SlideShare a Scribd company logo
What is Cyber crime ? 
Cyber crime is a crime committed over the Internet. 
 It could be against the government, property and 
against any person in various forms. 
 The law enforcement agencies are facing difficulties 
in dealing with cyber crime. 
 In India, Information Technology Act, 2000 is the 
legislation that deals with issue related to cyber crime.
HISTORY 
 The first recorded cyber crime took place in the year 
1820 in FRANCE 
 Joseph-Marie Jacquard, a textile manufacturer in 
France, produced the loom 
 This device allowed the repetition of a series of steps 
in the weaving of special fabrics. 
 This resulted in a fear amongst employees that their 
tradiotional employment was being threatened 
 They committed acts of sabotage(Destruction of 
property or obstruction of normal operations, as by 
civilians or enemy agents in time of war.) to 
discourge further use of the new technology
Introduction 
 Advancements in modern technology have 
helped countries develop and expand their 
communication networks, enabling faster 
and easier networking and information 
exchange. 
 Currently, there are nearly 2 billion internet 
users and over 5 billion mobile phone 
connections worldwide. 
 Every day, 294 billion emails and 5 billion 
phone messages are exchanged.
As businesses and societies in general 
increasingly rely on computers and internet-based 
networking, cyber crime and digital 
attack incidents have increased around the 
world. 
 These attacks — generally classified as any 
crime that involves the use of a computer 
network — include financial scams, 
computer hacking, downloading 
pornographic images from the internet, virus 
attacks, e-mail stalking and creating 
websites that promote racial hatred.
The first major instance of cyber crime was 
reported in 2000, when a mass-mailed 
computer virus affected nearly 45 million 
computer users worldwide 
 In 2011, at least 2.3 billion people, the 
equivalent of more than one third of the 
world’s total population, had access to the 
internet 
 Over 60 per cent of all internet users are in 
developing countries, with 45 per cent of all 
internet users below the age of 25 years.
 In the hyperconnected world of tomorrow, it 
will become hard to imagine a ‘computer 
crime’, and perhaps any crime, that does not 
involve electronic evidence linked with 
internet protocol (IP) connectivity. 
 In 2009, the cost of information lost to cyber 
crime nearly doubled, from US$265 million in 
2008 to US$560 million
CYBER CRIMINALS 
 Kids (age group 9-16 ) 
 Organized hacktivists 
 Disgruntled employees 
 Professional hackers (corporate 
espionage)
TYPES OF CYBER CRIME 
 Financial crimes- cheating, credit card 
frauds , money laundering forgery etc . 
 Sale of illegal articles: 
 Online gambling 
 Intellectual Property crimes 
 Theft of information contained in 
electronic form 
 E-mail bombing
 Data Diddling 
 Salami attacks 
 E-mail spoofing 
 Cyber defamation 
 Hacking 
 Trojan attacks 
 Phishing
E-mail spoofing 
 The sender address and other parts of the 
e-mail header are altered 
 Form , Return-Path and Reply to fields 
 Although the e-mail appears to come from 
the address indicated in the Form field it 
actually comes from another source 
 Prevention 
i. Antivirus 
ii. Use cryptographic signatures
E-mail spoofing
Salami Attack 
 A series of minor attacks that togrther 
results in a larger attack 
 Used for financial crimes in which criminals 
steal money or resources a bit at a time 
from a system 
 Preventation 
i. Find indications of an attack 
ii. Random audits 
iii. Don’t ignor what appears to be errors in 
computer-based financial systems
Data Diddling 
o Changing of data before or during entry 
into the computer system 
o Forging or counterfeiting documents 
used for data entry 
o Exchanging valid disks and tapes with 
modified replacements 
o Prevention 
i. Regular audits 
ii. Supervising employees
Cyber crime – a growing 
challenge for governments 
o In a digital age, where online communication 
has become the norm, internet users and 
governments face increased risks of becoming 
the targets of cyber attacks. As cyber criminals 
continue to develop and advance their 
techniques, they are also shifting their targets 
— focusing less on theft of financial 
information and more on business espionage 
and accessing government information. To 
fight fast-spreading cyber crime, governments 
must collaborate globally to develop an 
effective model that will control the threat.
Cost of cyber crime in india 
 29.9 million people felt victim to cyber 
crime 
 $4 billion in direct financial losses, 
 $3.6 billion in time spent resolving the 
crime, 
 4 in 5 online adults (80%) have been a 
victim of cybercrime 
 17% of adults online have experienced 
cybercrime on their mobile phones.
LAW ENFORCEMENT 
Section 66: Hacking 
 Destruction, deletion, alteration, diminishing 
value or utility or injuriously affecting 
informaion residing in a computer resource 
 Punishment 
Imprisonment up to three years, and fine up 
to 2 lac 
Section 70: Protected System 
 Securing unauthorised access or attempting 
to secure unauthorised access to protected 
system 
 Punishment 
Imprisonment up to 10 years and fine
Sec 67: Pronography 
 Publishing or transmitting or causing to be 
published in the electronic form 
 Obscene material 
 Punishment 
 On first conviction 
Imprisonment of either description up to five 
years and fine up to 1 lac rupees 
 On subesquent conviction 
Imprisonment of either description up to 10 
years and fine up to 2 lac rupees
Sending threatening messages by e-mail Sec 503 IPC 
Sending offensive messages by e-mail Sec 499, 500 IPC 
Forgery of electronic records Sec 463, 470, 471 IPC 
Bogus websites,cyber frauds Sec 420 IPC 
Email spoofing Sec 416, 417, 463 IPC 
Online sale of drugs NDPS Act 
Web-Jacking Sec 383 IPC 
Online sale of arms Arms Act
Dispute Resolution in Cyberspace 
 Indian Laws 
i. Information Technology Act, 2000 
ii. Information Technology (Amendment) Act, 2008 
iii. Cyber crime investigation cell 
iv. Communications convergence Bill, 2001 
v. Cyber security forum-Joint collaboration between 
India and U.S. 
i. E-Governance and E-Policy 
ii. Punishments 
 International initiatives 
i. Arbitration and Mediation- Conventions 
ii. World Intellectual Property Organisation (WIPO) 
iii. Council of Europe Convention on cyber crime 
iv. Cyber Tribunals
Prevention 
 Never disclose your personal 
information publicly on websites. This is 
as good as disclosing your identity to 
strangers in public place 
 Always avoid sending any photograph 
online particularly to strangers and chat 
friends as there have been incidents of 
misuse of the photographs
 Never enter your credit card number to any 
site that is not secured, to prevent its misuse 
 Always keep a watch on the sites that your 
children are accessing to prevent any kind of 
harassment or depravation in children 
 Always use latest and updated Antivirus 
software to guard against virus attacks 
 To prevent loss of data due to virus attacks, 
always keep back up of your data. 
 It is advisable to use a security program that 
gives control over the cookies and send 
information back to the site, as leaving the 
cookies unguarded might prove fatal
 Use of firewalls proves beneficial 
 Website owners should watch traffic and 
check any irregularity on the site. Putting 
host-based intrusion detection devices on 
servers will serve the purpose
Solution 
 An important question arises that how can 
these crimes be prevented 
 A number of techniques & solution have been 
presented but the problem still exists & are 
increasing day by day 
 Antivirus & Anti Spyware Software: 
Antivirus software consists of computer 
programs that attempt to identify, thwart & 
eliminate computer viruses & other malicious 
software. Anti spy wares are used to restrict 
backdoor program, trojans & other spy wares 
to be installed on the computer
 Firewalls: 
A firewall protect a computer network form 
unauthorized access. Network firewalls may 
be hardware devices, software programs, or 
a combination of the two. A network firewall 
typically guards an internal computer 
network against malicious access from 
outside the network 
 Cyber security must be pursued with the 
same intensity as efforts to eradicate global 
poverty or tackle climate change
CONCLUSION…. 
 Indian laws are well drafted & are capable of 
handling all kinds of challenges as posed by 
cyber criminals. However, the enforcement 
agencies are required to be well versed with 
the changing technologies & laws 
 As internet technology advances so does the 
threat of cyber crime. In times like these we 
must protect ourselves from cyber crime. Anti-virus 
software, firewalls & security patches are 
just the beginning. Never open suspicious e-mails 
& only navigate to trusted sites.
PRACHI

More Related Content

What's hot

Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
ishmecse13
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
Cybercrime
CybercrimeCybercrime
Cybercrime
John Ela Echon
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreofficesolomon24
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
Vaibhav's Group
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
kg19
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
S.M.Mustofa Kauser
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
Faridah Husin
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
Maruti Nandan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Arslan Meher
 
Scenario of social network crime in bangladesh
Scenario of social network crime in bangladeshScenario of social network crime in bangladesh
Scenario of social network crime in bangladesh
Bank Alfalah Limited
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamationTuhin Batra
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
Rajveer Choudhary
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
mayur_ceh
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Yash Aggarwal
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
homeworkping4
 

What's hot (20)

Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Scenario of social network crime in bangladesh
Scenario of social network crime in bangladeshScenario of social network crime in bangladesh
Scenario of social network crime in bangladesh
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 

Viewers also liked

A Vision of Cybercrime in Italy
A Vision of Cybercrime in ItalyA Vision of Cybercrime in Italy
A Vision of Cybercrime in Italy
Matteo Cavallini
 
CRIMES NA INTERNET
CRIMES NA INTERNETCRIMES NA INTERNET
CRIMES NA INTERNET
Nete quirino
 
Cybercrime in the Modern Market - Legal Remedies Offshore
Cybercrime in the Modern Market - Legal Remedies OffshoreCybercrime in the Modern Market - Legal Remedies Offshore
Cybercrime in the Modern Market - Legal Remedies Offshore
bakerpartners
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
Billy Warero
 
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...Cédric Laurant
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articles
Chamath Sajeewa
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Goutama Bachtiar
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
German Teran
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)Siddharth Anand
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
Dinesh O Bareja
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Dinesh O Bareja
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Imran batada
Imran batadaImran batada
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (18)

CTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu MkandawireCTO Fellowship Report Presentation - Lusungu Mkandawire
CTO Fellowship Report Presentation - Lusungu Mkandawire
 
A Vision of Cybercrime in Italy
A Vision of Cybercrime in ItalyA Vision of Cybercrime in Italy
A Vision of Cybercrime in Italy
 
CRIMES NA INTERNET
CRIMES NA INTERNETCRIMES NA INTERNET
CRIMES NA INTERNET
 
Cybercrime in the Modern Market - Legal Remedies Offshore
Cybercrime in the Modern Market - Legal Remedies OffshoreCybercrime in the Modern Market - Legal Remedies Offshore
Cybercrime in the Modern Market - Legal Remedies Offshore
 
CYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEWCYBERCRIME: AN OVERVIEW
CYBERCRIME: AN OVERVIEW
 
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
Cybercrimes in Europe - Recent Legal and Policy Developments (Fecomercio-SP, ...
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articles
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Imran batada
Imran batadaImran batada
Imran batada
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Cyber crime

Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
Ajnish Rana
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
kirtigoyal328
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
amit_shanu
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
VipinRawat52
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
MehediHasan996
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
Jody Sullivan
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Farjana Akter
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
Sourav Kumar Mund
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
Anjana Ks
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Debayon Saha
 
cyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testingcyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testing
akshayathetopper
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
ssuser24dae7
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
VivekanandaGN1
 

Similar to Cyber crime (20)

Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
English in written
English in writtenEnglish in written
English in written
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testingcyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testing
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 

Recently uploaded

JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 

Recently uploaded (20)

JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 

Cyber crime

  • 1.
  • 2. What is Cyber crime ? Cyber crime is a crime committed over the Internet.  It could be against the government, property and against any person in various forms.  The law enforcement agencies are facing difficulties in dealing with cyber crime.  In India, Information Technology Act, 2000 is the legislation that deals with issue related to cyber crime.
  • 3. HISTORY  The first recorded cyber crime took place in the year 1820 in FRANCE  Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom  This device allowed the repetition of a series of steps in the weaving of special fabrics.  This resulted in a fear amongst employees that their tradiotional employment was being threatened  They committed acts of sabotage(Destruction of property or obstruction of normal operations, as by civilians or enemy agents in time of war.) to discourge further use of the new technology
  • 4.
  • 5. Introduction  Advancements in modern technology have helped countries develop and expand their communication networks, enabling faster and easier networking and information exchange.  Currently, there are nearly 2 billion internet users and over 5 billion mobile phone connections worldwide.  Every day, 294 billion emails and 5 billion phone messages are exchanged.
  • 6. As businesses and societies in general increasingly rely on computers and internet-based networking, cyber crime and digital attack incidents have increased around the world.  These attacks — generally classified as any crime that involves the use of a computer network — include financial scams, computer hacking, downloading pornographic images from the internet, virus attacks, e-mail stalking and creating websites that promote racial hatred.
  • 7. The first major instance of cyber crime was reported in 2000, when a mass-mailed computer virus affected nearly 45 million computer users worldwide  In 2011, at least 2.3 billion people, the equivalent of more than one third of the world’s total population, had access to the internet  Over 60 per cent of all internet users are in developing countries, with 45 per cent of all internet users below the age of 25 years.
  • 8.  In the hyperconnected world of tomorrow, it will become hard to imagine a ‘computer crime’, and perhaps any crime, that does not involve electronic evidence linked with internet protocol (IP) connectivity.  In 2009, the cost of information lost to cyber crime nearly doubled, from US$265 million in 2008 to US$560 million
  • 9. CYBER CRIMINALS  Kids (age group 9-16 )  Organized hacktivists  Disgruntled employees  Professional hackers (corporate espionage)
  • 10. TYPES OF CYBER CRIME  Financial crimes- cheating, credit card frauds , money laundering forgery etc .  Sale of illegal articles:  Online gambling  Intellectual Property crimes  Theft of information contained in electronic form  E-mail bombing
  • 11.  Data Diddling  Salami attacks  E-mail spoofing  Cyber defamation  Hacking  Trojan attacks  Phishing
  • 12.
  • 13. E-mail spoofing  The sender address and other parts of the e-mail header are altered  Form , Return-Path and Reply to fields  Although the e-mail appears to come from the address indicated in the Form field it actually comes from another source  Prevention i. Antivirus ii. Use cryptographic signatures
  • 15. Salami Attack  A series of minor attacks that togrther results in a larger attack  Used for financial crimes in which criminals steal money or resources a bit at a time from a system  Preventation i. Find indications of an attack ii. Random audits iii. Don’t ignor what appears to be errors in computer-based financial systems
  • 16. Data Diddling o Changing of data before or during entry into the computer system o Forging or counterfeiting documents used for data entry o Exchanging valid disks and tapes with modified replacements o Prevention i. Regular audits ii. Supervising employees
  • 17. Cyber crime – a growing challenge for governments o In a digital age, where online communication has become the norm, internet users and governments face increased risks of becoming the targets of cyber attacks. As cyber criminals continue to develop and advance their techniques, they are also shifting their targets — focusing less on theft of financial information and more on business espionage and accessing government information. To fight fast-spreading cyber crime, governments must collaborate globally to develop an effective model that will control the threat.
  • 18.
  • 19. Cost of cyber crime in india  29.9 million people felt victim to cyber crime  $4 billion in direct financial losses,  $3.6 billion in time spent resolving the crime,  4 in 5 online adults (80%) have been a victim of cybercrime  17% of adults online have experienced cybercrime on their mobile phones.
  • 20. LAW ENFORCEMENT Section 66: Hacking  Destruction, deletion, alteration, diminishing value or utility or injuriously affecting informaion residing in a computer resource  Punishment Imprisonment up to three years, and fine up to 2 lac Section 70: Protected System  Securing unauthorised access or attempting to secure unauthorised access to protected system  Punishment Imprisonment up to 10 years and fine
  • 21. Sec 67: Pronography  Publishing or transmitting or causing to be published in the electronic form  Obscene material  Punishment  On first conviction Imprisonment of either description up to five years and fine up to 1 lac rupees  On subesquent conviction Imprisonment of either description up to 10 years and fine up to 2 lac rupees
  • 22. Sending threatening messages by e-mail Sec 503 IPC Sending offensive messages by e-mail Sec 499, 500 IPC Forgery of electronic records Sec 463, 470, 471 IPC Bogus websites,cyber frauds Sec 420 IPC Email spoofing Sec 416, 417, 463 IPC Online sale of drugs NDPS Act Web-Jacking Sec 383 IPC Online sale of arms Arms Act
  • 23. Dispute Resolution in Cyberspace  Indian Laws i. Information Technology Act, 2000 ii. Information Technology (Amendment) Act, 2008 iii. Cyber crime investigation cell iv. Communications convergence Bill, 2001 v. Cyber security forum-Joint collaboration between India and U.S. i. E-Governance and E-Policy ii. Punishments  International initiatives i. Arbitration and Mediation- Conventions ii. World Intellectual Property Organisation (WIPO) iii. Council of Europe Convention on cyber crime iv. Cyber Tribunals
  • 24. Prevention  Never disclose your personal information publicly on websites. This is as good as disclosing your identity to strangers in public place  Always avoid sending any photograph online particularly to strangers and chat friends as there have been incidents of misuse of the photographs
  • 25.  Never enter your credit card number to any site that is not secured, to prevent its misuse  Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children  Always use latest and updated Antivirus software to guard against virus attacks  To prevent loss of data due to virus attacks, always keep back up of your data.  It is advisable to use a security program that gives control over the cookies and send information back to the site, as leaving the cookies unguarded might prove fatal
  • 26.  Use of firewalls proves beneficial  Website owners should watch traffic and check any irregularity on the site. Putting host-based intrusion detection devices on servers will serve the purpose
  • 27. Solution  An important question arises that how can these crimes be prevented  A number of techniques & solution have been presented but the problem still exists & are increasing day by day  Antivirus & Anti Spyware Software: Antivirus software consists of computer programs that attempt to identify, thwart & eliminate computer viruses & other malicious software. Anti spy wares are used to restrict backdoor program, trojans & other spy wares to be installed on the computer
  • 28.  Firewalls: A firewall protect a computer network form unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two. A network firewall typically guards an internal computer network against malicious access from outside the network  Cyber security must be pursued with the same intensity as efforts to eradicate global poverty or tackle climate change
  • 29. CONCLUSION….  Indian laws are well drafted & are capable of handling all kinds of challenges as posed by cyber criminals. However, the enforcement agencies are required to be well versed with the changing technologies & laws  As internet technology advances so does the threat of cyber crime. In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls & security patches are just the beginning. Never open suspicious e-mails & only navigate to trusted sites.