The document discusses cyber crimes in India. It provides statistics on the scale and costs of cyber crimes. Some key points made are:
- India ranks 11th globally for cyber crimes, constituting 3% of the total. Common crimes include phishing, hacking, and software piracy.
- In 2015, 29.9 million Indians fell victim to cyber crimes costing $4 billion in direct losses and $3.6 billion in time to resolve issues.
- The IT Act of 2000 and its amendments in 2008 established laws against hacking, privacy violations, identity theft, and other cyber crimes.
The document discusses cyber crimes in India, including common types like hacking, phishing, and identity theft. It notes that India has experienced increases in these crimes due to a growing internet user base. The document outlines relevant sections of India's Information Technology Act 2000 regarding hacking, unauthorized access, and other cyber crimes and punishments. It provides statistics on reported cyber crimes and arrests in India between 2007-2010. It concludes that enforcement agencies must keep pace with evolving technologies and laws to effectively tackle cyber crimes in the future.
Cyber crime refers to criminal activity involving computers or networks, where they are tools, targets, or places of crime. Common cyber crimes in India include phishing, fraud, and intellectual property theft. The document outlines several types of cyber crimes such as hacking, cyber stalking, and phishing. It also discusses Indian cyber laws and prevention methods. Overall, the document provides an overview of cyber crimes in India, the relevant laws, and importance of prevention through security measures and awareness.
This document discusses cyber defamation under Indian law. It provides an overview of cyber crimes and defamation, and examines the liabilities, remedies, and damages available. The Information Technology Act of 2000 is the primary legislation covering cyber crimes, though it does not specifically address cyber defamation. Defamation cases can be civil or criminal in nature. The document analyzes several relevant court cases and discusses challenges around key concepts like publication and the liability of internet service providers.
This document summarizes cybercrime and its impact in Bangladesh. It discusses the types and profiles of cybercriminals, as well as the reasons for and impacts of cybercrime. The legal responses to cybercrime in Bangladesh are also outlined, including the establishment of cyber tribunals. The document concludes that while small-scale cybercrime currently occurs, the extensive use of information technology increases the potential threat, so vigilance is needed.
This document summarizes a presentation on cybercrime and its impact in Bangladesh. It discusses the types of cybercrimes like hacking and viruses, as well as the profiles of cybercriminals. The document outlines the impacts of cybercrime on individuals, organizations, and society through crimes like identity theft, fraud, and harassment. It also discusses Bangladesh's legal response to cybercrime through the ICT Act and the establishment of cyber tribunals. The conclusion acknowledges that while notable cybercrimes have yet to be committed in Bangladesh, increased technology usage raises the potential threat of future cybercrimes.
Cyber Crime and Cyber security .
it has been estimated that the cost of crimes committed, annually,would increase from $3 trillion to $6 trillion by 2021. with increase of cyber crimes, the needs for professionls to secure the system from such attacks has risen up.
The document discusses cybercrime and computer misuse cases in Mauritius and African regions. It profiles several Mauritian cybercriminals who engaged in hacking, sabotage, and unauthorized computer access. Cases of computer misuse in Mauritius include phishing schemes and international call diversion. Common cybercrimes in Nigeria, South Africa, and Ghana are also examined, along with relevant legislation in African countries. The challenges of fighting cybercrime in Mauritius are discussed, along with the roles of the Cyber Crime Unit and CERT-MU.
The document discusses cyber crimes in India, including common types like hacking, phishing, and identity theft. It notes that India has experienced increases in these crimes due to a growing internet user base. The document outlines relevant sections of India's Information Technology Act 2000 regarding hacking, unauthorized access, and other cyber crimes and punishments. It provides statistics on reported cyber crimes and arrests in India between 2007-2010. It concludes that enforcement agencies must keep pace with evolving technologies and laws to effectively tackle cyber crimes in the future.
Cyber crime refers to criminal activity involving computers or networks, where they are tools, targets, or places of crime. Common cyber crimes in India include phishing, fraud, and intellectual property theft. The document outlines several types of cyber crimes such as hacking, cyber stalking, and phishing. It also discusses Indian cyber laws and prevention methods. Overall, the document provides an overview of cyber crimes in India, the relevant laws, and importance of prevention through security measures and awareness.
This document discusses cyber defamation under Indian law. It provides an overview of cyber crimes and defamation, and examines the liabilities, remedies, and damages available. The Information Technology Act of 2000 is the primary legislation covering cyber crimes, though it does not specifically address cyber defamation. Defamation cases can be civil or criminal in nature. The document analyzes several relevant court cases and discusses challenges around key concepts like publication and the liability of internet service providers.
This document summarizes cybercrime and its impact in Bangladesh. It discusses the types and profiles of cybercriminals, as well as the reasons for and impacts of cybercrime. The legal responses to cybercrime in Bangladesh are also outlined, including the establishment of cyber tribunals. The document concludes that while small-scale cybercrime currently occurs, the extensive use of information technology increases the potential threat, so vigilance is needed.
This document summarizes a presentation on cybercrime and its impact in Bangladesh. It discusses the types of cybercrimes like hacking and viruses, as well as the profiles of cybercriminals. The document outlines the impacts of cybercrime on individuals, organizations, and society through crimes like identity theft, fraud, and harassment. It also discusses Bangladesh's legal response to cybercrime through the ICT Act and the establishment of cyber tribunals. The conclusion acknowledges that while notable cybercrimes have yet to be committed in Bangladesh, increased technology usage raises the potential threat of future cybercrimes.
Cyber Crime and Cyber security .
it has been estimated that the cost of crimes committed, annually,would increase from $3 trillion to $6 trillion by 2021. with increase of cyber crimes, the needs for professionls to secure the system from such attacks has risen up.
The document discusses cybercrime and computer misuse cases in Mauritius and African regions. It profiles several Mauritian cybercriminals who engaged in hacking, sabotage, and unauthorized computer access. Cases of computer misuse in Mauritius include phishing schemes and international call diversion. Common cybercrimes in Nigeria, South Africa, and Ghana are also examined, along with relevant legislation in African countries. The challenges of fighting cybercrime in Mauritius are discussed, along with the roles of the Cyber Crime Unit and CERT-MU.
This document summarizes several cases related to cybercrime laws in India. It discusses cases involving online credit card fraud on eBay, an SMS scam that defrauded 50,000 people of 400 million rupees, the first conviction in an Indian cybercrime case involving the website Sony-sambandh.com, a call center fraud targeting Citibank customers, and India's first ATM card fraud case. The document provides details on the nature of the crimes and outcomes like arrests in these landmark cybercrime cases in India.
The document discusses cyber crime and the Information Technology Act 2000 in India. It provides an overview of the growth of internet usage, the objectives of the IT Act to provide legal recognition to electronic records and digital signatures. It describes some cyber crimes like hacking, publishing obscene material, and breach of privacy. It discusses the types of cyber crimes like denial of service attacks, viruses, software piracy, and credit card fraud. It also summarizes some recent cases of cyber crimes in India.
What constitutes a cyber crime in the countryUjjwal Tripathi
This document discusses cyber crimes and the laws surrounding them. It defines cyber crime as illegal acts committed through computers or against computer systems. Some common types of cyber crimes mentioned include hacking, virus dissemination, intellectual property crimes, software piracy, email spoofing, and phishing. Existing laws for combating cyber crimes in the US and India are also outlined, such as the US Computer Fraud and Abuse Act and India's Information Technology Act of 2000. The goal of the IT Act is to provide legal recognition for electronic transactions and commerce.
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
This document summarizes key points from a presentation on Pakistan's Prevention of Electronic Crimes Bill 2007, including definitions of cyber crimes, investigative powers, and international cooperation provisions. It notes areas where the bill's language differs from international standards or could impact businesses. The presentation raises concerns that only 20% of the bill is compatible with global frameworks and urges consideration of proper safeguards and balance between law enforcement and human rights.
This document discusses cybercrime and how to prevent becoming a victim. It begins by explaining why we should be aware of cybercrime given our increasing online activities. The objectives are then outlined as providing awareness of cybercrime, recognizing methods, understanding cyber laws, and learning to avoid victimization. Various types of cybercrime are defined including those against persons, property, and government. Examples like phishing, hacking, and cyber terrorism are described. The history of cybercrime in India involves many website hacks and defacements. Laws are still lacking to fully address cybercrime. Awareness, security software, and caution are recommended for protection.
Cyber crime a potential threat and remediesIJARIIT
Cybercrime is an illegal activity performed by an individual or by a group of experts in computer technology using
the Internet. It ranges from stealing money online from an individual to big corporate using the internet. In the present era of
information technology, the computer has made the life easy. People use computer or mobile to perform various jobs on the
Internet. So it is necessary to know how to perform various transactions on the internet safely. Everyone is prone to the attack
from the cyber criminals. One must be aware and should have knowledge of cybercrime.
This document provides an overview of cyber crime law in the Philippines. It defines cyber crime and outlines various types, including hacking, denial of service attacks, software piracy, pornography, and credit card fraud. It discusses the history and purpose of cyber crime law in the Philippines. It also outlines punishments and penalties for different cyber crimes, as well as tips for protecting yourself from cyber crime.
Overview of Computer & Internet Crimes in Indiagsmonga
The document discusses computer and internet laws in India. It outlines various types of computer and internet crimes, such as hacking, data theft, cyber terrorism, and intellectual property theft. It then summarizes India's main laws regarding cyber crimes, including the Information Technology Act of 2000 and its 2008 amendment. The amendment expands the scope of cyber crimes and increases penalties for offenses involving identity theft, child pornography, and violation of privacy. The conclusion states that while Indian laws adequately address cyber crimes, enforcement agencies must keep up with changing technologies.
The document discusses cyber crime and the IT Act in India. It defines cyber crime narrowly as offenses outlined in the IT Act and broadly as illegal acts using the internet. Cyber crimes are classified as old crimes committed online, new internet-created crimes, and using the internet to enable old crimes. The IT Act covers hacking, cyber pornography, and cyber fraud. It discusses provisions for tampering with computer source code, cyber terrorism, and defines key cyber crimes and offenses under the act. It also provides tips for individuals and organizations to prevent cyber crimes like using strong passwords, firewalls, and keeping systems updated.
This document provides a case study on cyber crime. It begins with an introduction discussing the evolution of cyber crime and how the internet has provided opportunities for criminal activity. It then describes several categories of common cyber crimes like spam, fraud, and information theft. The document also discusses tools used in cyber crimes such as bots, keyloggers, and social engineering. It provides examples of real world cyber crime cases and current crime news. Statistics on cyber crime are presented and the document concludes with a discussion of how cyber crime has become a major issue.
The document discusses cyber crimes and the evolution of cyber threats. It provides examples of different types of cyber crimes such as credit card fraud, cyber pornography, intellectual property crimes, and phishing. The document also summarizes Indian laws related to cyber crimes and discusses challenges with enforcement of cyber crime laws in India such as lack of awareness and concerns about negative publicity or further attacks. It advocates for better enforcement initiatives such as increased public awareness campaigns, training of police officers, and coordination between law enforcement agencies to more effectively combat cyber crimes.
This document discusses cybercrime and provides information on various related topics. It begins with definitions of cybercrime and descriptions of some notorious cybercriminals. Statistics on the top 20 countries for cybercrime are presented from a Symantec report. Cyber attacks are analyzed based on motivation and technique. The document also summarizes the major Bangladesh Bank cyber heist in 2016 and the security and policy implications. Finally it outlines some common cyber security measures.
The document discusses various types of cybercrimes and email related crimes under Indian law. It provides examples and explanations of different cybercrimes like hacking, data theft, virus spreading, and intellectual property violations. It also examines specific email crimes such as phishing, spoofing, lottery scams, and sending threatening/explicit emails. For each crime, it summarizes the applicable Indian laws and sections along with examples of legal cases.
The document discusses the benefits and risks of internet usage and e-banking. It outlines how the internet has changed communication and access to information. However, it has also led to increased cybercrime like hacking, phishing, and identity theft. E-banking provides convenience but lacks security. Users must be aware of threats and protect their personal information. Overall, the internet and e-banking are useful if used properly and with adequate security measures.
This document outlines the agenda and topics covered in a presentation on cyber crime. The presentation discusses the definition of cyber crime, the major players involved, common money laundering and anonymous purchasing techniques, and gives a live demonstration of how to anonymously conduct illegal activities online. Key points covered include the international nature of cyber crimes, challenges with legal accountability across borders, common cyber crime products and services, and the use of technologies like TOR and cryptocurrencies to conduct activities anonymously.
Assignment of cyber crimes for oumh1203Faridah Husin
This document discusses cyber crimes in Malaysia and the United States. It begins with an introduction that defines cyber crime and its scope. It then covers classifications of cyber crimes such as those against individuals, property, organizations, and society. The document compares cyber crimes between Malaysia and the US, noting that the US leads in identity theft and phishing while Malaysia's most common crimes are malware, scams, and mobile threats. It concludes with suggestions on curbing cyber crimes such as education, using firewalls and security software, practicing safe online behavior, and using strong passwords.
This document provides an overview of cybercrime in Pakistan. It begins with definitions of cybercrime and discusses major online activities and categories of cybercrime such as hacking, identity theft, and financial fraud. It then examines specific cybercrimes in more depth like hacking, website defacement, cyberbullying, child pornography, and social engineering. The document concludes by noting the role of Pakistan in cybercrime.
The document discusses cyber crime in Nepal. It defines cyber crime and provides examples such as social media related crimes, piracy, fake profiles, threatening emails, website hacking, and unauthorized access. The document notes that cyber crime is a growing problem in Nepal and outlines the types of cyber crimes occurring there such as social media crimes, piracy, fake marketing, threatening emails, website hacking, unauthorized access, and restricted online businesses. It also discusses the effects of cyber crimes and Nepal's efforts to combat cyber crimes.
This document discusses cybercrime and cyber laws in India. It defines cybercrime as crimes committed using computers and the internet, such as identity theft, hacking, and spreading viruses. The first recorded cybercrime took place in 1820 when employees sabotaged a new textile loom technology out of fear for their jobs. Common cybercrimes discussed include hacking, phishing, software piracy, and cyberbullying. The document also outlines key sections of India's Information Technology Act that pertains to cybercrime and establishes punishments such as fines and imprisonment. In recent years, India has experienced increasing cybercrime and is now ranked 4th globally for incidents.
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
The document defines and discusses various types of cyber crimes. It begins by defining cybercrime as any unlawful act involving computers and networks. There are two main types - crimes that target computers directly through malware or denial of service attacks, and crimes that use computers to enable other illegal acts. Cybercrimes are further classified based on their targets, including individual, property, organizational, and societal crimes.
The document then lists and describes 16 specific types of cybercrimes such as child pornography, cyberbullying, cyberstalking, phishing, ransomware, and software piracy. It concludes by providing 7 tips for preventing cybercrimes, such as using security programs, safe online practices,
This document summarizes several cases related to cybercrime laws in India. It discusses cases involving online credit card fraud on eBay, an SMS scam that defrauded 50,000 people of 400 million rupees, the first conviction in an Indian cybercrime case involving the website Sony-sambandh.com, a call center fraud targeting Citibank customers, and India's first ATM card fraud case. The document provides details on the nature of the crimes and outcomes like arrests in these landmark cybercrime cases in India.
The document discusses cyber crime and the Information Technology Act 2000 in India. It provides an overview of the growth of internet usage, the objectives of the IT Act to provide legal recognition to electronic records and digital signatures. It describes some cyber crimes like hacking, publishing obscene material, and breach of privacy. It discusses the types of cyber crimes like denial of service attacks, viruses, software piracy, and credit card fraud. It also summarizes some recent cases of cyber crimes in India.
What constitutes a cyber crime in the countryUjjwal Tripathi
This document discusses cyber crimes and the laws surrounding them. It defines cyber crime as illegal acts committed through computers or against computer systems. Some common types of cyber crimes mentioned include hacking, virus dissemination, intellectual property crimes, software piracy, email spoofing, and phishing. Existing laws for combating cyber crimes in the US and India are also outlined, such as the US Computer Fraud and Abuse Act and India's Information Technology Act of 2000. The goal of the IT Act is to provide legal recognition for electronic transactions and commerce.
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
This document summarizes key points from a presentation on Pakistan's Prevention of Electronic Crimes Bill 2007, including definitions of cyber crimes, investigative powers, and international cooperation provisions. It notes areas where the bill's language differs from international standards or could impact businesses. The presentation raises concerns that only 20% of the bill is compatible with global frameworks and urges consideration of proper safeguards and balance between law enforcement and human rights.
This document discusses cybercrime and how to prevent becoming a victim. It begins by explaining why we should be aware of cybercrime given our increasing online activities. The objectives are then outlined as providing awareness of cybercrime, recognizing methods, understanding cyber laws, and learning to avoid victimization. Various types of cybercrime are defined including those against persons, property, and government. Examples like phishing, hacking, and cyber terrorism are described. The history of cybercrime in India involves many website hacks and defacements. Laws are still lacking to fully address cybercrime. Awareness, security software, and caution are recommended for protection.
Cyber crime a potential threat and remediesIJARIIT
Cybercrime is an illegal activity performed by an individual or by a group of experts in computer technology using
the Internet. It ranges from stealing money online from an individual to big corporate using the internet. In the present era of
information technology, the computer has made the life easy. People use computer or mobile to perform various jobs on the
Internet. So it is necessary to know how to perform various transactions on the internet safely. Everyone is prone to the attack
from the cyber criminals. One must be aware and should have knowledge of cybercrime.
This document provides an overview of cyber crime law in the Philippines. It defines cyber crime and outlines various types, including hacking, denial of service attacks, software piracy, pornography, and credit card fraud. It discusses the history and purpose of cyber crime law in the Philippines. It also outlines punishments and penalties for different cyber crimes, as well as tips for protecting yourself from cyber crime.
Overview of Computer & Internet Crimes in Indiagsmonga
The document discusses computer and internet laws in India. It outlines various types of computer and internet crimes, such as hacking, data theft, cyber terrorism, and intellectual property theft. It then summarizes India's main laws regarding cyber crimes, including the Information Technology Act of 2000 and its 2008 amendment. The amendment expands the scope of cyber crimes and increases penalties for offenses involving identity theft, child pornography, and violation of privacy. The conclusion states that while Indian laws adequately address cyber crimes, enforcement agencies must keep up with changing technologies.
The document discusses cyber crime and the IT Act in India. It defines cyber crime narrowly as offenses outlined in the IT Act and broadly as illegal acts using the internet. Cyber crimes are classified as old crimes committed online, new internet-created crimes, and using the internet to enable old crimes. The IT Act covers hacking, cyber pornography, and cyber fraud. It discusses provisions for tampering with computer source code, cyber terrorism, and defines key cyber crimes and offenses under the act. It also provides tips for individuals and organizations to prevent cyber crimes like using strong passwords, firewalls, and keeping systems updated.
This document provides a case study on cyber crime. It begins with an introduction discussing the evolution of cyber crime and how the internet has provided opportunities for criminal activity. It then describes several categories of common cyber crimes like spam, fraud, and information theft. The document also discusses tools used in cyber crimes such as bots, keyloggers, and social engineering. It provides examples of real world cyber crime cases and current crime news. Statistics on cyber crime are presented and the document concludes with a discussion of how cyber crime has become a major issue.
The document discusses cyber crimes and the evolution of cyber threats. It provides examples of different types of cyber crimes such as credit card fraud, cyber pornography, intellectual property crimes, and phishing. The document also summarizes Indian laws related to cyber crimes and discusses challenges with enforcement of cyber crime laws in India such as lack of awareness and concerns about negative publicity or further attacks. It advocates for better enforcement initiatives such as increased public awareness campaigns, training of police officers, and coordination between law enforcement agencies to more effectively combat cyber crimes.
This document discusses cybercrime and provides information on various related topics. It begins with definitions of cybercrime and descriptions of some notorious cybercriminals. Statistics on the top 20 countries for cybercrime are presented from a Symantec report. Cyber attacks are analyzed based on motivation and technique. The document also summarizes the major Bangladesh Bank cyber heist in 2016 and the security and policy implications. Finally it outlines some common cyber security measures.
The document discusses various types of cybercrimes and email related crimes under Indian law. It provides examples and explanations of different cybercrimes like hacking, data theft, virus spreading, and intellectual property violations. It also examines specific email crimes such as phishing, spoofing, lottery scams, and sending threatening/explicit emails. For each crime, it summarizes the applicable Indian laws and sections along with examples of legal cases.
The document discusses the benefits and risks of internet usage and e-banking. It outlines how the internet has changed communication and access to information. However, it has also led to increased cybercrime like hacking, phishing, and identity theft. E-banking provides convenience but lacks security. Users must be aware of threats and protect their personal information. Overall, the internet and e-banking are useful if used properly and with adequate security measures.
This document outlines the agenda and topics covered in a presentation on cyber crime. The presentation discusses the definition of cyber crime, the major players involved, common money laundering and anonymous purchasing techniques, and gives a live demonstration of how to anonymously conduct illegal activities online. Key points covered include the international nature of cyber crimes, challenges with legal accountability across borders, common cyber crime products and services, and the use of technologies like TOR and cryptocurrencies to conduct activities anonymously.
Assignment of cyber crimes for oumh1203Faridah Husin
This document discusses cyber crimes in Malaysia and the United States. It begins with an introduction that defines cyber crime and its scope. It then covers classifications of cyber crimes such as those against individuals, property, organizations, and society. The document compares cyber crimes between Malaysia and the US, noting that the US leads in identity theft and phishing while Malaysia's most common crimes are malware, scams, and mobile threats. It concludes with suggestions on curbing cyber crimes such as education, using firewalls and security software, practicing safe online behavior, and using strong passwords.
This document provides an overview of cybercrime in Pakistan. It begins with definitions of cybercrime and discusses major online activities and categories of cybercrime such as hacking, identity theft, and financial fraud. It then examines specific cybercrimes in more depth like hacking, website defacement, cyberbullying, child pornography, and social engineering. The document concludes by noting the role of Pakistan in cybercrime.
The document discusses cyber crime in Nepal. It defines cyber crime and provides examples such as social media related crimes, piracy, fake profiles, threatening emails, website hacking, and unauthorized access. The document notes that cyber crime is a growing problem in Nepal and outlines the types of cyber crimes occurring there such as social media crimes, piracy, fake marketing, threatening emails, website hacking, unauthorized access, and restricted online businesses. It also discusses the effects of cyber crimes and Nepal's efforts to combat cyber crimes.
This document discusses cybercrime and cyber laws in India. It defines cybercrime as crimes committed using computers and the internet, such as identity theft, hacking, and spreading viruses. The first recorded cybercrime took place in 1820 when employees sabotaged a new textile loom technology out of fear for their jobs. Common cybercrimes discussed include hacking, phishing, software piracy, and cyberbullying. The document also outlines key sections of India's Information Technology Act that pertains to cybercrime and establishes punishments such as fines and imprisonment. In recent years, India has experienced increasing cybercrime and is now ranked 4th globally for incidents.
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
The document defines and discusses various types of cyber crimes. It begins by defining cybercrime as any unlawful act involving computers and networks. There are two main types - crimes that target computers directly through malware or denial of service attacks, and crimes that use computers to enable other illegal acts. Cybercrimes are further classified based on their targets, including individual, property, organizational, and societal crimes.
The document then lists and describes 16 specific types of cybercrimes such as child pornography, cyberbullying, cyberstalking, phishing, ransomware, and software piracy. It concludes by providing 7 tips for preventing cybercrimes, such as using security programs, safe online practices,
Crime involves unlawful acts that can be prosecuted and punished. Cyber crime uses computers and the internet to steal identities, sell illegal items, stalk victims, or cause disruptions. Common cyber crimes include hacking, phishing, cyber squatting, and cyber stalking. India has experienced increasing cyber crime rates due to a growing internet user base and stands 11th globally for reported cyber crimes. While Indian laws address cyber crimes, enforcement remains a challenge due to evolving technologies and unreported cases. Improving cyber security measures and awareness can help reduce cyber crimes going forward.
The document discusses cyber crime and its various aspects. It defines cyber crime as any criminal activity using computers as tools or targets. Various types of cyber crimes are described such as hacking, theft of information, email bombing, and denial of service attacks. Cyber crimes can be against individuals, organizations, or society. The document also discusses cyber terrorism and classifications of cyber crimes. It outlines sections of the Indian IT Act related to cyber crimes and penalties. Prevention tips are provided such as using antivirus software and being cautious online. While laws aim to reduce crime, legislation alone cannot eliminate it completely.
Cyber crimes can take many forms and involve using computers or the internet illegally. The document outlines several common types of cyber crimes including cyber stalking, pornography, hacking and cracking, and cyber terrorism. Cyber stalking involves harassing others online through means like sending threatening emails. Pornography crimes relate to distributing obscene or child pornography online. Hacking aims to gain unauthorized access to computer systems or networks, while cracking modifies data. Cyber terrorism uses the internet for political purposes to threaten unity or security. The document provides details on the nature and punishments for these cyber crimes under Indian law.
Cyber crime has increased with the growth of internet usage. While the internet initially aimed to improve communication and research, it now enables crimes to be committed remotely from a computer. Some criminals began exploiting the internet for illegal acts in the 1980s, termed "cyber crimes". These can include hacking, theft of information, computer viruses, and other online offenses. While laws have been implemented to address cyber crimes, legislation alone cannot eliminate all criminal acts. Continued education of legal rights and responsibilities, as well as stringent enforcement of laws, are needed to help control cyber crime.
Divith Chhajed created a project on cyber crime for his 11th grade class. The project provides an overview of cyber crime, describing what it is and examples like hacking, phishing, and cyber stalking. It discusses the history and evolution of cyber crime over time. The project also examines cyber crime in India, the Information Technology Amendment Act of 2008, and ways to tackle cyber attacks like using antivirus software and firewalls. Finally, it provides some documented cases of cyber attacks and concludes that while technology advances, we must protect ourselves from cyber crime through security measures.
The document discusses pros and cons of cybercrime. It provides definitions of cybercrime as criminal activities conducted online using computers to harm others, such as hacking, stealing personal or business information, or distributing viruses. Cybercrime can threaten individuals, national security, and financial systems. Common cybercrimes mentioned include illegal file downloading, stealing money from bank accounts, and creating/distributing viruses. The document also discusses punishments under Pakistani law for various cybercrimes such as fines and imprisonment.
This document discusses cyber crime. It begins by defining cyber crime and noting that computers are often the object or tool of criminal acts like hacking, identity theft, and child pornography. The history of cyber crime is traced back to the first spam email in 1976 and computer virus in 1982. Various types of cyber crimes are outlined such as hacking, theft, cyber stalking, and identity theft. The document also discusses international laws related to cyber crime and Bangladesh's laws targeting this issue. It concludes by providing tips to protect against cyber crime such as using strong passwords and antivirus software.
Cybercrimes take many forms and are increasingly common as internet usage rises. Some key cybercrimes discussed include cyber bullying, cheating by personation, distribution of obscene material, offensive messages, cyber defamation, cyber stalking, phishing, hacking, skimming, identity theft, and spreading of viruses. It is important for internet users to be aware of these risks and take appropriate precautions like using antivirus software and strong passwords to protect themselves from becoming victims of cybercrime.
Cyber crime broadly describes criminal activity where computers or networks are used as tools, targets, or places of criminal activity. This includes hacking, denial of service attacks, and using computers to enable traditional crimes. Cyber crimes under the IT Act include destroying or altering information in a computer resource, stealing or altering computer source code with intent to cause damage, which are punishable by up to 3 years in prison or a fine of 500,000 rupees, or both. Common cyber crimes discussed include hacking, cyber squatting, vishing (voice phishing), phishing, and cyber stalking. Antivirus software, firewalls, cryptography, cyber ethics and laws can help reduce cyber crimes, but continued website hacks and
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
content explained:-
what is cyber crime
history
categories
types
motives
safety tips
cyber security
advantages and disadvantages
cyber law
cyber law objectives
cyber law in india
conclusion
The document is a presentation on cyber security and cyber crime given by students at Thapar University. It defines cyber security as protecting networks, computers, programs and data from attacks or unauthorized access. Cyber crime is defined as any criminal act dealing with computers and networks, such as hacking, or traditional crimes conducted through the internet. The presentation discusses the evolution of cyber threats, from unstructured individual threats to highly structured threats from nation-states. It also covers common cyber crimes like hacking, phishing and cyber stalking, and emphasizes the importance of cyber security to protect personal information, critical infrastructure, and national security.
Cyber Crime has become most concerned topic in India. What are the rules & regulations of cyber world are highlighted along with precautions to taken while using social media and online activities
The document discusses the disadvantages of ICT and common cybercrimes. Some cybercrimes include phishing, blackmail, hacking, illegal gambling, harassment, and piracy. These crimes can damage individuals and society. Authorities are working to combat cybercrimes through network security, investigation, and penalties for offenders.
The document discusses various online safety and security threats such as spam, phishing, malware, and cyberbullying. It defines these threats and provides examples of each. It also discusses laws enacted by the Philippine government, such as the Anti-Bullying Act of 2013 and Cybercrime Prevention Act of 2012, to help protect individuals and organizations from these online threats and ensure their privacy and security.
This document discusses online safety, security, and ethics. It begins by outlining five learning objectives related to demonstrating understanding of internet security concepts, utilizing safety measures, applying ethical standards, assessing unethical behavior, and valuing security and ethics in technology use. It then defines online safety, security, and provides examples of each. It also discusses common internet crimes like cyberbullying, identity theft, phishing, plagiarism, and copyright infringement. It provides tips for avoiding security threats and strategies like using strong passwords, firewalls, and multifactor authentication. Finally, it discusses internet ethics and etiquette.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
2. Crimes are not to be measured by the issue of
events, but by the bad intensions of men.
The greatest crimes do not arise from a want of
feeling for others but from an over sensibility for
ourselves and an over indulgence in our own
desires.
Saturday, 14 November 2015
3. CYBER CRIME !!
Theexpression‘Crime’is definedas an act,whichsubjectsthedoerto legalpunishmentor any
offenceagainstmorality,socialorderor anyunjustor shamefulact.The“Offence"is definedin
theCodeof CriminalProcedureto meanas an actor omissionmadepunishablebyanylawfor
thetimebeinginforce.
CyberCrimeis emergingas a seriousthreat.Worldwidegovernments,policedepartmentsand
intelligenceunitshavestartedto react.
Saturday, 14 November 2015
4. Cyber Crime is a term used to broadly describe criminal activity in which computers
or computer networks are a tool, a target, or a place of criminal activity and include
everything from electronic cracking to denial of service attacks. It is also used to
include traditional crimes in which computers or networks are used to enable the
illicit activity.
Computer crime mainly consists of unauthorized access to computer systems data
alteration, data destruction, theft of intellectual property. Cyber crime in the context
of national security may involve hacking, traditional espionage, or information
warfare and related activities.
Pornography, Threatening Email, Assuming someone's Identity, Sexual Harassment,
Defamation, Spam and Phishing are some examples where computers are used to
commit crime, whereas Viruses, Worms and Industrial Espionage, Software Piracy
and Hacking are examples where computers become target of crime.
Saturday, 14 November 2015
5. IndianCrimeScene
The major Cyber Crimes reported,
in India, are Denial of
Services, Defacement of Websites, Spam,
Computer Virus and Worms, Pornography,
Cyber Squatting, Cyber Stalking and Phishing.
Given the fact that nearly $ 120 million
worth of Mobiles are being lost or stolen in the
country every year, the users have to protect
Information, Contact details and Telephone
numbers as these could be misused. Nearly 69
per cent of information theft is carried out by
current and ex-employees and 31 per cent by
hackers. India has to go a long way in
protecting the vital information.
[3 The Hindu, Saturday, Oct 27, 2007].
Saturday, 14 November 2015
6. Cyber Crime Variants
Hacking
"Hacking" is a crime, which entails cracking
systems and gaining unauthorized access to the
data stored in them. Hacking had witnessed a 37
per cent increase this year.
Cyber Squatting
Cyber Squatting is the act of registering a famous
Domain Name and then selling it for a fortune.
This is an issue that has not been tackled in
IT ACT 2000.
Saturday, 14 November 2015
8. Cyber Stalking is use of the Internet or other
electronic means to stalk someone. This
term is used interchangeably with online
harassment and online abuse. Stalking
generally involves harassing or threatening
behaviour that an individual engages in
repeatedly, such as following a person,
appearing at a person's home or place of
business, making harassing phone calls,
leaving written messages or objects, or
vandalizing a person's property.
Saturday, 14 November 2015
11. Why India?
A rapidly growing online user
base
121 Million Internet Users
65 Million Active Internet Users,
up by 28% from 51 million in
2010
50 Million users shop online on
Ecommerce and Online
Shopping Sites
46+ Million Social Network
Users
346 million mobile users had
subscribed to Data Packages.
Source: IAMAI; Juxt; wearesocial 2011Saturday, 14 November 2015
12. The majority of cybercrimes are centered on forgery, fraud and
Phishing,
India is the third-most targeted country for Phishing attacks
after the US and the UK,
Social networks as well as ecommerce sites are major targets,
6.9 million bot-infected systems in 2010,
14,348 website defacements in 2010,
6,850 .in and 4,150 .com domains were defaced during 2011,
15,000 sites hacked in 2011,
India is the number 1 country in the world for generating spam.
CyberCrime InIndia
Saturday, 14 November 2015
13. CostOf Cyber Crime In India(2015)
29.9 million people fell victim to cybercrime,
$4 billion in direct financial losses,
$3.6 billion in time spent resolving the crime,
4 in 5 online adults (80%) have been a victim of
Cybercrime,
17% of adults online have experienced cybercrime
on their mobile phone.
Source: Norton Cybercrime Report 2014
Saturday, 14 November 2015
14. We have covered about three instances where high-profile
government websites were hacked and defaced. However, the
actual number of Government Websites that were hacked are
quite huge.
A total number of 90, 119, 252 and 219 Government websites
tracked by the Indian Computer Emergency Response Team
(CERT-In) were hacked / defaced by various hacker groups inSaturday, 14 November 2015
15. The police have recorded 3,038 cases but made only 2,700
arrests in 3 years (between 2007 and 2010)
India registered only 1,350 cases under the IT Act and IPC in
2010
50% of cybercrimes are not even reported.
Again, this is
growing trend and
it is surprising that
authorities have
not taken stern
actions to curb the
growth of these
cyber-crimes.
Saturday, 14 November 2015
16. CyberLawsinIndia
UnderTheInformation
TechnologyAct,2000
CHAPTER XI – OFFENCES – 66. Hacking with
computer system.
(1) Whoever with the Intent to cause or knowing
that he is likely to cause Wrongful Loss or
Damage to the public or any person Destroys or
Deletes or Alters any Information Residing in a
Computer Resource or diminishes its value or
utility or affects it injuriously by any means,
commits hack.
(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with
fine which may extend up to two lakh rupees, or with both.
Saturday, 14 November 2015
17. Whoever without permission of
the owner of the computer :
Secures Access;
Downloads, Copies or extracts
any data, computer database or
any information;
Introduce or causes to be introduce
any Virus or Contaminant;
Disrupts or causes disruption;
Denies or causes denial of access to any person;
Provides any assistance to any person to
facilitate access
Charges the services availed of by a person to
the account of another person by Tampering with
or Manipulating any Computer, Computer
System, or Computer Network;
Shall be liable to pay damages by way of
compensation not exceeding one crore rupees to
Saturday, 14 November 2015
18. Information Technology
Amendment Act, 2008
Section – 43,
Destroys, Deletes or Alters any Information residing in a computer resource or
diminishes its value or utility or affects it injuriously by any means;
Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy
or alter any computer source code used for a computer resource with an intention
to cause damage;
“If any person, dishonestly, or fraudulently, does any act referred to in section 43,
he shall be punishable with imprisonment for a term which may extend to two
three years or with fine which may extend to five lakh rupees or with both.” [S.66]
Saturday, 14 November 2015
19. S.66A - Punishment for sending offensive messages through
communication service, etc
Any person who sends, by means of a computer resource or a
communication device;
Any information that is grossly offensive or has menacing
character; or
Any information which he knows to be false, but for the
purpose of causing annoyance, inconvenience, danger, obstruction,
insult, injury, criminal intimidation, enmity, hatred, or ill will,
persistently makes by making use of such computer resource or a
communication device;
Any electronic mail or electronic mail message for the purpose of
causing annoyance or inconvenience or to deceive or to mislead
the addressee or recipient about the origin of such messages;
Shall be punishable with imprisonment for a term which may extend
to three years and with fine.
Saturday, 14 November 2015
21. S. 66E - Punishment for violation of privacy.
“Whoever, intentionally or knowingly captures, publishes or
transmits the image of a private area of any person without his or
her consent, under circumstances violating the privacy of that
person, shall be punished with imprisonment which may extend to
three years or with fine not exceeding two lakh rupees, or with
both”
S. 67 A - Punishment for publishing or transmitting
of material containing sexually explicit act, etc. in
electronic form
“Whoever publishes or transmits or causes to be published or
transmitted in the electronic form any material which contains
sexually explicit act or conduct shall be punished on first conviction
with imprisonment of either description for a term which may
extend to five years and with fine which may extend to ten lakh
rupees”Saturday, 14 November 2015
22. S. 67 C - Preservation and Retention of information
by intermediaries.
“(1) Intermediary shall preserve and retain such
information as may be specified for such duration and
in such manner and format as the Central Government
may prescribe.
(2) Any intermediary who intentionally or knowingly
contravenes the provisions of sub section (1) shall be
punished with an imprisonment for a term which may
extend to three years and shall also be liable to fine.”
Saturday, 14 November 2015
23. Arrests& ReportsUnderITAct
Under the IT Act, 966 cybercrime
cases were filed in 2010
420 in 2009)
Geographic breakdown of cases
reported:
o 153 from Karnataka,
o 148 from Kerala
o 142 from Maharashtra
o 105 Andhra Pradesh
o 52 Rajasthan
o 52 Punjab
233 persons were arrested in 2010
33% of the cases registered were
related to hacking
Now Chennai Kerla and andhra pradesh
Source: National Crime Records Bureau
Saturday, 14 November 2015
24. Arrests& ReportsUnderIPC
Under the IPC, 356 cybercrime cases were registered in
2010 (276 cases in 2009)
Geographic breakdown of cases reported --
o 104 from Maharashtra
o 66 Andhra Pradesh
o 46 Chhattisgarh
The majority of these crimes were
either forgery or fraud cases.
Source: National Crime Records Bureau
Saturday, 14 November 2015
25. How to Tackle Such Activities?
An important question arises that how can these crimes be prevented. A
number of techniques and solutions have been presented but the problems still
exists and are increasing day by day.
Antivirus And Anti Spyware Software:
Аntivirus software consists of computer programs that attempt to identify,
thwart and eliminate computer viruses and other malicious software. Anti spy
wares are used to restrict backdoor program, trojans and other spy wares to be
installed on the computer.
Firewalls:
A firewall protects a computer network from unauthorized access. Network
firewalls may be hardware devices, software programs, or a combination of the
two. A network firewall typically guards an internal computer network against
malicious access from outside the network.
Saturday, 14 November 2015
26. Cryptography:
Cryptography is the science of encrypting and decrypting
information. Encryption is like sending a postal mail to another
party with a lock code on the envelope which is known only to
the sender and the recipient. A number of cryptographic
methods have been developed and some of them are still not
cracked.
Cyber Ethics and Laws:
Cyber ethics and cyber laws are also being formulated to stop
cyber crimes. It is a responsibility of every individual to follow
cyber ethics and cyber laws so that the increasing cyber crimes
shall reduce. Security Software like Anti Viruses and Anti Spy
Wares should be installed on all computers, in order to remain
secure from Cyber Crimes. Internet Service Providers should also
provide high level of security at their servers in order to keep
their clients secure from all types of viruses and malicious
programs.
Saturday, 14 November 2015
27. The Futureof Cyber-Crimesin India
• Continued Website Hacks and
Defacements
• Data and Information theft
• Increasing phishing attacks on
Ecommerce and Financial Websites
• Cybercriminals targeting Social and
Professional Networks
• Threats directed at the Mobile Platform:
Smartphones and Tablets
Saturday, 14 November 2015