SlideShare a Scribd company logo
Prepared by
Mehta Ishani
2nd M.E.(C.S.E)
130040701003
Cyber Crime and Cyber Laws
Introduction
Internet
two sides of a coin
Computer vulnerabilities
Cyber crime refers to all the activities done with criminal intent
in cyberspace or using the medium of Internet.
Types of Cyber crimes
Credit card frauds
Sale of illegal articles-narcotics,
weapons, wildlife
Online gambling
Intellectual Property crimes-
software piracy, copyright infringement,
trademarks violations,
theft of computer source code
Email spoofing
Forgery
Phishing
Cyber terrorism
TYPES OF CYBER ATTACK BY
PERCENTAGE
• Financial fraud: 11%
• Sabotage of data/networks: 17%
• Theft of proprietary information: 20%
• System penetration from the outside: 25%
• Denial of service: 27%
• Unauthorized access by insiders: 71%
• Employee abuse of internet privileges 79%
• Viruses 85%
INFORMATION TECHNOLOGY
ACT, 2000 & CYBERCRIME
Various cyber offences defined
Cyber offences to be investigated only by a Police
Officer not below the rank of the Deputy
Superintendent of Police who have been duly
authorized and who have also been given the
power of entry, search and arrest without warrant
in public places..
CYBER OFFENCES UNDER THE IT
ACT
Tampering with computer source documents –
Section 65
Hacking - Section 66
Publishing of information which is obscene in
electronic form - Section 67
SECTION 65
Tampering with computer source documents
Knowingly or intentionally concealing, destroying
or altering or intentionally or knowingly causing
another to conceal, destroy or alter any computer
source code used for computer, computer
programme, computer system or computer
network, when the computer source code is
required to be kept or maintained by law for the
time being in force
PUNISHMENT FOR TAMPERING
COMPUTER SOURCE
DOCUMENTS
Imprisonment up to three years, or with fine which
may extend up to two lakh rupees, or with both.
SECTION 66
Hacking with computer system
Occurs when there is intent to cause or
knowledge that one is likely to cause wrongful
loss or damage to the public or any person by
destroying or deleting or altering any information
residing in a computer resource or diminishing its
value or utility or affecting it injuriously by any
means
PUNISHMENT FOR HACKING
Imprisonment up to three years, or with fine which
may extend upto two lakh rupees, or with both.
SECTION 67
Publishing of information which is obscene in
electronic form
Publishing or transmitting or causing to be
published in the electronic form, any material
which is lascivious or appeals to the prurient
interest or if its effect is such as to tend to
deprave and corrupt persons who are likely,
having regard to all relevant circumstances, to
read, see or hear the matter contained or
embodied in it
PUNISHMENT FOR PUBLISHING
OBSCENE INFORMATION IN
ELECTRONIC FORM
On first conviction - imprisonment of either
description for a term which may extend to five
years and with fine which may extend to one lakh
rupees
Second or subsequent conviction - imprisonment
of either description for a term which may extend
to ten years and also with fine which may extend
to two lakh rupees.
Challenges faced by Law
Enforcement
Awareness:
Technical Issues:
Software and Hardware Issues:
Information sharing:
Inadequate Training and Funds:
Global Issues:
Wireless or Wi-Fi, Bluetooth, Infrared Issues:
PREVENTION
Disable and log off a specific user account to
prevent access.
Disable and log off a group of user accounts
which access a particular service that is being
attacked.
Disable and dismount specific (network)
devices, for instance disk devices that are
being swamped.
Disable specific applications, for example, an
e-mail system subjected to a SPAM attack.
Close down an entire system, and divert
processing to an alternative or backup service
on a secondary network.
SAFETY TIPS FOR CYBER
CRIME
Use antivirus software’s.
Insert firewalls.
Uninstall unnecessary software
Maintain backup.
Check security settings.
Stay anonymous - choose a genderless screen
name.
Never give your full name or address to
strangers.
Learn more about Internet privacy.
CONCLUSION
Obviously computer crime is on the rise, but so is
the awareness and ability to fight it. Law
enforcement realizes that it is happening more
often than it is reported and are doing there best
to improve existing laws and create new laws as
appropriate. The problem is not with the
awareness or the laws, but with actually reporting
that a crime has occurred. Hopefully people will
begin to realize that unless they report these
crimes and get convictions, those committing
computer crimes will continue to do so.
Cyber crime and cyber laws

More Related Content

What's hot

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber crime
Cyber crimeCyber crime
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
bhavya mohindru
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rohitha Sankar
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Greater Noida Institute Of Technology
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 

What's hot (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Viewers also liked

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Darshan Vithani
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber Warrant & Engineer Slides
Cyber Warrant & Engineer SlidesCyber Warrant & Engineer Slides
Cyber Warrant & Engineer Slidesidcsynchronization
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Adv Prashant Mali
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
kg19
 
Km Introduction PowerPoint
Km Introduction PowerPointKm Introduction PowerPoint
Km Introduction PowerPoint
Howard Gregory
 
Introduction to knowledge management
Introduction to knowledge managementIntroduction to knowledge management
Introduction to knowledge management
Niyitegekabilly
 
Knowledge Management system in current scenario.
Knowledge Management system in current scenario.Knowledge Management system in current scenario.
Knowledge Management system in current scenario.
suba ramanujam
 
Knowledge management at infosys
Knowledge management at infosysKnowledge management at infosys
Knowledge management at infosysSupriya M D
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
Titas Ahmed
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
tumetr1
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
Upekha Vandebona
 
Knowledge management system priyank
Knowledge management system priyankKnowledge management system priyank
Knowledge management system priyank
PRIYANK JAIN
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
Darlene Enderez
 
Knowledge Management Tools & Techniques
Knowledge Management Tools & TechniquesKnowledge Management Tools & Techniques
Knowledge Management Tools & Techniques
Michael Norton
 
E cash payment system
E cash payment systemE cash payment system
E cash payment systemRKPD
 
E payment
E paymentE payment
E payment
Vishal Sancheti
 
Technology management
Technology managementTechnology management
Technology management
VijayKrKhurana
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 

Viewers also liked (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Warrant & Engineer Slides
Cyber Warrant & Engineer SlidesCyber Warrant & Engineer Slides
Cyber Warrant & Engineer Slides
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
 
Km Introduction PowerPoint
Km Introduction PowerPointKm Introduction PowerPoint
Km Introduction PowerPoint
 
Introduction to knowledge management
Introduction to knowledge managementIntroduction to knowledge management
Introduction to knowledge management
 
Knowledge Management system in current scenario.
Knowledge Management system in current scenario.Knowledge Management system in current scenario.
Knowledge Management system in current scenario.
 
Knowledge management at infosys
Knowledge management at infosysKnowledge management at infosys
Knowledge management at infosys
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Knowledge management system priyank
Knowledge management system priyankKnowledge management system priyank
Knowledge management system priyank
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
 
Knowledge Management Tools & Techniques
Knowledge Management Tools & TechniquesKnowledge Management Tools & Techniques
Knowledge Management Tools & Techniques
 
E cash payment system
E cash payment systemE cash payment system
E cash payment system
 
E payment
E paymentE payment
E payment
 
Technology management
Technology managementTechnology management
Technology management
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 

Similar to Cyber crime and cyber laws

CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
anthony4web
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
MohaiUDin
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
Aman Bhargava
 
Cyber law comp
Cyber law compCyber law comp
Cyber law comp
NISHAGPARDESHI
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
Ayesha Majid
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
Tushar B Kute
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
Vaibhav's Group
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
DINESH KAMBLE
 
Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.
GissaMaeCastino
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
Ajnish Rana
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Aamir Malik
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber crime
Cyber crimeCyber crime
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
akashsaqi444
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
saumi17
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
Mahmudul hasan
 

Similar to Cyber crime and cyber laws (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber law comp
Cyber law compCyber law comp
Cyber law comp
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
 
Cyber laws in India
Cyber laws in IndiaCyber laws in India
Cyber laws in India
 
Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02Cyber crime-140128140443-phpapp02
Cyber crime-140128140443-phpapp02
 

More from ishmecse13

Search engine and web crawler
Search engine and web crawlerSearch engine and web crawler
Search engine and web crawler
ishmecse13
 
Web services concepts, protocols and development
Web services concepts, protocols and developmentWeb services concepts, protocols and development
Web services concepts, protocols and development
ishmecse13
 
Web services concepts, protocols and development
Web services concepts, protocols and developmentWeb services concepts, protocols and development
Web services concepts, protocols and development
ishmecse13
 
Web services
Web servicesWeb services
Web services
ishmecse13
 
Wap wml
Wap wmlWap wml
Wap wml
ishmecse13
 
Wap architecture and wml script
Wap architecture and wml scriptWap architecture and wml script
Wap architecture and wml script
ishmecse13
 
Solving travelling salesman problem using firefly algorithm
Solving travelling salesman problem using firefly algorithmSolving travelling salesman problem using firefly algorithm
Solving travelling salesman problem using firefly algorithm
ishmecse13
 
Object oriented concepts with java
Object oriented concepts with javaObject oriented concepts with java
Object oriented concepts with java
ishmecse13
 
Kerberos using public key cryptography
Kerberos using public key cryptographyKerberos using public key cryptography
Kerberos using public key cryptography
ishmecse13
 
Hierarchical clustering
Hierarchical clusteringHierarchical clustering
Hierarchical clustering
ishmecse13
 
File models and file accessing models
File models and file accessing modelsFile models and file accessing models
File models and file accessing models
ishmecse13
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
ishmecse13
 
Branch and bound technique
Branch and bound techniqueBranch and bound technique
Branch and bound technique
ishmecse13
 
Branch and bound technique
Branch and bound techniqueBranch and bound technique
Branch and bound technique
ishmecse13
 

More from ishmecse13 (14)

Search engine and web crawler
Search engine and web crawlerSearch engine and web crawler
Search engine and web crawler
 
Web services concepts, protocols and development
Web services concepts, protocols and developmentWeb services concepts, protocols and development
Web services concepts, protocols and development
 
Web services concepts, protocols and development
Web services concepts, protocols and developmentWeb services concepts, protocols and development
Web services concepts, protocols and development
 
Web services
Web servicesWeb services
Web services
 
Wap wml
Wap wmlWap wml
Wap wml
 
Wap architecture and wml script
Wap architecture and wml scriptWap architecture and wml script
Wap architecture and wml script
 
Solving travelling salesman problem using firefly algorithm
Solving travelling salesman problem using firefly algorithmSolving travelling salesman problem using firefly algorithm
Solving travelling salesman problem using firefly algorithm
 
Object oriented concepts with java
Object oriented concepts with javaObject oriented concepts with java
Object oriented concepts with java
 
Kerberos using public key cryptography
Kerberos using public key cryptographyKerberos using public key cryptography
Kerberos using public key cryptography
 
Hierarchical clustering
Hierarchical clusteringHierarchical clustering
Hierarchical clustering
 
File models and file accessing models
File models and file accessing modelsFile models and file accessing models
File models and file accessing models
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Branch and bound technique
Branch and bound techniqueBranch and bound technique
Branch and bound technique
 
Branch and bound technique
Branch and bound techniqueBranch and bound technique
Branch and bound technique
 

Recently uploaded

Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 

Recently uploaded (20)

Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 

Cyber crime and cyber laws

  • 1. Prepared by Mehta Ishani 2nd M.E.(C.S.E) 130040701003 Cyber Crime and Cyber Laws
  • 2. Introduction Internet two sides of a coin Computer vulnerabilities
  • 3. Cyber crime refers to all the activities done with criminal intent in cyberspace or using the medium of Internet.
  • 4. Types of Cyber crimes Credit card frauds Sale of illegal articles-narcotics, weapons, wildlife Online gambling Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code Email spoofing Forgery Phishing Cyber terrorism
  • 5. TYPES OF CYBER ATTACK BY PERCENTAGE • Financial fraud: 11% • Sabotage of data/networks: 17% • Theft of proprietary information: 20% • System penetration from the outside: 25% • Denial of service: 27% • Unauthorized access by insiders: 71% • Employee abuse of internet privileges 79% • Viruses 85%
  • 6. INFORMATION TECHNOLOGY ACT, 2000 & CYBERCRIME Various cyber offences defined Cyber offences to be investigated only by a Police Officer not below the rank of the Deputy Superintendent of Police who have been duly authorized and who have also been given the power of entry, search and arrest without warrant in public places..
  • 7. CYBER OFFENCES UNDER THE IT ACT Tampering with computer source documents – Section 65 Hacking - Section 66 Publishing of information which is obscene in electronic form - Section 67
  • 8. SECTION 65 Tampering with computer source documents Knowingly or intentionally concealing, destroying or altering or intentionally or knowingly causing another to conceal, destroy or alter any computer source code used for computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force
  • 9. PUNISHMENT FOR TAMPERING COMPUTER SOURCE DOCUMENTS Imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.
  • 10. SECTION 66 Hacking with computer system Occurs when there is intent to cause or knowledge that one is likely to cause wrongful loss or damage to the public or any person by destroying or deleting or altering any information residing in a computer resource or diminishing its value or utility or affecting it injuriously by any means
  • 11. PUNISHMENT FOR HACKING Imprisonment up to three years, or with fine which may extend upto two lakh rupees, or with both.
  • 12. SECTION 67 Publishing of information which is obscene in electronic form Publishing or transmitting or causing to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it
  • 13. PUNISHMENT FOR PUBLISHING OBSCENE INFORMATION IN ELECTRONIC FORM On first conviction - imprisonment of either description for a term which may extend to five years and with fine which may extend to one lakh rupees Second or subsequent conviction - imprisonment of either description for a term which may extend to ten years and also with fine which may extend to two lakh rupees.
  • 14. Challenges faced by Law Enforcement Awareness: Technical Issues: Software and Hardware Issues: Information sharing: Inadequate Training and Funds: Global Issues: Wireless or Wi-Fi, Bluetooth, Infrared Issues:
  • 15. PREVENTION Disable and log off a specific user account to prevent access. Disable and log off a group of user accounts which access a particular service that is being attacked. Disable and dismount specific (network) devices, for instance disk devices that are being swamped. Disable specific applications, for example, an e-mail system subjected to a SPAM attack. Close down an entire system, and divert processing to an alternative or backup service on a secondary network.
  • 16. SAFETY TIPS FOR CYBER CRIME Use antivirus software’s. Insert firewalls. Uninstall unnecessary software Maintain backup. Check security settings. Stay anonymous - choose a genderless screen name. Never give your full name or address to strangers. Learn more about Internet privacy.
  • 17. CONCLUSION Obviously computer crime is on the rise, but so is the awareness and ability to fight it. Law enforcement realizes that it is happening more often than it is reported and are doing there best to improve existing laws and create new laws as appropriate. The problem is not with the awareness or the laws, but with actually reporting that a crime has occurred. Hopefully people will begin to realize that unless they report these crimes and get convictions, those committing computer crimes will continue to do so.