The document provides an overview of cyber crimes and the history of cyber crimes. It discusses how the first recorded cyber crime took place in 1820 when employees committed sabotage against a textile manufacturer who had introduced a new loom technology that threatened their jobs. It then covers various types of cyber crimes including viruses, worms, logic bombs, salami attacks, denial of service attacks, Trojan attacks, and more. It also discusses cyber crimes like hacking, cyber stalking, pornography, and trafficking. The document examines cyber crimes from individual, organizational, and societal perspectives and outlines India's legal framework for combating cyber crimes through the Information Technology Act of 2000.
This document discusses cyber crime and security. It begins by defining cyber crime as any criminal act dealing with computers and networks, including traditional crimes conducted online. The document then covers the history of cyber crime, categories of cyber crime such as those against persons, property, and government. It discusses various types of cyber crimes like hacking, computer vandalism, DoS attacks, and their impact. The document also covers cyber security, ethics, laws, and tips for staying safe online.
The document discusses cyber crime and cyber security. It defines cyber crime as crimes committed using computers and the internet. It then covers the history and evolution of cyber threats. It categorizes cyber crimes as those using computers as targets or weapons. It discusses common types of cyber crimes like hacking, denial of service attacks, and computer vandalism. The document also provides safety tips for preventing cyber crimes and advantages of cyber security. It concludes by stating that technology itself is not the problem but how humans use it.
Cyber crime and security discusses the growth of internet usage in India and the rise of cyber crimes. It defines cyber crime as illegal activity committed using computers and the internet, with the first recorded crime in 1820. The document outlines the evolution of cyber threats and categories cyber crimes as those using computers as targets or weapons. It provides examples of common cyber crimes like hacking, denial of service attacks, and software piracy. The document concludes that technology can be destructive if not used responsibly and outlines the importance of cyber security.
The document discusses cyber laws in India, specifically the Information Technology Act of 2000. It provides an overview of cyber crimes and security strategies, then summarizes the objectives and key provisions of the IT Act, including sections related to hacking, data theft, and compensation. The Act aims to recognize electronic transactions and digital signatures legally and facilitate online banking and commerce. However, challenges remain in identifying cyber criminals and lack of skilled law enforcement to deal with computer crimes.
The document discusses various types of cybercrimes. It begins by defining cybercrime as crimes occurring in cyberspace, also known as computer-related crimes. It then categorizes cybercrimes into three types: crimes where the computer is the target, where it is used as a tool, and where it plays a minor role. Various examples of specific cybercrimes are then outlined such as hacking, phishing, malware attacks, and financial crimes. The history and evolution of cybercrime from early computer crimes to modern internet-based crimes is also summarized.
ERAU webinar november 2016 cyber security Bill Gibbs
This document summarizes a presentation on cybersecurity challenges and solutions. The presentation covered: (1) the current cybersecurity landscape and challenges such as volume of emails/data, variety of malware, and vulnerabilities in software; (2) solutions such as frequent software updates, unique passwords, caution online, and routine backups; and (3) areas needing further work like attribution of attacks, developing creative cybersecurity personnel, and securing emerging technologies like electronic flight bags. The presentation concluded by encouraging questions and announcing upcoming related webinars.
This document discusses cyber crime and provides information on the topic. It begins with defining cyber crime as unlawful acts using computers and the internet, where the computer is either a tool, target, or both. It then gives a brief history of cyber crimes dating back to the early 1800s. The document categorizes cyber crimes as those where the computer is the target or weapon, and provides examples of types of cyber crimes like hacking, virus dissemination, cyber terrorism, and software piracy. It concludes with safety tips for preventing cyber crimes like using antivirus software and strong passwords.
This document discusses types of cyber crimes such as hacking, denial of service attacks, and software piracy. It notes that cyber crime is increasing and lists members of the Strategic Alliance Cyber Crime Working Group such as the Royal Canadian Mounted Police and FBI. The document poses discussion questions about experiences with cyber crime and how to protect network environments from cyber threats.
This document discusses cyber crime and security. It begins by defining cyber crime as any criminal act dealing with computers and networks, including traditional crimes conducted online. The document then covers the history of cyber crime, categories of cyber crime such as those against persons, property, and government. It discusses various types of cyber crimes like hacking, computer vandalism, DoS attacks, and their impact. The document also covers cyber security, ethics, laws, and tips for staying safe online.
The document discusses cyber crime and cyber security. It defines cyber crime as crimes committed using computers and the internet. It then covers the history and evolution of cyber threats. It categorizes cyber crimes as those using computers as targets or weapons. It discusses common types of cyber crimes like hacking, denial of service attacks, and computer vandalism. The document also provides safety tips for preventing cyber crimes and advantages of cyber security. It concludes by stating that technology itself is not the problem but how humans use it.
Cyber crime and security discusses the growth of internet usage in India and the rise of cyber crimes. It defines cyber crime as illegal activity committed using computers and the internet, with the first recorded crime in 1820. The document outlines the evolution of cyber threats and categories cyber crimes as those using computers as targets or weapons. It provides examples of common cyber crimes like hacking, denial of service attacks, and software piracy. The document concludes that technology can be destructive if not used responsibly and outlines the importance of cyber security.
The document discusses cyber laws in India, specifically the Information Technology Act of 2000. It provides an overview of cyber crimes and security strategies, then summarizes the objectives and key provisions of the IT Act, including sections related to hacking, data theft, and compensation. The Act aims to recognize electronic transactions and digital signatures legally and facilitate online banking and commerce. However, challenges remain in identifying cyber criminals and lack of skilled law enforcement to deal with computer crimes.
The document discusses various types of cybercrimes. It begins by defining cybercrime as crimes occurring in cyberspace, also known as computer-related crimes. It then categorizes cybercrimes into three types: crimes where the computer is the target, where it is used as a tool, and where it plays a minor role. Various examples of specific cybercrimes are then outlined such as hacking, phishing, malware attacks, and financial crimes. The history and evolution of cybercrime from early computer crimes to modern internet-based crimes is also summarized.
ERAU webinar november 2016 cyber security Bill Gibbs
This document summarizes a presentation on cybersecurity challenges and solutions. The presentation covered: (1) the current cybersecurity landscape and challenges such as volume of emails/data, variety of malware, and vulnerabilities in software; (2) solutions such as frequent software updates, unique passwords, caution online, and routine backups; and (3) areas needing further work like attribution of attacks, developing creative cybersecurity personnel, and securing emerging technologies like electronic flight bags. The presentation concluded by encouraging questions and announcing upcoming related webinars.
This document discusses cyber crime and provides information on the topic. It begins with defining cyber crime as unlawful acts using computers and the internet, where the computer is either a tool, target, or both. It then gives a brief history of cyber crimes dating back to the early 1800s. The document categorizes cyber crimes as those where the computer is the target or weapon, and provides examples of types of cyber crimes like hacking, virus dissemination, cyber terrorism, and software piracy. It concludes with safety tips for preventing cyber crimes like using antivirus software and strong passwords.
This document discusses types of cyber crimes such as hacking, denial of service attacks, and software piracy. It notes that cyber crime is increasing and lists members of the Strategic Alliance Cyber Crime Working Group such as the Royal Canadian Mounted Police and FBI. The document poses discussion questions about experiences with cyber crime and how to protect network environments from cyber threats.
DD4BC is a threat actor that has launched numerous DDoS extortion campaigns since 2014, primarily targeting Bitcoin-related organizations and financial institutions. DD4BC demands payment in Bitcoin to stop DDoS attacks, which can reach speeds of 60Gbps. Their typical process involves an initial unannounced attack followed by extortion emails with increasing payment demands if the victim does not pay or adequately defend themselves. While DD4BC has attacked a wide range of targets, they usually focus on fringe businesses that may be reluctant to work with law enforcement.
Cybercrime and its effects on personal life who uses internet vimal kumar arora
This document defines cyber crime and discusses its history, evolution, categories, types and prevention. Cyber crime involves using computers and the internet to steal data or commit other illegal acts. The summary defines it as crimes committed using computers as objects or subjects, then discusses how threats have evolved over time. Categories include computers as targets and weapons, while common types are hacking, viruses, phishing, vandalism, terrorism, piracy and fraud. Prevention methods like antivirus software, firewalls and secure online practices are recommended.
This document discusses cyber crime, including its definition, history, categories, and types. It defines cyber crime as any criminal activity involving computers and networks. The first recorded cyber crime took place in 1820. Common types of cyber crimes include hacking, virus dissemination, denial of service attacks, computer vandalism, cyber terrorism, and software piracy. The document provides statistics on types of cyber attacks and recommends safety tips to prevent cyber crime, such as using antivirus software and firewalls.
This document discusses cyber crimes and provides information about a student group project on the topic. The group members are listed along with their student IDs. Cyber crimes are defined as offenses committed using a computer against individuals to harm their reputation or cause physical/mental harm. The document then discusses the history and evolution of the term "hacker" and reasons for studying cyber crimes such as most business now being done online. Common cyber criminal profiles and attacks such as hacking, cracking, and phishing are described. The document concludes with an overview of cyber crimes occurring in Pakistan and some general prevention methods.
This document summarizes a seminar on cyber crime technology presented by Rahul js. It first defines cyber crime as unlawful acts involving computers as tools or targets under the Information Technology Act. It then outlines three major categories of cyber crimes: against persons, property, and government. Specific cyber crimes discussed include cyber harassment, computer vandalism, and cyber terrorism. The document also examines botnet and phishing technologies used to enable cyber crimes, describing botnet lifecycles and how phishing scams acquire sensitive information from users. Prevention methods for both botnet infections and phishing are proposed.
The document discusses types of cyber crimes. It provides an introduction to the topic and defines cyber crime. It then lists 15 common types of cyber crimes such as hacking, denial of service attacks, software piracy, and credit card fraud. For each crime type, it briefly explains how the crime is committed and provides examples. The document aims to educate readers about the different ways cyber crimes are carried out and the various victims that are targeted.
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
Internet of Things “IoT” can be defined as physical objects that connect to the internet through embedded systems and sensors, interacting with it to generate meaningful results and convenience to the end-user community. According to industry estimates, machine-to-machine communications
alone will generate approximately US$900 billion in revenues by 2020.
Cyber crime detection involves three steps:
1. Analyzing email headers to find the IP address and identify the ISP of the sender.
2. Contacting the ISP using search engines like nic.com to obtain address and phone number associated with the IP address.
3. Apprehending the criminal using conventional police methods once their identity is known.
The Information Technology Act of 2000 is India's law dealing with cyber crimes. It defines offenses related to hacking, data alteration, publishing obscene content, breach of privacy and confidentiality, and more. The Act empowers authorities to investigate cyber crimes.
Cybercrime is on the rise globally and in India. India ranks 11th in the world for cybercrime, constituting 3% of global cybercrime. Common cybercrimes in India include denial of service attacks, website defacement, spam, computer viruses, pornography, cyber squatting, cyber stalking, and phishing. While Indian laws against cybercrime are well-drafted, enforcement has been lacking, with few arrests compared to the number of reported cases. Increased internet and technology use in India has contributed to higher cybercrime rates in recent years. Stronger enforcement is needed to curb the growth of cybercrimes in India.
This document discusses various types of cyber crimes including hacking, viruses, software piracy, and phishing. It defines different types of hackers such as white hat, black hat, and grey hat hackers. It also explains different cyber crimes like hacking, viruses, software privacy, IRC crime, phishing, cyber stalking, and salami attack. Finally, it provides some general preventions against cyber crimes like using spam blockers, firewall protection, anti-virus software, exercising caution in providing personal information, secure online shopping, and monitoring online activities.
This document provides an overview of cyber crime and security. It defines cyber crime as illegal activity committed on the internet, such as stealing data or importing malware. The document then covers the history and evolution of cyber threats. It categorizes cyber crimes as those using the computer as a target or weapon. Specific types of cyber crimes discussed include hacking, denial of service attacks, virus dissemination, computer vandalism, cyber terrorism, and software piracy. The document concludes by emphasizing the importance of cyber security.
Cybercrime a growing threat of 21 st century !!!Asma Hossain
Cybercrime is a growing threat in the 21st century. It refers to criminal activities conducted using computers and technology. The first recorded cybercrime occurred in 1820, and cybercrime has evolved over time with new technologies. Cybercrime can target individuals, property, organizations, and society. Common cybercrimes include hacking, phishing, and spreading viruses. While no prevention method can eliminate cybercrime, education and using security software, backups, and firewalls can help reduce risks. International cooperation is needed to address cybercrime challenges.
Cyber crime & security final tapanTapan Khilar
This document discusses various types of cybercrimes and the relevant laws in India. It defines cybercrimes as crimes that involve computers and the internet. The key points covered are:
- Types of cybercrimes include hacking, phishing, computer viruses, cyber pornography, denial of service attacks, and software piracy.
- The Indian IT Act 2000 is the main law governing cybercrimes and has sections dealing with hacking, data alteration, unauthorized access, and publishing obscene material.
- Other relevant laws include the IPC for offenses like fraud, forgery and criminal breach of trust.
- Investigating cybercrimes involves computer forensics to preserve digital evidence that can be accepted in
Cyber crime is a fast-growing area of crime. More and more criminals are exploiting the speed, convenience and anonymity of the Internet to commit a diverse range of criminal activities that know no borders, either physical or virtual, cause serious harm and pose very real threats to victims worldwide.
Cybercrime involves using computers to commit illegal activities and can take many forms. The document discusses the history and categories of cybercrime, including hacking, denial of service attacks, and software piracy. It also covers cyber security advantages like defending against hacks and viruses, and safety tips such as using antivirus software and firewalls. Pakistan has cyber laws and an agency to control cybercrime. In conclusion, cybercrime will likely continue evolving, so cyber security is needed to help protect users.
Cyber crime is a growing problem as more activities move online. There are many types of cyber crimes, including hacking, identity theft, and cyberbullying. Cyber criminals operate in organized networks similar to businesses, with different roles like leaders, engineers, and money mules. They are motivated by profit and use various technical methods and resources to attack networks and systems. Governments struggle to combat cyber crime due to its global and anonymous nature online.
Michael Saylor is the executive director of Cyber Defense Labs at UT Dallas. The document discusses current cyber security trends and emerging threats. Recent trends in 2013 included an increase in attacks with web and social engineering components as well as politically motivated DDoS attacks. Mobile devices and applications are increasingly being targeted, as are advanced persistent threats from groups like China's APT1. Emerging threats discussed include the potential for increased cyber crime and terrorism from groups funded by drug cartels and foreign states. The document recommends best practices for organizations like user education, monitoring, encryption, and frequent security assessments.
Cyber crime is evolving from traditional organized crime to include online criminal activities. The document defines cyber crime and categories it into crimes against persons, property, government and society. It discusses the weapons used in cyber crimes such as hacking, viruses, and phishing. India is experiencing increased cyber crime due to its growing internet user base, and the document provides statistics on common cyber crimes in India as well as safety tips and cyber security measures.
Cyber crime refers to criminal acts that involve computers and computer networks. This includes hacking, uploading obscene content, sending obscene emails, hacking bank accounts, and other crimes where computers played an instrumental role. Cyber crime has not been clearly defined in Indian law. Some common cyber crimes include unauthorized access to computer systems or networks, theft of electronic information, email bombing, data alteration, denial of service attacks, virus/worm attacks, and hijacking of websites. Reasons for the vulnerability of computers to cyber crimes include their ability to store large amounts of data in small spaces, easy accessibility, complex nature, potential for human error and negligence, and loss of electronic evidence.
The document discusses cyber crime and distinguishes it from conventional crime. Cyber crime involves unlawful acts where a computer is used as a tool or target. Common cyber crimes include hacking, theft of electronic information, email spoofing, computer viruses, and cyber terrorism against organizations. The reasons for cyber crime include the vulnerability of computers due to their storage capacity, easy accessibility, complexity, and potential for human negligence. Cyber criminals can include children, organized hackers, professional hackers, and discontented employees. The document also discusses different modes of committing cyber crimes like unauthorized access, denial of service attacks, and intellectual property violations.
DD4BC is a threat actor that has launched numerous DDoS extortion campaigns since 2014, primarily targeting Bitcoin-related organizations and financial institutions. DD4BC demands payment in Bitcoin to stop DDoS attacks, which can reach speeds of 60Gbps. Their typical process involves an initial unannounced attack followed by extortion emails with increasing payment demands if the victim does not pay or adequately defend themselves. While DD4BC has attacked a wide range of targets, they usually focus on fringe businesses that may be reluctant to work with law enforcement.
Cybercrime and its effects on personal life who uses internet vimal kumar arora
This document defines cyber crime and discusses its history, evolution, categories, types and prevention. Cyber crime involves using computers and the internet to steal data or commit other illegal acts. The summary defines it as crimes committed using computers as objects or subjects, then discusses how threats have evolved over time. Categories include computers as targets and weapons, while common types are hacking, viruses, phishing, vandalism, terrorism, piracy and fraud. Prevention methods like antivirus software, firewalls and secure online practices are recommended.
This document discusses cyber crime, including its definition, history, categories, and types. It defines cyber crime as any criminal activity involving computers and networks. The first recorded cyber crime took place in 1820. Common types of cyber crimes include hacking, virus dissemination, denial of service attacks, computer vandalism, cyber terrorism, and software piracy. The document provides statistics on types of cyber attacks and recommends safety tips to prevent cyber crime, such as using antivirus software and firewalls.
This document discusses cyber crimes and provides information about a student group project on the topic. The group members are listed along with their student IDs. Cyber crimes are defined as offenses committed using a computer against individuals to harm their reputation or cause physical/mental harm. The document then discusses the history and evolution of the term "hacker" and reasons for studying cyber crimes such as most business now being done online. Common cyber criminal profiles and attacks such as hacking, cracking, and phishing are described. The document concludes with an overview of cyber crimes occurring in Pakistan and some general prevention methods.
This document summarizes a seminar on cyber crime technology presented by Rahul js. It first defines cyber crime as unlawful acts involving computers as tools or targets under the Information Technology Act. It then outlines three major categories of cyber crimes: against persons, property, and government. Specific cyber crimes discussed include cyber harassment, computer vandalism, and cyber terrorism. The document also examines botnet and phishing technologies used to enable cyber crimes, describing botnet lifecycles and how phishing scams acquire sensitive information from users. Prevention methods for both botnet infections and phishing are proposed.
The document discusses types of cyber crimes. It provides an introduction to the topic and defines cyber crime. It then lists 15 common types of cyber crimes such as hacking, denial of service attacks, software piracy, and credit card fraud. For each crime type, it briefly explains how the crime is committed and provides examples. The document aims to educate readers about the different ways cyber crimes are carried out and the various victims that are targeted.
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
Internet of Things “IoT” can be defined as physical objects that connect to the internet through embedded systems and sensors, interacting with it to generate meaningful results and convenience to the end-user community. According to industry estimates, machine-to-machine communications
alone will generate approximately US$900 billion in revenues by 2020.
Cyber crime detection involves three steps:
1. Analyzing email headers to find the IP address and identify the ISP of the sender.
2. Contacting the ISP using search engines like nic.com to obtain address and phone number associated with the IP address.
3. Apprehending the criminal using conventional police methods once their identity is known.
The Information Technology Act of 2000 is India's law dealing with cyber crimes. It defines offenses related to hacking, data alteration, publishing obscene content, breach of privacy and confidentiality, and more. The Act empowers authorities to investigate cyber crimes.
Cybercrime is on the rise globally and in India. India ranks 11th in the world for cybercrime, constituting 3% of global cybercrime. Common cybercrimes in India include denial of service attacks, website defacement, spam, computer viruses, pornography, cyber squatting, cyber stalking, and phishing. While Indian laws against cybercrime are well-drafted, enforcement has been lacking, with few arrests compared to the number of reported cases. Increased internet and technology use in India has contributed to higher cybercrime rates in recent years. Stronger enforcement is needed to curb the growth of cybercrimes in India.
This document discusses various types of cyber crimes including hacking, viruses, software piracy, and phishing. It defines different types of hackers such as white hat, black hat, and grey hat hackers. It also explains different cyber crimes like hacking, viruses, software privacy, IRC crime, phishing, cyber stalking, and salami attack. Finally, it provides some general preventions against cyber crimes like using spam blockers, firewall protection, anti-virus software, exercising caution in providing personal information, secure online shopping, and monitoring online activities.
This document provides an overview of cyber crime and security. It defines cyber crime as illegal activity committed on the internet, such as stealing data or importing malware. The document then covers the history and evolution of cyber threats. It categorizes cyber crimes as those using the computer as a target or weapon. Specific types of cyber crimes discussed include hacking, denial of service attacks, virus dissemination, computer vandalism, cyber terrorism, and software piracy. The document concludes by emphasizing the importance of cyber security.
Cybercrime a growing threat of 21 st century !!!Asma Hossain
Cybercrime is a growing threat in the 21st century. It refers to criminal activities conducted using computers and technology. The first recorded cybercrime occurred in 1820, and cybercrime has evolved over time with new technologies. Cybercrime can target individuals, property, organizations, and society. Common cybercrimes include hacking, phishing, and spreading viruses. While no prevention method can eliminate cybercrime, education and using security software, backups, and firewalls can help reduce risks. International cooperation is needed to address cybercrime challenges.
Cyber crime & security final tapanTapan Khilar
This document discusses various types of cybercrimes and the relevant laws in India. It defines cybercrimes as crimes that involve computers and the internet. The key points covered are:
- Types of cybercrimes include hacking, phishing, computer viruses, cyber pornography, denial of service attacks, and software piracy.
- The Indian IT Act 2000 is the main law governing cybercrimes and has sections dealing with hacking, data alteration, unauthorized access, and publishing obscene material.
- Other relevant laws include the IPC for offenses like fraud, forgery and criminal breach of trust.
- Investigating cybercrimes involves computer forensics to preserve digital evidence that can be accepted in
Cyber crime is a fast-growing area of crime. More and more criminals are exploiting the speed, convenience and anonymity of the Internet to commit a diverse range of criminal activities that know no borders, either physical or virtual, cause serious harm and pose very real threats to victims worldwide.
Cybercrime involves using computers to commit illegal activities and can take many forms. The document discusses the history and categories of cybercrime, including hacking, denial of service attacks, and software piracy. It also covers cyber security advantages like defending against hacks and viruses, and safety tips such as using antivirus software and firewalls. Pakistan has cyber laws and an agency to control cybercrime. In conclusion, cybercrime will likely continue evolving, so cyber security is needed to help protect users.
Cyber crime is a growing problem as more activities move online. There are many types of cyber crimes, including hacking, identity theft, and cyberbullying. Cyber criminals operate in organized networks similar to businesses, with different roles like leaders, engineers, and money mules. They are motivated by profit and use various technical methods and resources to attack networks and systems. Governments struggle to combat cyber crime due to its global and anonymous nature online.
Michael Saylor is the executive director of Cyber Defense Labs at UT Dallas. The document discusses current cyber security trends and emerging threats. Recent trends in 2013 included an increase in attacks with web and social engineering components as well as politically motivated DDoS attacks. Mobile devices and applications are increasingly being targeted, as are advanced persistent threats from groups like China's APT1. Emerging threats discussed include the potential for increased cyber crime and terrorism from groups funded by drug cartels and foreign states. The document recommends best practices for organizations like user education, monitoring, encryption, and frequent security assessments.
Cyber crime is evolving from traditional organized crime to include online criminal activities. The document defines cyber crime and categories it into crimes against persons, property, government and society. It discusses the weapons used in cyber crimes such as hacking, viruses, and phishing. India is experiencing increased cyber crime due to its growing internet user base, and the document provides statistics on common cyber crimes in India as well as safety tips and cyber security measures.
Cyber crime refers to criminal acts that involve computers and computer networks. This includes hacking, uploading obscene content, sending obscene emails, hacking bank accounts, and other crimes where computers played an instrumental role. Cyber crime has not been clearly defined in Indian law. Some common cyber crimes include unauthorized access to computer systems or networks, theft of electronic information, email bombing, data alteration, denial of service attacks, virus/worm attacks, and hijacking of websites. Reasons for the vulnerability of computers to cyber crimes include their ability to store large amounts of data in small spaces, easy accessibility, complex nature, potential for human error and negligence, and loss of electronic evidence.
The document discusses cyber crime and distinguishes it from conventional crime. Cyber crime involves unlawful acts where a computer is used as a tool or target. Common cyber crimes include hacking, theft of electronic information, email spoofing, computer viruses, and cyber terrorism against organizations. The reasons for cyber crime include the vulnerability of computers due to their storage capacity, easy accessibility, complexity, and potential for human negligence. Cyber criminals can include children, organized hackers, professional hackers, and discontented employees. The document also discusses different modes of committing cyber crimes like unauthorized access, denial of service attacks, and intellectual property violations.
This document discusses computer and cyber crimes. It defines computer crimes as illegal acts performed by hackers to steal private information from companies or individuals. Cyber crimes are crimes that involve computers and networks, where the computer may be used to enable criminal acts or be the target. Various types of cyber crimes are discussed such as cyber stalking, cyber pornography, intellectual property crimes, and computer vandalism. Computer forensics and tools for investigating cyber crimes are also mentioned.
The document discusses the history and types of cybercrimes. It begins by defining cybercrime as unlawful acts where a computer is used as a tool or target. Two main types are discussed: computer as target (hacking, viruses, DOS attacks) and computer as weapon (cyber terrorism, fraud). The document then covers technical aspects of various cybercrimes like unauthorized access, trojans, viruses/worms, and denial of service attacks. It concludes with a brief history noting the first recorded cybercrime occurred in 1820 and early viruses/spam emerged in the 1980s as personal computers became more common.
The document discusses conventional crimes and cyber crimes. It defines conventional crime as acts that breach criminal law. Cyber crimes involve using computers as tools or targets to commit unlawful acts. Some key differences are the involvement of computers and virtual mediums in cyber crimes. Common cyber crimes include unauthorized access, data theft, viruses, hacking, cyber stalking, and cyber terrorism. Cyber criminals can be organized groups, hackers, or discontented individuals. The document provides detailed descriptions and examples of various cyber crimes.
The document discusses cybercrime and its definitions. It covers types of cybercrimes such as those against individuals, property, organizations and society. Examples include phishing, spamming, hacking, software piracy and cyberbullying. Cybercrime origins, classifications, legal perspectives from India are presented. Emerging technologies are increasing cybercrime risks in India as more users come online.
This document discusses cyber crime and provides an overview presented by Dr. Soreingam Ragui. It defines cyber crime as any illegal activity committed using computers or networks. India ranks 11th globally for cyber crime, constituting 3% of total cyber crime. Reasons for India's high rates include a rapidly growing internet user base. Common cyber crimes include hacking, phishing, and intellectual property theft. The document also discusses Indian cyber law and acts like the Information Technology Act of 2000.
Cyber crimes against property are common and involve damaging or stealing a person's or organization's property through digital means. This can include malware, ransomware, piracy, and other crimes intended to financially profit from illegal activities. The presentation discusses several types of cyber crimes against property such as cybersquatting, cyber trespassing, cyber vandalism, and intellectual property crimes. Examples are given for each type, including defacing websites, software sabotage, account hijacking, and copyright infringement. Prevention of cyber crimes against property requires awareness and security measures to protect digital assets and intellectual property.
Discuss similarities and differences between and Trojan.docxwrite12
Viruses, worms, and Trojan horses are types of malware that pose threats to computers and users in different ways. Viruses require human action to spread, like opening an infected file, while worms can spread automatically between devices without user interaction. Trojan horses also require user involvement by disguising themselves as legitimate files or programs to gain access to systems. Each type of malware allows attackers to access systems for purposes like stealing data, spying, or launching other attacks.
Discuss similarities and differences between and Trojan.docxbkbk37
Viruses, worms, and Trojan horses are types of malware that pose threats to computers and networks in different ways. Viruses require human action to spread, usually by infecting files, while worms can spread automatically through networks. Trojan horses conceal malicious functions within seemingly harmless programs. Cyberattacks have become easier to carry out remotely without risk of detection, as seen in ransomware attacks against organizations, while attribution of attacks to specific actors remains difficult.
This document discusses various types of computer crimes including unauthorized computer access, creation and spreading of malicious programs, cyber harassment, and weak punishment in the US. It notes that while computer crimes are increasing, accurate statistics are difficult to obtain since many go unreported or losses are hard to calculate. The document outlines different forms of unauthorized computer use such as voyeurism, data alteration, deletion, and denial of service attacks. It also discusses how computer crimes are new ways to harm people compared to older crimes where computers are merely a tool.
Crime has evolved with advances in technology. Cyber crime involves using computers or the internet to commit crimes like identity theft, hacking, or financial fraud. It can harm individuals, businesses, or society. There are many types of cyber crimes, including those against persons like stalking or defamation, against property like piracy or fraud, against organizations like hacking or denial of service attacks, and against society like terrorism or forgery. Defining and addressing cyber crime has become increasingly important as technology changes how crimes are committed.
This document discusses cyber crime and security. It begins by defining cyber crime and providing examples. It then discusses the history of cyber crime, noting the first recorded incident in 1820. It outlines various types of cyber crimes like financial crimes, sale of illegal articles, distributed denial of service attacks, email spoofing, and forgery. It also discusses hackers and reasons computers are vulnerable. It provides details on the WannaCry ransomware attack and concludes with recommendations on how to protect yourself from cyber crime.
This document discusses cyber crime and security. It begins with defining cyber crime and providing examples. It then discusses the history of cyber crime, noting the first recorded incident in 1820. It outlines various types of cyber crimes like financial crimes, sale of illegal articles, distributed denial of service attacks, email spoofing, and forgery. It also discusses hackers and why computers are vulnerable. It provides details on the WannaCry ransomware attack of 2017. Finally, it lists ways to protect yourself from cyber crime, such as encrypting data, using firewalls and antivirus software, and being wary of emails and downloads.
This document discusses cyber space, cyber crime, cyber law, and various types of cyber crimes. It defines cyber space as including computers, networks, software, data storage devices, the internet, websites, emails and electronic devices. Cyber crime is any offence committed using a computer. Cyber law deals with legal issues related to computers and the internet, and encompasses areas like cyber crimes, electronic signatures, intellectual property, data protection, and privacy. Various types of cyber crimes discussed include hacking, virus/worm attacks, identity theft, cyberbullying, cyberterrorism, and violations of intellectual property, banking/credit card laws, and e-commerce.
Assignment of cyber crimes for oumh1203Faridah Husin
This document discusses cyber crimes in Malaysia and the United States. It begins with an introduction that defines cyber crime and its scope. It then covers classifications of cyber crimes such as those against individuals, property, organizations, and society. The document compares cyber crimes between Malaysia and the US, noting that the US leads in identity theft and phishing while Malaysia's most common crimes are malware, scams, and mobile threats. It concludes with suggestions on curbing cyber crimes such as education, using firewalls and security software, practicing safe online behavior, and using strong passwords.
Your computer contains evidence of any cyber crimes committed using that device. As the crime scene, investigators can examine the computer's files, browser history, and other digital traces to uncover the perpetrator's identity and activities. Maintaining good cyber security practices and being aware of how digital data can be used against you are important ways to protect yourself and others online.
Cybercrime is a type of crime done by the help of computer and internet. Brief about types of cyber crimes, Case studies and Cyber hygiene from cyber threats.
Be smart & creative in cyber world. #D3
CYBER CRIME PRESENTATION for Law Students for Semester fourssuser24dae7
This document provides an overview of cybercrimes and legal enforcement in India. It discusses various types of cybercrimes like hacking, data theft, computer viruses. It outlines relevant sections of the Information Technology Act 2000 that pertain to cybercrimes such as Section 43 for civil wrongs, Section 66 for hacking and data alteration, Section 67 for publishing obscene content. The document also discusses challenges in combating cybercrimes through technological measures, investigation techniques, and strengthening legal frameworks. Overall, the document aims to introduce readers to the key issues around cybercrimes and the laws governing them in India.
The document discusses the key concepts of offer and acceptance in contract law. It defines an offer as a proposal made by one party to another to enter into a legally binding agreement. For a valid offer, the terms must be definite, unambiguous and certain. An offer becomes a promise once it is accepted by the offeree. Acceptance must be absolute and unconditional, communicated to the offeror according to the prescribed mode, and given within a reasonable time period. An offer lapses if it is revoked by the offeror before acceptance, or under other conditions such as the death of the offeror. Communication of offer, acceptance and revocation is also explained.
The document discusses the essential elements of a valid contract under Indian law, focusing on the requirement of free consent. It defines key terms including consent, coercion, undue influence, misrepresentation, and mistake. For each term, it provides the legal definition from the Indian Contract Act and illustrations of how those concepts apply in assessing whether a contract is voidable due to a lack of free consent. Overall, the document outlines how lack of free consent due to coercion, undue influence, fraud, misrepresentation or mistake can potentially invalidate a contract.
This document discusses the essential elements of a valid contract under Indian law. It begins by defining consideration as something done or promised to be done in return for a promise. It notes that consideration can be an act, abstinence, forbearance or return promise, and that it must move from the promisee or third party at the desire of the promisor. The document then lists exceptions to the general rule of privity of contract, allowing non-parties to sue in certain circumstances like family arrangements or assignment of contracts. It concludes by outlining some exceptions to the requirement of consideration for a contract to be valid, such as promises made from love and affection or to repay time-barred debts.
1. The document discusses the legality of consideration and objects in a contract.
2. For a consideration or object to be lawful, it cannot be forbidden by law, defeat any law, be fraudulent, injure others, or be regarded as immoral or against public policy by the courts.
3. Agreements are void if any part of the consideration or object is unlawful.
The document discusses the history and evolution of e-commerce, from early electronic data interchange (EDI) between businesses in the 1960s to the modern age of online commerce. It notes that EDI provided a standardized, paperless way for businesses to exchange documents electronically but was costly for smaller businesses. The rise of the internet in the 1990s opened up new opportunities for businesses and consumers to engage in e-commerce through online marketplaces. This led to the adoption of digital signatures to secure electronic transactions and provide authentication, message integrity, and non-repudiation of data.
The document discusses India's Information Technology Act and digital signatures. It provides information on cryptography, digital signatures, and the roles of the Controller of Certifying Authorities, Certifying Authorities, and subscribers. It also summarizes key sections of the Act related to the legal recognition of electronic records and digital signatures, the use of electronic records and digital signatures by the government, requirements for certifying authorities to obtain licenses to issue digital signature certificates, and the regulation of certifying authorities.
The document discusses the key concepts of offer and acceptance in contract law. It defines an offer as a proposal made by one party to another to enter into a legally binding agreement. For a valid offer, the terms must be definite, unambiguous and certain. An offer becomes a promise once it is accepted by the offeree. Acceptance must be absolute and unconditional, communicated to the offeror according to the prescribed mode, and given within a reasonable time period. Communication of the offer, acceptance and revocation is complete when each party is put on notice. An offer lapses upon revocation by the offeror before acceptance or due to non-fulfillment of conditions among other reasons.
This document discusses the essential elements of a valid contract under Indian law. It begins by defining consideration as something done or promised to be done in return for the promise. It then lists characteristics of valid consideration, such as it must move at the desire of the promisor and can be an act, abstinence, forbearance or return promise. The document also discusses privity of contract and exceptions where non-parties can sue, such as family arrangements or assignment of contract. It concludes by outlining exceptions to the general rule that without consideration there is no valid contract, such as promises made from love and affection or to pay a time-barred debt.
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee
Presentation slides for a session held on June 4, 2024, at Kyoto University. This presentation is based on the presenter’s recent paper, coauthored with Hwang Lee, Professor, Korea University, with the same title, published in the Journal of Business Administration & Law, Volume 34, No. 2 (April 2024). The paper, written in Korean, is available at <https://shorturl.at/GCWcI>.
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Massimo Talia
This guide aims to provide information on how lawyers will be able to use the opportunities provided by AI tools and how such tools could help the business processes of small firms. Its objective is to provide lawyers with some background to understand what they can and cannot realistically expect from these products. This guide aims to give a reference point for small law practices in the EU
against which they can evaluate those classes of AI applications that are probably the most relevant for them.
Lifting the Corporate Veil. Power Point Presentationseri bangash
"Lifting the Corporate Veil" is a legal concept that refers to the judicial act of disregarding the separate legal personality of a corporation or limited liability company (LLC). Normally, a corporation is considered a legal entity separate from its shareholders or members, meaning that the personal assets of shareholders or members are protected from the liabilities of the corporation. However, there are certain situations where courts may decide to "pierce" or "lift" the corporate veil, holding shareholders or members personally liable for the debts or actions of the corporation.
Here are some common scenarios in which courts might lift the corporate veil:
Fraud or Illegality: If shareholders or members use the corporate structure to perpetrate fraud, evade legal obligations, or engage in illegal activities, courts may disregard the corporate entity and hold those individuals personally liable.
Undercapitalization: If a corporation is formed with insufficient capital to conduct its intended business and meet its foreseeable liabilities, and this lack of capitalization results in harm to creditors or other parties, courts may lift the corporate veil to hold shareholders or members liable.
Failure to Observe Corporate Formalities: Corporations and LLCs are required to observe certain formalities, such as holding regular meetings, maintaining separate financial records, and avoiding commingling of personal and corporate assets. If these formalities are not observed and the corporate structure is used as a mere façade, courts may disregard the corporate entity.
Alter Ego: If there is such a unity of interest and ownership between the corporation and its shareholders or members that the separate personalities of the corporation and the individuals no longer exist, courts may treat the corporation as the alter ego of its owners and hold them personally liable.
Group Enterprises: In some cases, where multiple corporations are closely related or form part of a single economic unit, courts may pierce the corporate veil to achieve equity, particularly if one corporation's actions harm creditors or other stakeholders and the corporate structure is being used to shield culpable parties from liability.
Matthew Professional CV experienced Government LiaisonMattGardner52
As an experienced Government Liaison, I have demonstrated expertise in Corporate Governance. My skill set includes senior-level management in Contract Management, Legal Support, and Diplomatic Relations. I have also gained proficiency as a Corporate Liaison, utilizing my strong background in accounting, finance, and legal, with a Bachelor's degree (B.A.) from California State University. My Administrative Skills further strengthen my ability to contribute to the growth and success of any organization.
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersHarpreetSaini48
Discover how Mississauga criminal defence lawyers defend clients facing weapon offence charges with expert legal guidance and courtroom representation.
To know more visit: https://www.saini-law.com/
2. Renu Verma 2
Introduction
• Computer Crime, E-Crime, Hi-Tech Crime
or Electronic Crime is where a computer is
the target of a crime or is the means adopted
to commit a crime.
• Most of these crimes are not new. Criminals
simply devise different ways to undertake
standard criminal activities such as fraud,
theft, blackmail, forgery, and embezzlement
using the new medium, often involving the
Internet
3. BRIEF HISTORY
The first recorded cyber crime took place in the year
1820. That is not surprising considering the fact
that the abacus, which is thought to be the earliest
form of a computer, has been around since 3500
B.C. in India, Japan and China. The era of modern
computers, however, began with the analytical
engine of Charles Babbage.
In 1820, Joseph-Marie Jacquard, a textile
manufacturer in France, produced the loom. This
device allowed the repetition of a series of steps in
the weaving of special fabrics. This resulted in a
fear amongst Jacquard's employees that their
traditional employment and livelihood were being
threatened. They committed acts of sabotage to
discourage Jacquard from further use of the new
technology. This is the first recorded cyber crime.
Renu Verma 3
4. CONVENTIONAL CRIME
Crime is a social and economic phenomenon
and is as old as the human society. Crime is a
legal concept and has the sanction of the law.
Crime or an offence is “a legal wrong that can
be followed by criminal proceedings which may
result into punishment”. The hallmark of
criminality is that, it is breach of the criminal
law. Per Lord Atkin “the criminal quality of an
act cannot be discovered by reference to any
standard but one: is the act prohibited with
penal consequences”.
A crime may be said to be any conduct
accompanied by act or omission prohibited by
law and consequential breach of which is visited
by penal consequences.
Renu Verma 4
5. Defining Cyber Crime :
A simple yet sturdy definition of
cyber crime would be "unlawful
acts wherein the computer is
either a tool or a target or
both".
Renu Verma 5
6. REASONS FOR CYBER
CRIME
1. Capacity to store data in
comparatively small space
2. Easy to access
3.Complex
4.Negligence / Human error
5. Loss of evidence for tracing
Renu Verma 6
7. Viruses
A computer virus is a computer program that can
infect other computer programs by modifying
them in such a way as to include a (possibly
evolved) copy of it. Note that a program does not
have to perform outright damage (such as deleting
or corrupting files) in order to be called a "virus".
Viruses are programs that attach themselves to a
computer or a file and then circulate themselves
to other files and to other computers on a
network. They usually affect the data on a
computer, either by altering or deleting it.
Renu Verma 7
8. Worm attacks
Worms, unlike viruses do not
need the host to attach
themselves to. They merely
make functional copies of
themselves and do this
repeatedly till they eat up all
the available space on a
computer's memory.
Renu Verma 8
9. Logic bombs
These are event dependent programs. This
implies that these programs are created to
do something only when a certain event
(known as a trigger event) occurs. E.g. even
some viruses may be termed logic bombs
because they lie dormant all through the
year and become active only on a particular
date.
Renu Verma 9
10. Salami attacks
This kind of crime is normally prevalent in
the financial institutions or for the purpose
of committing financial crimes. An
important feature of this type of offence is
that the alteration is so small that it would
normally go unnoticed. E.g. the Ziegler
case wherein a logic bomb was introduced
in the bank’s system, which deducted 10
cents from every account and deposited it
in a particular account.
Renu Verma 10
11. Denial of Service Tools
Denial-of-service (or DoS) attacks are usually
launched to make a particular service
unavailable to someone who is authorized to use
it. These attacks may be launched using one
single computer or many computers across the
world. In the latter scenario, the attack is
known as a distributed denial of service attack.
Usually these attacks do not necessitate the
need to get access into anyone's system.
These attacks have been getting decidedly more
popular as more and more people realize the
amount and magnitude of loss, which can be
caused through them.
Renu Verma 11
12. Trojan attacks
This term has its origin in the word
‘Trojan horse’. In software field this
means an unauthorized programme,
which passively gains control over
another’s system by representing itself as
an authorised programme. The most
common form of installing a Trojan is
through e-mail. E.g. a Trojan was
installed in the computer of a lady film
director in the U.S. while chatting. The
cyber criminal through the web cam
installed in the computer obtained her
nude photographs. He further harassed
this lady.
Renu Verma 12
13. Internet time thefts
Normally in these kinds of thefts the
Internet surfing hours of the victim are
used up by another person. This is done
by gaining access to the login ID and
the password. E.g. Colonel Bajwa’s
case- the Internet hours were used up
by any other person. This was perhaps
one of the first reported cases related
to cyber crime in India. However this
case made the police infamous as to
their lack of understanding of the
nature of cyber crime.
Renu Verma 13
14. Web jacking
This term is derived from the term hi jacking. In
these kinds of offences the hacker gains access
and control over the web site of another. He may
even mutilate or change the information on the
site. This may be done for fulfilling political
objectives or for money. E.g. recently the site of
MIT (Ministry of Information Technology) was
hacked by the Pakistani hackers and some
obscene matter was placed therein. Further the
site of Bombay crime branch was also web jacked.
Another case of web jacking is that of the ‘gold
fish’ case. In this case the site was hacked and
the information pertaining to gold fish was
changed. Further a ransom of US $ 1 million was
demanded as ransom. Thus web jacking is a
process where by control over the site of another
is made backed by some consideration for it.
Renu Verma 14
15. Email spoofing
A spoofed email is one that appears to originate from one source but
has actually emerged from another source. Falsifying the name and
/ or email address of the originator of the email usually does email
spoofing. usually to send an email the sender has to enter the
following information:
i. email address of the receiver of the email
ii. email address(es) of the person(s) who will receive a copy of the
email (referred to as CC for carbon copy)
iii. email address(es) of the person(s) who will receive a copy of the
email (referred to as CC for carbon copy, but whose identities will
not be known to the other recipients of the e-mail (known as BCC
for blind carbon copy)
iv. Subject of the message (a short title / description of the message)
v. Message
Certain web-based email services like www.SendFakeMail.com, offer a
facility wherein in addition to the above, a sender can also enter the
email address of the purported sender of the email.
Renu Verma 15
16. Email bombing
Email bombing refers to sending a large amount of
emails to the victim resulting in the victim's email
account (in case of an individual) or servers (in
case of a company or an email service provider)
crashing. A simple way of achieving this would be
to subscribe the victim's email address to a large
number of mailing lists. Mailing lists are special
interest groups that share and exchange
information on a common topic of interest with
one another via email. Mailing lists are very
popular and can generate a lot of daily email traffic
- depending upon the mailing list. Some generate
only a few messages per day others generate
hundreds.
Renu Verma 16
17. Threatening emails
Email is a useful tool for
technology savvy criminals
thanks to the relative
anonymity offered by it. It
becomes fairly easy for anyone
with even a basic knowledge of
computers to become a
blackmailer by threatening
someone via e-mail.
Renu Verma 17
18. Phishing
The act of sending an e-mail to a user falsely claiming to
be an established legitimate enterprise in an attempt to
scam the user into surrendering private information
that will be used for identity theft. The e-mail directs
the user to visit a Web site where they are asked to
update personal information, such as passwords and
credit card, social security, and bank account numbers,
that the legitimate organization already has. The Web
site, however, is bogus and set up only to steal the
user's information.. By spamming large groups of
people, the phisher counted on the e-mail being read by
a percentage of people who actually had listed credit
card numbers with legitimately. Phishing, also referred
to as brand spoofing or carding, is a variation on
fishing, the idea being that bait is thrown out with the
hopes that while most will ignore the bait, some will be
tempted into biting.
Renu Verma 18
19. Computer vandalism
Vandalism means deliberately destroying
or damaging property of another. Thus
computer vandalism may include within
its purview any kind of physical harm
done to the computer of any person.
These acts may take the form of the theft
of a computer, some part of a computer
or a peripheral attached to the computer
or by physically damaging a computer or
its peripherals.
Renu Verma 19
20. Trafficking
Trafficking may assume different forms. It
may be trafficking in drugs, human beings,
arms weapons etc. These forms of trafficking
are going unchecked because they are
carried on under pseudonyms. A racket was
busted in Chennai where drugs were being
sold under the pseudonym of honey.
Renu Verma 20
21. Renu Verma 21
Hacking
Hacking in simple terms means an illegal intrusion into a
computer system and/or network. There is an equivalent term
to hacking i.e. cracking, but from Indian Laws perspective
there is no difference between the term hacking and cracking.
Every act committed towards breaking into a computer and/or
network is hacking. Hackers write or use ready-made computer
programs to attack the target computer. They possess the
desire to destruct and they get the kick out of such
destruction. Some hackers hack for personal monetary gains,
such as to stealing the credit card information, transferring
money from various bank accounts to their own account
followed by withdrawal of money. They extort money from
some corporate giant threatening him to publish the stolen
information which is critical in nature.
Government websites are the hot targets of the hackers due to
the press coverage, it receives. Hackers enjoy the media
coverage.
22. Renu Verma 22
Pornography
Child Pornography
The Internet is being highly used by its
abusers to reach and abuse children
sexually, worldwide. The internet is very
fast becoming a household commodity in
India . It’s explosion has made the
children a viable victim to the cyber
crime. As more homes have access to
internet, more children would be using
the internet and more are the chances of
falling victim to the aggression of
pedophiles.
23. Cyber Stalking
Renu Verma 23
Cyber Stalking can be defined as the repeated
acts of harassment or threatening behavior of the
cyber criminal towards the victim by using
internet services. Stalking in General terms can
be referred to as the repeated acts of harassment
targeting the victim such as following the victim,
making harassing phone calls, killing the victims
pet, vandalizing victims property, leaving written
messages or objects. Stalking may be followed by
serious violent acts such as physical harm to the
victim and the same has to be treated and viewed
seriously. It all depends on the course of conduct
of the stalker.
24. Where the computer is a tool for an
unlawful act:
This kind of activity usually involves a
modification of a conventional crime by
using computers. Some examples are:
1. Financial Crimes
2. Cyber pornography
3. Sale of illegal articles
4. Online gambling
5. Intellectual Property crimes
6. Email spoofing
7. Forgery
8. Cyber Defamation
9. Cyber stalking
Renu Verma 24
25. Where the computer is the target for an unlawful
act:
It may be noted that in these activities the computer may also be
a tool. This kind of activity usually involves sophisticated
crimes usually out of the purview of conventional criminal
law. Some examples are:
1. Unauthorized access to computer systems or networks
2. Theft of information contained in electric form
3. Email bombing
4. Data diddling
5. Salami attacks
6. Denial of Service attack
7. Virus / Worm attacks
8. Logic bombs
9. Trojan attacks
10. Internet time thefts
11. Web jacking
12. Theft of Computer system
13. Physically damaging a computer system
Renu Verma 25
27. Motive Behind The Crime
Greed
Power
Publicity
Revenge
Adventure and Curiosity
Desire to access forbidden information
Destructive mindset
Renu Verma 27
28. CYBER CRIMINALS
The cyber criminals constitute of various
groups/ category. This division may be
justified on the basis of the object that
they have in their mind. The following
are the category of cyber criminals-
1. Children and adolescents between the
age group of 6 – 18 years
2. Organised hackers
3. Professional hackers / crackers
4. Discontented employees
5. Ex- Lovers
Renu Verma 28
29. Against Individual
Property
i. Computer vandalism
ii. Transmitting virus
iii.Net-trespass
iv. Unauthorized control/access
over computer system
v. Intellectual Property crimes
vi. Internet time thefts
Renu Verma 29
30. Against Organization
i. Unauthorized control/access
over computer system
ii. Possession of unauthorized
information.
iii.Cyber terrorism against the
government organization.
iv. Distribution of pirated
software etc.
Renu Verma 30
31. Against Society at large
1. Pornography (basically child
pornography)
2. Polluting the youth through indecent
exposure
3. Trafficking
4. Financial crimes
5. Sale of illegal articles
6. Online gambling
7. Forgery
Renu Verma 31
32. Combating Cyber crime-
Indian legal framework
Information Technology Act, 2000-came into
force on 17 October 2000
Extends to whole of India and also applies to
any offence or contravention there under
committed outside India by any person
read with Section 75- Act applies to offence or
contravention committed outside India by any
person irrespective of his nationality, if such act
involves a computer, computer system or
network located in India
IT Act confers legal recognition to electronic
records and digital signatures (section 4,5 of the
IT Act,2000)
Renu Verma 32
33. Renu Verma 33
E-mail crimes punishable under
various Indian laws
• Sending pornographic or obscene emails are punishable under
Section 67 of the IT Act.
• An offence under this section is punishable on first conviction
with imprisonment for a term, which may extend to five years
and with fine, which may extend to One lakh rupees.
• In the event of a second or subsequent conviction the
recommended punishment is imprisonment for a term, which
may extend to ten years and also with fine which may extend to
Two lakh rupees.
• Emails that are defamatory in nature are punishable under
Section 500 of the Indian Penal Code (IPC), which recommends an
imprisonment of upto two years or a fine or both.
• Threatening emails are punishable under the provisions of the
IPC pertaining to criminal intimidation, insult and annoyance
(Chapter XXII), extortion (Chapter XVII)
• Email spoofing
Email spoofing is covered under provisions of the IPC relating to
fraud, cheating by personation (Chapter XVII), forgery (Chapter
XVIII)
34. MERITS AND DEMERITS OF THE
CYBER TECHNOLOGY
MERITS
Less expensive -
man power
Compact
Lessens the paper
work and file
maintenance
Speedy
Accuracy
Connection with the
world at large
Knowledge through
net
DEMERITS
Expensive – up
gradation of
technology, training
Easy access
Complex
Tracing
Jurisdiction
Training
Awareness
Renu Verma 34
35. PREVENTION OF CYBER CRIME
1. to prevent cyber stalking avoid disclosing any information
pertaining to oneself. This is as good as disclosing your identity to
strangers in public place.
2. always avoid sending any photograph online particularly to
strangers and chat friends as there have been incidents of misuse of
the photographs.
3. always use latest and up date anti virus software to guard against
virus attacks.
4. always keep back up volumes so that one may not suffer data loss in
case of virus contamination
5. never send your credit card number to any site that is not secured,
to guard against frauds.
6. always keep a watch on the sites that your children are accessing to
prevent any kind of harassment or depravation in children.
7. it is better to use a security programme that gives control over the
cookies and send information back to the site as leaving the cookies
unguarded might prove fatal.
8. web site owners should watch traffic and check any irregularity on
the site. Putting host-based intrusion detection devices on servers
may do this.
9. web servers running public sites must be physically separate
protected from internal corporate network.
Renu Verma 35
36. Renu Verma 36
SUGGESTIONS
1. More Public awareness campaigns
2. Training of police officers
3. Proper knowledge to the Judiciary
4. More Cyber crime police cells set up across the
country
5. Effective E-surveillance
6. Websites aid in creating awareness and
encouraging reporting of cyber crime cases.
7. Specialized Training of forensic investigators and
experts
8. Active coordination between police and other law
enforcement agencies and authorities is required.
9. Proper implementation of the IT act
10. Legal awareness amongst the general public
11. Proper advertisement of the do’s and don'ts on
the net