SlideShare a Scribd company logo
CYBER
CRIME
B Y - M D . A N E E S R A Z A
(D E L H I
U N I V E R S I T Y )
Cyber Crime or Computer
Crime refers to any crime that
involves computer and a network.
(a). The computer may have been
used in the commission of a crime
, it may be the target. NETCRIME
refers to criminal exploitation of
the internet.
Debarati Halder & Dr.
K.Jaishankar (2011) defines
cybercrimes as: “Offences that are
committed against individuals or groups
of individuals with a criminal motive to
intentionally harm the reputation of the
victim or cause physical or mental harm
to the victim directly or indirectly ,using
modern telecommunication networks
such as internet.
Issues surrounding these types of
crimes have become high-profile
,particularly those surrounding
cracking, copyright, infringement, chi
ld pornography and child grooming.
There are also problems of privacy
when confidential information is lost
or intercepted, lawfully or otherwise.
CLASSIFICATION:
Computer crime encompasses a broad range of
activities .
Generally, however, it may be divided into two
categories:
(1). Crimes that target computers directly.
(2). Crimes facilitated by computer networks or
devices, the primary target of which is
independent of the computer network or device.
Crimes that primarily target computer networks or
devices include:
• Computer viruses
• Denial-of-service attacks
• Malware (malicious code)
Crimes that use computer networks
or devices to advance other ends
include:
* Cyber stalking
* Fraud and Identity theft
* Information Warfare
*Phishing scams
(1). SPAM:
Spam, or the unsolicited sending of the bulk email for
commercial purposes, is unlawful in some jurisdictions.
While anti-spam laws are relatively new, limits on
unsolicited electronics communications have existed for
some time.
(2). FRAUD:
Computer fraud is any dishonest misrepresentation
of the fact intended to let another to do or refrain from
doing something which causes loss.
Including Bank fraud, Identity theft, extortion, and
theft of classified information
A variety of internet scams target direct to
consumers.
(1) Obscene and offensive content:
The content of websites and the other
electronics communications may be
distasteful, obscene or offensive for a variety of
reasons. In some instances these
communication may be illegal.
One area of Internet pornography that has
been the target of the strongest efforts at
curtailment is child pornography.
(2). Harassment:
Whereas content may be offensive in a non-
specific way, harassment directs obscenities and
derogatory comments at specific individuals
focusing for example on
gender, race, religion, nationality, sexual
orientation.
This often occurs in the chat rooms, through
newsgroups, and by sending hate email to
interested parties.(E.g. Cyber bullying, Cyber
stalking, Hate Crime, and Stalking)
(3). Drug Trafficking:
Drug traffickers are increasingly taking
advantage of the Internet to sell their illegal
substances through encrypted e-mail and other
internet technology.
(4). Cyber terrorism:
Cyber terrorism Is the use of internet based
attacks in terrorists activities, including acts of
deliberate, large- scale disruption of computer
networks, especially of personal computers
attached to the Internet, by the means of tools
such as computer viruses.
CYBER LAW:
Cyber law is a term use
to describe the legal
issues related to use of
communication
technology, particularly
cyber space, i.e. Internet.
Cyber law is an
attempt to apply laws
designed for the physical
world to human activities
on the internet.
IT ACT:
An act to provide legal recognition for the
transaction carried out by means of
electronics data interchange and other means
of electronics communication, commonly
referred to as “electronics commerce”.
CYBER
THEFT
CASE
Rs. 24 crore cyber theft
(a). Theft of Rs.24 crore from the YES
Bank account of RPG Group.
(b). Cops recovered more than half of
the stolen amount.
(c). Police arrested 13 persons from
Chennai and Delhi.
TRAILS
(a). Hackers operating from two Wi-Fi
connections in Delhi allegedly stole the
amount on may 11,2013.
(b). The money was deposited in 12 bank
accounts across the country.
(c). In June, Police located the address where
the IP address originated , but it turned out
false.
IT ACT APPLICABLE &
PUNISHMENT
(a). Section 66D Punishment for cheating by
personation by using computer resource are
applicable.
(b). Section 415 & 420 of IPC are applicable for
cheating and theft.
(c). Punished with imprisonment of either
description for a term which may extended to
three years and also be liable to fine which
may be extended to 1 lakh rupees.
THANK
YOU

More Related Content

What's hot

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Avinash Rajput
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
amani kadope
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
mukeshkaran
 
cyber crime
cyber crimecyber crime
cyber crime
Saba MuShtaq
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mohan Robert
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
dixitas
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Krishnav Ray Baruah
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
Niti Dhruva
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
Abhinav Tyagi
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Md. Atiqur Rahman
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Accenture
 

What's hot (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to Cyber crime

A Study On The Cyber-Crime And Cyber Criminals A Global Problem
A Study On The Cyber-Crime And Cyber Criminals  A Global ProblemA Study On The Cyber-Crime And Cyber Criminals  A Global Problem
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
Christina Bauer
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
ijbuiiir1
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
Vishni Ganepola
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
 
Internet
InternetInternet
Internet
Jodip
 
English in written
English in writtenEnglish in written
English in written
azhar manap
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Mukul Kumar
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
Alexander Zhuravlev
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
Jody Sullivan
 
Cybercrime
CybercrimeCybercrime
Cybercrime
dhru shah
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
Jayati Tiwari
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
Vinay Pancholi
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
JIEMS Akkalkuwa
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correct
Waheed Rana
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
Aman Sharma
 

Similar to Cyber crime (20)

A Study On The Cyber-Crime And Cyber Criminals A Global Problem
A Study On The Cyber-Crime And Cyber Criminals  A Global ProblemA Study On The Cyber-Crime And Cyber Criminals  A Global Problem
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Internet
InternetInternet
Internet
 
English in written
English in writtenEnglish in written
English in written
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correct
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 

Recently uploaded

“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

Cyber crime

  • 1. CYBER CRIME B Y - M D . A N E E S R A Z A (D E L H I U N I V E R S I T Y )
  • 2. Cyber Crime or Computer Crime refers to any crime that involves computer and a network. (a). The computer may have been used in the commission of a crime , it may be the target. NETCRIME refers to criminal exploitation of the internet.
  • 3. Debarati Halder & Dr. K.Jaishankar (2011) defines cybercrimes as: “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly ,using modern telecommunication networks such as internet.
  • 4. Issues surrounding these types of crimes have become high-profile ,particularly those surrounding cracking, copyright, infringement, chi ld pornography and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
  • 5. CLASSIFICATION: Computer crime encompasses a broad range of activities . Generally, however, it may be divided into two categories: (1). Crimes that target computers directly. (2). Crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device. Crimes that primarily target computer networks or devices include: • Computer viruses • Denial-of-service attacks • Malware (malicious code)
  • 6. Crimes that use computer networks or devices to advance other ends include: * Cyber stalking * Fraud and Identity theft * Information Warfare *Phishing scams
  • 7. (1). SPAM: Spam, or the unsolicited sending of the bulk email for commercial purposes, is unlawful in some jurisdictions. While anti-spam laws are relatively new, limits on unsolicited electronics communications have existed for some time. (2). FRAUD: Computer fraud is any dishonest misrepresentation of the fact intended to let another to do or refrain from doing something which causes loss. Including Bank fraud, Identity theft, extortion, and theft of classified information
  • 8. A variety of internet scams target direct to consumers. (1) Obscene and offensive content: The content of websites and the other electronics communications may be distasteful, obscene or offensive for a variety of reasons. In some instances these communication may be illegal. One area of Internet pornography that has been the target of the strongest efforts at curtailment is child pornography.
  • 9. (2). Harassment: Whereas content may be offensive in a non- specific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation. This often occurs in the chat rooms, through newsgroups, and by sending hate email to interested parties.(E.g. Cyber bullying, Cyber stalking, Hate Crime, and Stalking)
  • 10. (3). Drug Trafficking: Drug traffickers are increasingly taking advantage of the Internet to sell their illegal substances through encrypted e-mail and other internet technology. (4). Cyber terrorism: Cyber terrorism Is the use of internet based attacks in terrorists activities, including acts of deliberate, large- scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
  • 11. CYBER LAW: Cyber law is a term use to describe the legal issues related to use of communication technology, particularly cyber space, i.e. Internet. Cyber law is an attempt to apply laws designed for the physical world to human activities on the internet.
  • 12. IT ACT: An act to provide legal recognition for the transaction carried out by means of electronics data interchange and other means of electronics communication, commonly referred to as “electronics commerce”.
  • 14. Rs. 24 crore cyber theft (a). Theft of Rs.24 crore from the YES Bank account of RPG Group. (b). Cops recovered more than half of the stolen amount. (c). Police arrested 13 persons from Chennai and Delhi.
  • 15. TRAILS (a). Hackers operating from two Wi-Fi connections in Delhi allegedly stole the amount on may 11,2013. (b). The money was deposited in 12 bank accounts across the country. (c). In June, Police located the address where the IP address originated , but it turned out false.
  • 16. IT ACT APPLICABLE & PUNISHMENT (a). Section 66D Punishment for cheating by personation by using computer resource are applicable. (b). Section 415 & 420 of IPC are applicable for cheating and theft. (c). Punished with imprisonment of either description for a term which may extended to three years and also be liable to fine which may be extended to 1 lakh rupees.