SlideShare a Scribd company logo
1 of 21
Going to tell you about…..
1.
2.
3.
4.
5.
6.
7.
8.

C y b e r C r i me
T y p e s O f C y b e r C r i me
C y b e r C r i me T i me l i n e
F B I o n C y b e r C r i me
C y b e r C r i me I n I n d i a
I T A c t 2000
Su r v e y Re p o r t
Co n l u s i o n
What is Cyber Crime?
 Computer crime refers to any crime that involves

a computer and a network The computer may have
been used in the commission of a crime, or it may be
the target. Netcrime refers to criminal exploitation
of the Internet. Dr. Debarati Halder and Dr. K.
Jaishankar (2011) defines Cybercrimes as: "Offences
that are committed against individuals or groups of
individuals with a criminal motive to intentionally harm
the reputation of the victim or cause physical or
mental harm to the victim directly or indirectly, using
modern telecommunication networks such as Internet
(Chat rooms, emails, notice boards and groups) and
mobile phones (SMS/MMS)".[Such crimes may
threaten a nation’s security and financial health
Types Of Cyber Crime
 Computer crime encompasses a broad range of

activities. Generally, however, it may be divided into
two categories:
 (1) crimes that target computers directly;
 (2) crimes facilitated by computer networks or devices,
the primary target of which is independent of the
computer network or device.
 Crimes that primarily target computer networks or
devices include:
 Computer viruses
 Denial-of-service attacks
 Malware (malicious code)
 C r i me s t h a t














u s e c o mp u t e r
n e t wo r k s o r d e v i c e s t o
a dv a nc e ot he r e nds i nc l ude :
Cy b e r s t a l k i n g
Fraud and identity t h e f t
I n f o r ma t i o n w a r f a r e
P h i s h i n g s c a ms
Spa m
Fraud
Obscene o r o f f e n s i v e c o n t e n t
Harassment
Threats
Drug t r a f f i c k i n g
Cyber t e r r o r i s m
Cyber w a r f a r e
What FBI has to say..?

 We are building our lives around our wired

and wireless networks. The question is, are we
ready to work together to defend them?

 The FBI certainly is. We lead the national

effort to investigate high-tech
crimes, including cyber-based
terrorism, espionage, computer
intrusions, and major cyber fraud. To stay in
front of current and emerging trends, we
gather and share information and intelligence
with public and private sector partners
worldwide.
Cyber Crime In India….

 India scores high on the cyber crime map with all

possibilities of emerging as the ‘ransom ware capital’ of the
Asia Pacific region.
 Presently, the country is among the world’s top five countries
for the highest number of incidences of cyber crime
including ransomware, identity theft and phishing incidents
with the average cost per cyber victim going up from $192
last year to $207.
What About our security
and laws??
IT Act of India 2000
Updated on: Aug 19, 2013 10:27 P M (I T
t o f I n d i a 2000)
M a y 2000, b o t h t h e h o u s e s o f
e I n d i a n P a r l i a me n t p a s s e d
e I n f o r ma t i o n T e c h n o l o g y
l l i n A u g u s t 2000 a n d c a m e t o
k n o w n a s t h e I n f o r ma t i o n
c h n o l o g y A c t , 2000.
b e r l a ws a r e c o n t a i n e d i n t h e
A c t , 2000.
i s A c t a i ms t o p r o v i d e t h e
ga l i nf r a s t r uc t ur e f or e mme r c e i n I n d i a
A c t , 2000 s h o w s t h e l e g a l

L a s t







Ac
I n
t h
t h
Bi
be
Te
Cy
I T
Th
l e
c o
I T
Cyber crimes punishable under
various Indian laws
•

S e n d i n g p o r n o g r a p h i c o r o b s c e n e e ma i l s
a r e p u n i s h a b l e u n d e r S e c t i o n 67 o f t h e I T
Ac t .

•

An o f f e n c e u n d e r t h i s s e c t i o n i s
p u n i s h a b l e o n f i r s t c o n v i c t i o n wi t h
i mp r i s o n me n t f o r a t e r m, w h i c h ma y e x t e n d
t o f i v e y e a r s a n d wi t h f i n e ,
w h i c h ma y
e x t e n d t o On e l a k h r u p e e s .

•

I n t he e v e nt of a s e
c onv i c t i on t he r e c o
i s i mp r i s o n me n t f o r
e x t e nd t o t e n y e a r s
w h i c h ma y e x t e n d t o

•

E ma i l s t h a t
puni s ha b
I ndi a n Pe na
r e c o mme n d s
y e a r s or a f

•

T h r e a t e n i n g e ma i l s a r e p u n i s h a b l e u n d e r
t he pr ov i s i ons of t he I PC pe r t a i ni ng t o

a r e
l e u
l
a n i
i ne

c on
mme
a t
a nd
T wo

d or s ubs e que nt
n d e d p u n i s h me n t
e r m, w h i c h ma y
a l s o wi t h f i n e
l a k h r upe e s .

d e f a ma t o r y i n n a t u r e a r e
n d e r S e c t i o n 500 o f t h e
C o d e (I P C ), w h i c h
mp r i s o n me n t o f u p t o t w o
or bot h.
Computer Related Crimes under IPC
and Special Laws
Sending threatening messages by email

Sec 503 IPC

Sending defamatory messages by email

Sec 499, 500 IPC

Forgery of electronic records

Sec 463, 470, 471 IPC

Bogus websites, cyber frauds

Sec 420 IPC

Email spoofing

Sec 416, 417, 463 IPC

Online sale of Drugs

NDPS Act

Web-Jacking

Sec. 383 IPC

Online sale of Arms

Arms Act
ASLU Survey published in October
2012-Incidence of Cyber crime in India

UNAUTHORISED
ACCESS 19%

E-MAIL ABUSE 21%

DATA THEFT 33%

• Non Reporting-causes
• 60% feared negative
publicity
• 23% did not know
police equipped to
handle cyber crimes
• 9% feared further cyber
attacks
• 8% had no awareness
of cyber laws
• False arrest concerns
 Indian Laws are well drafted and are capable of

handling all kinds of challenges as posed by cyber
criminals. However, the enforcement agencies
are required to be well versed with the changing
technologies and Laws.”

 "As internet technology advances so does the

threat of cyber crime. In times like these we
must protect ourselves from cyber crime. Antivirus software, firewalls and security patches
are just the beginning. Never open suspicious emails and only navigate to trusted sites.”
Some golden words…
Technology is destructive only in the
hands of people who do not realize that
they are one and the same process as
the universe.
Alan Watts
How many categories can
cyber crime be classified
into…??
When was IT Act 2000
updated?

A u g 19, 2013 10:27 P M
Facebook, the most
famous social
networking site is
widely used for cyber
crime. Can you name its
founder?

More Related Content

What's hot

Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital ageSaman Sara
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.Niloy Biswas
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation Priya Saluja
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacyJIJO CLEETUS
 

What's hot (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
it act
it actit act
it act
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 

Similar to Cyber crime

Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptxEnginAltan4
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime finalHarsha Matta
 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Skills Academy
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimeDevanshi Solanki
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsEmily Smith
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick SurveyArindam Sarkar
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
 
Analysis of Regional Phishing Attack
Analysis of Regional Phishing AttackAnalysis of Regional Phishing Attack
Analysis of Regional Phishing AttackJune Park
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreofficesolomon24
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 

Similar to Cyber crime (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
 
Cyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile WorldCyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile World
 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Analysis of Regional Phishing Attack
Analysis of Regional Phishing AttackAnalysis of Regional Phishing Attack
Analysis of Regional Phishing Attack
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Cyber crime

  • 1.
  • 2. Going to tell you about….. 1. 2. 3. 4. 5. 6. 7. 8. C y b e r C r i me T y p e s O f C y b e r C r i me C y b e r C r i me T i me l i n e F B I o n C y b e r C r i me C y b e r C r i me I n I n d i a I T A c t 2000 Su r v e y Re p o r t Co n l u s i o n
  • 3. What is Cyber Crime?  Computer crime refers to any crime that involves a computer and a network The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers to criminal exploitation of the Internet. Dr. Debarati Halder and Dr. K. Jaishankar (2011) defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".[Such crimes may threaten a nation’s security and financial health
  • 4. Types Of Cyber Crime  Computer crime encompasses a broad range of activities. Generally, however, it may be divided into two categories:  (1) crimes that target computers directly;  (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.  Crimes that primarily target computer networks or devices include:  Computer viruses  Denial-of-service attacks  Malware (malicious code)
  • 5.  C r i me s t h a t             u s e c o mp u t e r n e t wo r k s o r d e v i c e s t o a dv a nc e ot he r e nds i nc l ude : Cy b e r s t a l k i n g Fraud and identity t h e f t I n f o r ma t i o n w a r f a r e P h i s h i n g s c a ms Spa m Fraud Obscene o r o f f e n s i v e c o n t e n t Harassment Threats Drug t r a f f i c k i n g Cyber t e r r o r i s m Cyber w a r f a r e
  • 6.
  • 7. What FBI has to say..?  We are building our lives around our wired and wireless networks. The question is, are we ready to work together to defend them?  The FBI certainly is. We lead the national effort to investigate high-tech crimes, including cyber-based terrorism, espionage, computer intrusions, and major cyber fraud. To stay in front of current and emerging trends, we gather and share information and intelligence with public and private sector partners worldwide.
  • 8. Cyber Crime In India….  India scores high on the cyber crime map with all possibilities of emerging as the ‘ransom ware capital’ of the Asia Pacific region.  Presently, the country is among the world’s top five countries for the highest number of incidences of cyber crime including ransomware, identity theft and phishing incidents with the average cost per cyber victim going up from $192 last year to $207.
  • 9.
  • 10. What About our security and laws??
  • 11. IT Act of India 2000 Updated on: Aug 19, 2013 10:27 P M (I T t o f I n d i a 2000) M a y 2000, b o t h t h e h o u s e s o f e I n d i a n P a r l i a me n t p a s s e d e I n f o r ma t i o n T e c h n o l o g y l l i n A u g u s t 2000 a n d c a m e t o k n o w n a s t h e I n f o r ma t i o n c h n o l o g y A c t , 2000. b e r l a ws a r e c o n t a i n e d i n t h e A c t , 2000. i s A c t a i ms t o p r o v i d e t h e ga l i nf r a s t r uc t ur e f or e mme r c e i n I n d i a A c t , 2000 s h o w s t h e l e g a l L a s t     Ac I n t h t h Bi be Te Cy I T Th l e c o I T
  • 12.
  • 13. Cyber crimes punishable under various Indian laws • S e n d i n g p o r n o g r a p h i c o r o b s c e n e e ma i l s a r e p u n i s h a b l e u n d e r S e c t i o n 67 o f t h e I T Ac t . • An o f f e n c e u n d e r t h i s s e c t i o n i s p u n i s h a b l e o n f i r s t c o n v i c t i o n wi t h i mp r i s o n me n t f o r a t e r m, w h i c h ma y e x t e n d t o f i v e y e a r s a n d wi t h f i n e , w h i c h ma y e x t e n d t o On e l a k h r u p e e s . • I n t he e v e nt of a s e c onv i c t i on t he r e c o i s i mp r i s o n me n t f o r e x t e nd t o t e n y e a r s w h i c h ma y e x t e n d t o • E ma i l s t h a t puni s ha b I ndi a n Pe na r e c o mme n d s y e a r s or a f • T h r e a t e n i n g e ma i l s a r e p u n i s h a b l e u n d e r t he pr ov i s i ons of t he I PC pe r t a i ni ng t o a r e l e u l a n i i ne c on mme a t a nd T wo d or s ubs e que nt n d e d p u n i s h me n t e r m, w h i c h ma y a l s o wi t h f i n e l a k h r upe e s . d e f a ma t o r y i n n a t u r e a r e n d e r S e c t i o n 500 o f t h e C o d e (I P C ), w h i c h mp r i s o n me n t o f u p t o t w o or bot h.
  • 14. Computer Related Crimes under IPC and Special Laws Sending threatening messages by email Sec 503 IPC Sending defamatory messages by email Sec 499, 500 IPC Forgery of electronic records Sec 463, 470, 471 IPC Bogus websites, cyber frauds Sec 420 IPC Email spoofing Sec 416, 417, 463 IPC Online sale of Drugs NDPS Act Web-Jacking Sec. 383 IPC Online sale of Arms Arms Act
  • 15. ASLU Survey published in October 2012-Incidence of Cyber crime in India UNAUTHORISED ACCESS 19% E-MAIL ABUSE 21% DATA THEFT 33% • Non Reporting-causes • 60% feared negative publicity • 23% did not know police equipped to handle cyber crimes • 9% feared further cyber attacks • 8% had no awareness of cyber laws • False arrest concerns
  • 16.  Indian Laws are well drafted and are capable of handling all kinds of challenges as posed by cyber criminals. However, the enforcement agencies are required to be well versed with the changing technologies and Laws.”  "As internet technology advances so does the threat of cyber crime. In times like these we must protect ourselves from cyber crime. Antivirus software, firewalls and security patches are just the beginning. Never open suspicious emails and only navigate to trusted sites.”
  • 17. Some golden words… Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe. Alan Watts
  • 18.
  • 19. How many categories can cyber crime be classified into…??
  • 20. When was IT Act 2000 updated? A u g 19, 2013 10:27 P M
  • 21. Facebook, the most famous social networking site is widely used for cyber crime. Can you name its founder?