fabrics. This resulted in a
fear amongst Jacquard's employees that their
traditional employment and livelihood were being
threatened. They committed acts of sabotage to
discourage Jacquard from further use of the new
technology. This is the first recorded cyber crime.
Renu Verma 3
CONVENTIONAL CRIME
Crime is a social and economic phenomenon
and is as old as the human society. Crime is a
legal concept and has the sanction of the law.
Crime or an offence is “a legal wrong that can
be followed by criminal proceedings which may
result into punishment”. The hallmark of
criminality is that, it is breach of the criminal
law. Per Lord Atkin “the criminal quality of an
act cannot be discovered by reference to any
standard but one: is the act prohibited with
penal consequences”.
A crime may be said to be any conduct
accompanied by act or omission prohibited by
law and consequential breach of which is visited
by penal consequences.
Renu Verma 4
Defining Cyber Crime :
A simple yet sturdy definition of
cyber crime would be "unlawful
acts wherein the computer is
either a tool or a target or
both".
Renu Verma 5
REASONS FOR CYBER
CRIME
1. Capacity to store data in
comparatively small space
2. Easy to access
3.Complex
4.Negligence / Human error
5. Loss of evidence for tracing
Renu Verma 6
Viruses
A computer virus is a computer program that can
infect other computer programs by modifying
them in such a way as to include a (possibly
evolved) copy of it. Note that a program does not
have to perform outright damage (such as deleting
or corrupting files) in order to be called a "virus".
Viruses are programs that attach themselves to a
computer or a file and then circulate themselves
to other files and to other computers on a
network. They usually affect the data on a
computer, either by altering or deleting it.
Renu Verma 7
Worm attacks
Worms, unlike viruses do not
need the host to attach
themselves to. They merely
make functional copies of
themselves and do this
repeatedly till they eat up all
the available space on a
computer's memory.
Renu Verma 8
Logic bombs
These are event dependent programs. This
implies that these programs are created to
do something only when a certain event
(known as a trigger event) occurs. E.g. even
some viruses may be termed logic bombs
because they lie dormant all through the
year and become active only on a particular
date.
Renu Verma 9
Salami attacks
This kind of crime is normally prevalent in
the financial institutions or for the purpose
of committing financial crimes. An
important feature of this type of offence is
that the alteration is so small that it would
normally go unnoticed. E.g. the Ziegler
case wherein a logic bomb was introduced
in the bank’s system, which deducted 10
cents from every account and deposited it
in a particular account.
Renu Verma 10
Denial of Service Tools
Denial-of-service (or DoS) attacks are usually
launched to make a particular service
unavailable to someone who is authorized to use
it. These attacks may be launched using one
single computer or many computers across the
world. In the latter scenario, the attack is
known as a distributed denial of service attack.
Usually these attacks do not necessitate the
need to get access into anyone's system.
These attacks have been getting decidedly more
popular as more and more people realize the
amount and magnitude of loss, which can be
caused through them.
Renu Verma 11
Trojan attacks
This term has its origin in the word
‘Trojan horse’. In software field this
means an unauthorized programme,
which passively gains control over
another’s system by representing itself as
an authorised programme. The most
common form of installing a Trojan is
through e-mail. E.g. a Trojan was
installed in the computer of a lady film
director in the U.S. while chatting. The
cyber criminal through the web cam
installed in the computer obtained her
nude photographs. He further harassed
this lady.
Renu Verma 12
Internet time thefts
Normally in these kinds of thefts the
Internet surfing hours of the victim are
used up by another person. This is done
by gaining access to the login ID and
the password. E.g. Colonel Bajwa’s
case- the Internet hours were used up
by any other person. This was perhaps
one of the first reported cases related
to cyber crime in India. However this
case made the police infamous as to
their lack of understanding of the
nature of cyber crime.
Renu Verma 13
Web jacking
This term is derived from the term hi jacking. In
these kinds of offences the hacker gains access
and control over the web site of another. He may
even mutilate or change the information on the
site. This may be done for fulfilling political
objectives or for money. E.g. recently the site of
MIT (Ministry of Information Technology) was
hacked by the Pakistani hackers and some
obscene matter was placed therein. Further the
site of Bombay crime branch was also web jacked.
Another case of web jacking is that of the ‘gold
fish’ case. In this case the site was hacked and
the information pertaining to gold fish was
changed. Further a ransom of US $ 1 million was
demanded as ransom. Thus web jacking is a
process where by control over the site of another
is made backed by some consideration for it.
Renu Verma 14
Email spoofing
A spoofed email is one that appears to originate from one source but
has actually emerged from another source. Falsifying the name and
/ or email address of the originator of the email usually does email
spoofing. usually to send an email the sender has to enter the
following information:
i. email address of the receiver of the email
ii. email address(es) of the person(s) who will receive a copy of the
email (referred to as CC for carbon copy)
iii. email address(es) of the person(s) who will receive a copy of the
email (referred to as CC for carbon copy, but whose identities will
not be known to the other recipients of the e-mail (known as BCC
for blind carbon copy)
iv. Subject of the message (a short title / description of the message)
v. Message
Certain web-based email services like www.SendFakeMail.com, offer a
facility wherein in addition to the above, a sender can also enter the
email address of the purported sender of the email.
Renu Verma 15
Email bombing
Email bombing refers to sending a large amount of
emails to the victim resulting in the victim's email
account (in case of an individual) or servers (in
case of a company or an email service provider)
crashing. A simple way of achieving this would be
to subscribe the victim's email address to a large
number of mailing lists. Mailing lists are special
interest groups that share and exchange
information on a common topic of interest with
one another via email. Mailing lists are very
popular and can generate a lot of daily email traffic
- depending upon the mailing list. Some generate
only a few messages per day others generate
hundreds.
Renu Verma 16
Threatening emails
Email is a useful tool for
technology savvy criminals
thanks to the relative
anonymity offered by it. It
becomes fairly easy for anyone
with even a basic knowledge of
computers to become a
blackmailer by threatening
someone via e-mail.
Renu Verma 17
Phishing
The act of sending an e-mail to a user falsely claiming to
be an established legitimate enterprise in an attempt to
scam the user into surrendering private information
that will be used for identity theft. The e-mail directs
the user to visit a Web site where they are asked to
update personal information, such as passwords and
credit card, social security, and bank account numbers,
that the legitimate organization already has. The Web
site, however, is bogus and set up only to steal the
user's information.. By spamming large groups of
people, the phisher counted on the e-mail being read by
a percentage of people who actually had listed credit
card numbers with legitimately. Phishing, also referred
to as brand spoofing or carding, is a variation on
fishing, the idea being that bait is thrown out with the
hopes that while most will ignore the bait, some will be
tempted into biting.
Renu Verma 18
Computer vandalism
Vandalism means deliberately destroying
or damaging property of another. Thus
computer vandalism may include within
its purview any kind of physical harm
done to the computer of any person.
These acts may take the form of the theft
of a computer, some part of a computer
or a peripheral attached to the computer
or by physically damaging a computer or
its peripherals.
Renu Verma 19
Trafficking
Trafficking may assume different forms. It
may be trafficking in drugs, human beings,
arms weapons etc. These forms of trafficking
are going unchecked because they are
carried on under pseudonyms. A racket was
busted in Chennai where drugs were being
sold under the pseudonym of honey.
Renu Verma 20
Renu Verma 21
Hacking
Hacking in simple terms means an illegal intrusion into a
computer system and/or network. There is an equivalent term
to hacking i.e. cracking, but from Indian Laws perspective
there is no difference between the term hacking and cracking.
Every act committed towards breaking into a computer and/or
network is hacking. Hackers write or use ready-made computer
programs to attack the target computer. They possess the
desire to destruct and they get the kick out of such
destruction. Some hackers hack for personal monetary gains,
such as to stealing the credit card information, transferring
money from various bank accounts to their own account
followed by withdrawal of money. They extort money from
some corporate giant threatening him to publish the stolen
information which is critical in nature.
Government websites are the hot targets of the hackers due to
the press coverage, it receives. Hackers enjoy the media
coverage.
Renu Verma 22
Pornography
Child Pornography
The Internet is being highly used by its
abusers to reach and abuse children
sexually, worldwide. The internet is very
fast becoming a household commodity in
India . It’s explosion has made the
children a viable victim to the cyber
crime. As more homes have access to
internet, more children would be using
the internet and more are the chances of
falling victim to the aggression of
pedophiles.
Cyber Stalking
Renu Verma 23
Cyber Stalking can be defined as the repeated
acts of harassment or threatening behavior of the
cyber criminal towards the victim by using
internet services. Stalking in General terms can
be referred to as the repeated acts of harassment
targeting the victim such as following the victim,
making harassing phone calls, killing the victims
pet, vandalizing victims property, leaving written
messages or objects. Stalking may be followed by
serious violent acts such as physical harm to the
victim and the same has to be treated and viewed
seriously. It all depends on the course of conduct
of the stalker.
Where the computer is a tool for an
unlawful act:
This kind of activity usually involves a
modification of a conventional crime by
using computers. Some examples are:
1. Financial Crimes
2. Cyber pornography
3. Sale of illegal articles
4. Online gambling
5. Intellectual Property crimes
6. Email spoofing
7. Forgery
8. Cyber Defamation
9. Cyber stalking
Renu Verma 24
Where the computer is the target for an unlawful
act:
It may be noted that in these activities the computer may also be
a tool. This kind of activity usually involves sophisticated
crimes usually out of the purview of conventional criminal
law. Some examples are:
1. Unauthorized access to computer systems or networks
2. Theft of information contained in electric form
3. Email bombing
4. Data diddling
5. Salami attacks
6. Denial of Service attack
7. Virus / Worm attacks
8. Logic bombs
9. Trojan attacks
10. Internet time thefts
11. Web jacking
12. Theft of Computer system
13. Physically damaging a computer system
Renu Verma 25
E-mail related crimes
1. Email spoofing - www.SendFakeMail.com
2. Sending malicious codes through email
(Spreading Trojans, viruses and worms)
3. Email bombing
4. Sending threatening emails
5. Defamatory emails
6. Email frauds
Renu Verma 26
Motive Behind The Crime
 Greed
 Power
 Publicity
 Revenge
 Adventure and Curiosity
 Desire to access forbidden information
 Destructive mindset
Renu Verma 27
CYBER CRIMINALS
The cyber criminals constitute of various
groups/ category. This division may be
justified on the basis of the object that
they have in their mind. The following
are the category of cyber criminals-
1. Children and adolescents between the
age group of 6 – 18 years
2. Organised hackers
3. Professional hackers / crackers
4. Discontented employees
5. Ex- Lovers
Renu Verma 28
Against Individual
Property
i. Computer vandalism
ii. Transmitting virus
iii.Net-trespass
iv. Unauthorized control/access
over computer system
v. Intellectual Property crimes
vi. Internet time thefts
Renu Verma 29
Against Organization
i. Unauthorized control/access
over computer system
ii. Possession of unauthorized
information.
iii.Cyber terrorism against the
government organization.
iv. Distribution of pirated
software etc.
Renu Verma 30
Against Society at large
1. Pornography (basically child
pornography)
2. Polluting the youth through indecent
exposure
3. Trafficking
4. Financial crimes
5. Sale of illegal articles
6. Online gambling
7. Forgery
Renu Verma 31
Combating Cyber crime-
Indian legal framework
 Information Technology Act, 2000-came into
force on 17 October 2000
 Extends to whole of India and also applies to
any offence or contravention there under
committed outside India by any person
 read with Section 75- Act applies to offence or
contravention committed outside India by any
person irrespective of his nationality, if such act
involves a computer, computer system or
network located in India
 IT Act confers legal recognition to electronic
records and digital signatures (section 4,5 of the
IT Act,2000)
Renu Verma 32
Renu Verma 33
E-mail crimes punishable under
various Indian laws
• Sending pornographic or obscene emails are punishable under
Section 67 of the IT Act.
• An offence under this section is punishable on first conviction
with imprisonment for a term, which may extend to five years
and with fine, which may extend to One lakh rupees.
• In the event of a second or subsequent conviction the
recommended punishment is imprisonment for a term, which
may extend to ten years and also with fine which may extend to
Two lakh rupees.
• Emails that are defamatory in nature are punishable under
Section 500 of the Indian Penal Code (IPC), which recommends an
imprisonment of upto two years or a fine or both.
• Threatening emails are punishable under the provisions of the
IPC pertaining to criminal intimidation, insult and annoyance
(Chapter XXII), extortion (Chapter XVII)
• Email spoofing
Email spoofing is covered under provisions of the IPC relating to
fraud, cheating by personation (Chapter XVII), forgery (Chapter
XVIII)
MERITS AND DEMERITS OF THE
CYBER TECHNOLOGY
MERITS
 Less expensive -
man power
 Compact
 Lessens the paper
work and file
maintenance
 Speedy
 Accuracy
 Connection with the
world at large
 Knowledge through
net
DEMERITS
 Expensive – up
gradation of
technology, training
 Easy access
 Complex
 Tracing
 Jurisdiction
 Training
 Awareness
Renu Verma 34
PREVENTION OF CYBER CRIME
1. to prevent cyber stalking avoid disclosing any information
pertaining to oneself. This is as good as disclosing your identity to
strangers in public place.
2. always avoid sending any photograph online particularly to
strangers and chat friends as there have been incidents of misuse of
the photographs.
3. always use latest and up date anti virus software to guard against
virus attacks.
4. always keep back up volumes so that one may not suffer data loss in
case of virus contamination
5. never send your credit card number to any site that is not secured,
to guard against frauds.
6. always keep a watch on the sites that your children are accessing to
prevent any kind of harassment or depravation in children.
7. it is better to use a security programme that gives control over the
cookies and send information back to the site as leaving the cookies
unguarded might prove fatal.
8. web site owners should watch traffic and check any irregularity on
the site. Putting host-based intrusion detection devices on servers
may do this.
9. web servers running public sites must be physically separate
protected from internal corporate network.
Renu Verma 35
Renu Verma 36
SUGGESTIONS
1. More Public awareness campaigns
2. Training of police officers
3. Proper knowledge to the Judiciary
4. More Cyber crime police cells set up across the
country
5. Effective E-surveillance
6. Websites aid in creating awareness and
encouraging reporting of cyber crime cases.
7. Specialized Training of forensic investigators and
experts
8. Active coordination between police and other law
enforcement agencies and authorities is required.
9. Proper implementation of the IT act
10. Legal awareness amongst the general public
11. Proper advertisement of the do’s and don'ts on
the net
Renu Verma 37

More Related Content

What's hot

Ddos extortion campaigns
Ddos extortion campaignsDdos extortion campaigns
Ddos extortion campaigns
Roel Palmaers
 
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
Health IT Conference – iHT2
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
vimal kumar arora
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
ACCA Global
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technology
Binu p jayan
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
Jay Visavadiya
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Rahul Neel Mani
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
kinish kumar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
cyber crime
cyber crimecyber crime
cyber crime
Nauman Ali
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
Tapan Khilar
 
Quotes about cyber security
Quotes about cyber securityQuotes about cyber security
Quotes about cyber security
TruShield Security Solutions
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
Aman Kumar
 
Cyber crime
Cyber crimeCyber crime
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Arindam Sarkar
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
isc2dfw
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
aritraranjan
 

What's hot (20)

Ddos extortion campaigns
Ddos extortion campaignsDdos extortion campaigns
Ddos extortion campaigns
 
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technology
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Quotes about cyber security
Quotes about cyber securityQuotes about cyber security
Quotes about cyber security
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to Cyber crime

Cyber crime
Cyber crimeCyber crime
Cyber crime
samuelrajueda
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Ranjana Adhikari
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
24sneha
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
Anjana Ks
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
Soreingam Ragui
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
varunbamba
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
write12
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
bkbk37
 
Computer crime
Computer crimeComputer crime
Computer crime
Istiak Niloy
 
English in written
English in writtenEnglish in written
English in written
azhar manap
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
KALPITKALPIT1
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
silas Sargunam
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
Faridah Husin
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
Mohammad Ahmed
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
Deepak Kumar (D3)
 
cyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testingcyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testing
akshayathetopper
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
ssuser24dae7
 

Similar to Cyber crime (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Computer crime
Computer crimeComputer crime
Computer crime
 
English in written
English in writtenEnglish in written
English in written
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
cyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testingcyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testing
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 

More from Renu Verma

Offer and acceptance
Offer and acceptanceOffer and acceptance
Offer and acceptance
Renu Verma
 
Free consent
Free consentFree consent
Free consent
Renu Verma
 
Consideration
ConsiderationConsideration
Consideration
Renu Verma
 
Legality of object
Legality of objectLegality of object
Legality of object
Renu Verma
 
E commerce
E commerceE commerce
E commerce
Renu Verma
 
Digital signature
Digital signatureDigital signature
Digital signature
Renu Verma
 
Offer and acceptance
Offer and acceptanceOffer and acceptance
Offer and acceptance
Renu Verma
 
Consideration
ConsiderationConsideration
Consideration
Renu Verma
 

More from Renu Verma (8)

Offer and acceptance
Offer and acceptanceOffer and acceptance
Offer and acceptance
 
Free consent
Free consentFree consent
Free consent
 
Consideration
ConsiderationConsideration
Consideration
 
Legality of object
Legality of objectLegality of object
Legality of object
 
E commerce
E commerceE commerce
E commerce
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Offer and acceptance
Offer and acceptanceOffer and acceptance
Offer and acceptance
 
Consideration
ConsiderationConsideration
Consideration
 

Recently uploaded

fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
CAAJAYKUMAR4
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
azizurrahaman17
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 

Recently uploaded (20)

fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
Understanding about ITR-1 and Documentation
Understanding about ITR-1 and DocumentationUnderstanding about ITR-1 and Documentation
Understanding about ITR-1 and Documentation
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
Tax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th semTax Law Notes on taxation law tax law for 10th sem
Tax Law Notes on taxation law tax law for 10th sem
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 

Cyber crime

  • 2. Renu Verma 2 Introduction • Computer Crime, E-Crime, Hi-Tech Crime or Electronic Crime is where a computer is the target of a crime or is the means adopted to commit a crime. • Most of these crimes are not new. Criminals simply devise different ways to undertake standard criminal activities such as fraud, theft, blackmail, forgery, and embezzlement using the new medium, often involving the Internet
  • 3. BRIEF HISTORY The first recorded cyber crime took place in the year 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime. Renu Verma 3
  • 4. CONVENTIONAL CRIME Crime is a social and economic phenomenon and is as old as the human society. Crime is a legal concept and has the sanction of the law. Crime or an offence is “a legal wrong that can be followed by criminal proceedings which may result into punishment”. The hallmark of criminality is that, it is breach of the criminal law. Per Lord Atkin “the criminal quality of an act cannot be discovered by reference to any standard but one: is the act prohibited with penal consequences”. A crime may be said to be any conduct accompanied by act or omission prohibited by law and consequential breach of which is visited by penal consequences. Renu Verma 4
  • 5. Defining Cyber Crime : A simple yet sturdy definition of cyber crime would be "unlawful acts wherein the computer is either a tool or a target or both". Renu Verma 5
  • 6. REASONS FOR CYBER CRIME 1. Capacity to store data in comparatively small space 2. Easy to access 3.Complex 4.Negligence / Human error 5. Loss of evidence for tracing Renu Verma 6
  • 7. Viruses A computer virus is a computer program that can infect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of it. Note that a program does not have to perform outright damage (such as deleting or corrupting files) in order to be called a "virus". Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Renu Verma 7
  • 8. Worm attacks Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory. Renu Verma 8
  • 9. Logic bombs These are event dependent programs. This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs. E.g. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date. Renu Verma 9
  • 10. Salami attacks This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed. E.g. the Ziegler case wherein a logic bomb was introduced in the bank’s system, which deducted 10 cents from every account and deposited it in a particular account. Renu Verma 10
  • 11. Denial of Service Tools Denial-of-service (or DoS) attacks are usually launched to make a particular service unavailable to someone who is authorized to use it. These attacks may be launched using one single computer or many computers across the world. In the latter scenario, the attack is known as a distributed denial of service attack. Usually these attacks do not necessitate the need to get access into anyone's system. These attacks have been getting decidedly more popular as more and more people realize the amount and magnitude of loss, which can be caused through them. Renu Verma 11
  • 12. Trojan attacks This term has its origin in the word ‘Trojan horse’. In software field this means an unauthorized programme, which passively gains control over another’s system by representing itself as an authorised programme. The most common form of installing a Trojan is through e-mail. E.g. a Trojan was installed in the computer of a lady film director in the U.S. while chatting. The cyber criminal through the web cam installed in the computer obtained her nude photographs. He further harassed this lady. Renu Verma 12
  • 13. Internet time thefts Normally in these kinds of thefts the Internet surfing hours of the victim are used up by another person. This is done by gaining access to the login ID and the password. E.g. Colonel Bajwa’s case- the Internet hours were used up by any other person. This was perhaps one of the first reported cases related to cyber crime in India. However this case made the police infamous as to their lack of understanding of the nature of cyber crime. Renu Verma 13
  • 14. Web jacking This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the web site of another. He may even mutilate or change the information on the site. This may be done for fulfilling political objectives or for money. E.g. recently the site of MIT (Ministry of Information Technology) was hacked by the Pakistani hackers and some obscene matter was placed therein. Further the site of Bombay crime branch was also web jacked. Another case of web jacking is that of the ‘gold fish’ case. In this case the site was hacked and the information pertaining to gold fish was changed. Further a ransom of US $ 1 million was demanded as ransom. Thus web jacking is a process where by control over the site of another is made backed by some consideration for it. Renu Verma 14
  • 15. Email spoofing A spoofed email is one that appears to originate from one source but has actually emerged from another source. Falsifying the name and / or email address of the originator of the email usually does email spoofing. usually to send an email the sender has to enter the following information: i. email address of the receiver of the email ii. email address(es) of the person(s) who will receive a copy of the email (referred to as CC for carbon copy) iii. email address(es) of the person(s) who will receive a copy of the email (referred to as CC for carbon copy, but whose identities will not be known to the other recipients of the e-mail (known as BCC for blind carbon copy) iv. Subject of the message (a short title / description of the message) v. Message Certain web-based email services like www.SendFakeMail.com, offer a facility wherein in addition to the above, a sender can also enter the email address of the purported sender of the email. Renu Verma 15
  • 16. Email bombing Email bombing refers to sending a large amount of emails to the victim resulting in the victim's email account (in case of an individual) or servers (in case of a company or an email service provider) crashing. A simple way of achieving this would be to subscribe the victim's email address to a large number of mailing lists. Mailing lists are special interest groups that share and exchange information on a common topic of interest with one another via email. Mailing lists are very popular and can generate a lot of daily email traffic - depending upon the mailing list. Some generate only a few messages per day others generate hundreds. Renu Verma 16
  • 17. Threatening emails Email is a useful tool for technology savvy criminals thanks to the relative anonymity offered by it. It becomes fairly easy for anyone with even a basic knowledge of computers to become a blackmailer by threatening someone via e-mail. Renu Verma 17
  • 18. Phishing The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user's information.. By spamming large groups of people, the phisher counted on the e-mail being read by a percentage of people who actually had listed credit card numbers with legitimately. Phishing, also referred to as brand spoofing or carding, is a variation on fishing, the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting. Renu Verma 18
  • 19. Computer vandalism Vandalism means deliberately destroying or damaging property of another. Thus computer vandalism may include within its purview any kind of physical harm done to the computer of any person. These acts may take the form of the theft of a computer, some part of a computer or a peripheral attached to the computer or by physically damaging a computer or its peripherals. Renu Verma 19
  • 20. Trafficking Trafficking may assume different forms. It may be trafficking in drugs, human beings, arms weapons etc. These forms of trafficking are going unchecked because they are carried on under pseudonyms. A racket was busted in Chennai where drugs were being sold under the pseudonym of honey. Renu Verma 20
  • 21. Renu Verma 21 Hacking Hacking in simple terms means an illegal intrusion into a computer system and/or network. There is an equivalent term to hacking i.e. cracking, but from Indian Laws perspective there is no difference between the term hacking and cracking. Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. They possess the desire to destruct and they get the kick out of such destruction. Some hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money. They extort money from some corporate giant threatening him to publish the stolen information which is critical in nature. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.
  • 22. Renu Verma 22 Pornography Child Pornography The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. The internet is very fast becoming a household commodity in India . It’s explosion has made the children a viable victim to the cyber crime. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles.
  • 23. Cyber Stalking Renu Verma 23 Cyber Stalking can be defined as the repeated acts of harassment or threatening behavior of the cyber criminal towards the victim by using internet services. Stalking in General terms can be referred to as the repeated acts of harassment targeting the victim such as following the victim, making harassing phone calls, killing the victims pet, vandalizing victims property, leaving written messages or objects. Stalking may be followed by serious violent acts such as physical harm to the victim and the same has to be treated and viewed seriously. It all depends on the course of conduct of the stalker.
  • 24. Where the computer is a tool for an unlawful act: This kind of activity usually involves a modification of a conventional crime by using computers. Some examples are: 1. Financial Crimes 2. Cyber pornography 3. Sale of illegal articles 4. Online gambling 5. Intellectual Property crimes 6. Email spoofing 7. Forgery 8. Cyber Defamation 9. Cyber stalking Renu Verma 24
  • 25. Where the computer is the target for an unlawful act: It may be noted that in these activities the computer may also be a tool. This kind of activity usually involves sophisticated crimes usually out of the purview of conventional criminal law. Some examples are: 1. Unauthorized access to computer systems or networks 2. Theft of information contained in electric form 3. Email bombing 4. Data diddling 5. Salami attacks 6. Denial of Service attack 7. Virus / Worm attacks 8. Logic bombs 9. Trojan attacks 10. Internet time thefts 11. Web jacking 12. Theft of Computer system 13. Physically damaging a computer system Renu Verma 25
  • 26. E-mail related crimes 1. Email spoofing - www.SendFakeMail.com 2. Sending malicious codes through email (Spreading Trojans, viruses and worms) 3. Email bombing 4. Sending threatening emails 5. Defamatory emails 6. Email frauds Renu Verma 26
  • 27. Motive Behind The Crime  Greed  Power  Publicity  Revenge  Adventure and Curiosity  Desire to access forbidden information  Destructive mindset Renu Verma 27
  • 28. CYBER CRIMINALS The cyber criminals constitute of various groups/ category. This division may be justified on the basis of the object that they have in their mind. The following are the category of cyber criminals- 1. Children and adolescents between the age group of 6 – 18 years 2. Organised hackers 3. Professional hackers / crackers 4. Discontented employees 5. Ex- Lovers Renu Verma 28
  • 29. Against Individual Property i. Computer vandalism ii. Transmitting virus iii.Net-trespass iv. Unauthorized control/access over computer system v. Intellectual Property crimes vi. Internet time thefts Renu Verma 29
  • 30. Against Organization i. Unauthorized control/access over computer system ii. Possession of unauthorized information. iii.Cyber terrorism against the government organization. iv. Distribution of pirated software etc. Renu Verma 30
  • 31. Against Society at large 1. Pornography (basically child pornography) 2. Polluting the youth through indecent exposure 3. Trafficking 4. Financial crimes 5. Sale of illegal articles 6. Online gambling 7. Forgery Renu Verma 31
  • 32. Combating Cyber crime- Indian legal framework  Information Technology Act, 2000-came into force on 17 October 2000  Extends to whole of India and also applies to any offence or contravention there under committed outside India by any person  read with Section 75- Act applies to offence or contravention committed outside India by any person irrespective of his nationality, if such act involves a computer, computer system or network located in India  IT Act confers legal recognition to electronic records and digital signatures (section 4,5 of the IT Act,2000) Renu Verma 32
  • 33. Renu Verma 33 E-mail crimes punishable under various Indian laws • Sending pornographic or obscene emails are punishable under Section 67 of the IT Act. • An offence under this section is punishable on first conviction with imprisonment for a term, which may extend to five years and with fine, which may extend to One lakh rupees. • In the event of a second or subsequent conviction the recommended punishment is imprisonment for a term, which may extend to ten years and also with fine which may extend to Two lakh rupees. • Emails that are defamatory in nature are punishable under Section 500 of the Indian Penal Code (IPC), which recommends an imprisonment of upto two years or a fine or both. • Threatening emails are punishable under the provisions of the IPC pertaining to criminal intimidation, insult and annoyance (Chapter XXII), extortion (Chapter XVII) • Email spoofing Email spoofing is covered under provisions of the IPC relating to fraud, cheating by personation (Chapter XVII), forgery (Chapter XVIII)
  • 34. MERITS AND DEMERITS OF THE CYBER TECHNOLOGY MERITS  Less expensive - man power  Compact  Lessens the paper work and file maintenance  Speedy  Accuracy  Connection with the world at large  Knowledge through net DEMERITS  Expensive – up gradation of technology, training  Easy access  Complex  Tracing  Jurisdiction  Training  Awareness Renu Verma 34
  • 35. PREVENTION OF CYBER CRIME 1. to prevent cyber stalking avoid disclosing any information pertaining to oneself. This is as good as disclosing your identity to strangers in public place. 2. always avoid sending any photograph online particularly to strangers and chat friends as there have been incidents of misuse of the photographs. 3. always use latest and up date anti virus software to guard against virus attacks. 4. always keep back up volumes so that one may not suffer data loss in case of virus contamination 5. never send your credit card number to any site that is not secured, to guard against frauds. 6. always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children. 7. it is better to use a security programme that gives control over the cookies and send information back to the site as leaving the cookies unguarded might prove fatal. 8. web site owners should watch traffic and check any irregularity on the site. Putting host-based intrusion detection devices on servers may do this. 9. web servers running public sites must be physically separate protected from internal corporate network. Renu Verma 35
  • 36. Renu Verma 36 SUGGESTIONS 1. More Public awareness campaigns 2. Training of police officers 3. Proper knowledge to the Judiciary 4. More Cyber crime police cells set up across the country 5. Effective E-surveillance 6. Websites aid in creating awareness and encouraging reporting of cyber crime cases. 7. Specialized Training of forensic investigators and experts 8. Active coordination between police and other law enforcement agencies and authorities is required. 9. Proper implementation of the IT act 10. Legal awareness amongst the general public 11. Proper advertisement of the do’s and don'ts on the net