SlideShare a Scribd company logo
1 of 62
Cyber Crime, Cyber Security and 
Cyber Rights in INDIA 
Ms. Jyoti Lakhani 
Head, Department of Computer Science 
Maharaja Ganga Singh University, Bikaner
Cyber Crime 
ANY “CRIMINAL ACTIVITY” PERFORMED USING COMPUTER 
Electronic Crime 
e-Crime 
It’s an “UN-LAWFUL ACT” wherein the computer is either a 
tool or a target or both
First Occurrence of Cyber Crime 
The first spam email took place in 1978 when it was sent 
out over the Arpanet (Advanced Research Projects Agency 
Network) 
The first virus was installed on an Apple computer in 1982 
when a high school student, Rich Skrenta, developed the Elk 
cloner
Categories of Cyber Crime 
Cyber crimes against Persons 
Cyber crimes against Property 
Cyber crimes against Government 
Cyber crimes against Society
Cyber-Criminals
Cyber-Criminals 
An Insider threat is a malicious threat 
to an organization 
Comes from people within the 
organization, such as employees, 
former employees, contractors or 
business associates 
Who have inside information 
concerning the organization's security 
practices, data and computer systems 
Employees itself 
Insider threat
Cyber-Criminals 
Hackers 
A hacker is someone who seeks and 
exploits weaknesses in a computer system 
or computer network
Cyber-Criminals 
Hactivist 
(overloads e-mail servers or hack web sites to send 
political message)
Cyber-Criminals 
Virus writers 
(writes viruses to infect systems)
Cyber-Criminals 
Criminal groups 
(attack systems & steal password for financial 
gain)
Cyber-Criminals 
Sensitive intrusions 
(sensitive information is obtained via 
computer intrusions)
Cyber-Criminals 
Information warfare 
(alternative to military attacks)
Cyber-Criminals 
Terrorists 
(who have potential to disrupt 
government systems with computer 
attacks)
Cyber-Criminals 
Cyber Warfare 
(attack by sovereigns --- 
Crime or Declaration of war)
ATTACK
Weapons Cyber Crime 
Hacking 
Unauthorized access to any 
computer systems or networks is 
known as ‘HACKING’. That is 
accessing the information of 
others without proper 
authorization.
Weapons of Cyber Crime 
Data Diddling 
This is altering raw data just 
before a computer processes 
it and then changing it back 
after the processing is 
completed.
Weapons of Cyber Crime 
Denial of Service Attack 
The computer is flooded with 
more requests than it can 
handle which cause it to crash. 
Distributed Denial of Service 
(DDOS) attack is a example.
Weapons of Cyber Crime 
Email Bombing 
It refers to sending large 
numbers of mail to the victim, 
which may be an individual or 
a company by ultimately 
resulting into crashing.
Weapons of Cyber Crime 
Trojan Attacks 
This term has its origin in the word 
‘Trojan horse’. In software field this 
means an unauthorized program, 
which passively gains control over 
another’s computer by representing 
itself as an authorized program. The 
most common form of installing a 
Trojan is through e-mail.
Weapons of Cyber Crime 
Web Jacking 
This term is derived from the term hi jacking. In these kinds of 
offences the hacker gains access and control over the website of 
another. He may even manipulate or change the information of 
the website. This may be done for fulfilling political objectives or 
for money.
Weapons of Cyber Crime 
Virus Attack 
Viruses are programs that attach themselves to a computer or a 
file and then circulate themselves to other files and to other 
computers on a network. They usually affect the data on a 
computer, either by altering or deleting it.
Weapons of Cyber Crime 
Worm Attacks 
Worms unlike viruses do not need the host to attach themselves 
to. They merely make functional copies of themselves and do this 
repeatedly till they eat up all the available space on the 
computer’s memory.
Weapons of Cyber Crime 
Salami Attacks 
This kind of crime is normally 
prevalent in the financial 
institutions or for the purpose 
of committing financial crimes. 
An important feature of this 
type of offence is that the 
alteration is so small that it 
would normally go unnoticed.
Weapons of Cyber Crime 
Phishing 
Phishing refers to the receipt of unsolicited emails by 
customers of Financial Institutions, requesting them to enter 
their Username, Password or other personal information to 
access their Account for some reason. The fraudster then has 
access to the customer’s online bank account and to the 
funds contained in that account.
Weapons of Cyber Crime 
Spamming 
Electronic spamming is the use of electronic messaging 
systems to send unsolicited bulk messages (spam), 
especially advertising, indiscriminately. The most widely 
recognized form of spam is e-mail spam.
Weapons of Cyber Crime 
Cyber stalking is the use of the internet or other 
electronic means to stalk someone. Stalking generally 
involves harassing or threatening behavior that an 
individual engages in repeatedly.
Cyber Crimes Against Persons 
Harassment via E-Mails (Email harassment is the act of 
consistently sending unwanted electronic communications 
to a person to intimidate, frighten, or...) 
Hacking 
E-Mail / SMS Spoofing (E-mail spoofing is the forgery of an 
e-mail header so that the message appears to have 
originated from someone or somewhere other than the 
actual source.) 
Carding( False credit card/debit card etc.) 
Assault by Threat (threatening)
Cyber Crimes Against Property 
Intellectual Property Crimes (Criminal offences (counterfeiting and piracy) 
Infringement of trade marks and copyrights can be criminal offences) 
Cyber Squatting (is registering, trafficking in, or using a domain name with bad faith 
intent to profit from the goodwill of a trademark belonging to someone else.) 
Cyber Vandalism (Cyber vandals are individuals who damage information 
infrastructures purely for their own enjoyment and pleasure. Their primary 
motivation is not financial;) 
Transmitting Virus 
Internet Time Thefts - Internet time theft comes under the heading of hacking. It is 
the use by an unauthorized person of the Internet hours paid for by another person.
Cyber Crimes Against Government 
Cyber Terrorism: 
Cyber Terrorism is a phrase 
used to describe the use of Internet based 
attacks in terrorist activities, including acts of 
deliberate, large-scale disruption of computer 
networks, especially of personal computers 
attached to the Internet, by the means of tools 
such as computer viruses.
Cyber crimes Against Society 
Cyber Trafficking Drug traffickers are increasingly taking advantage of the Internet" 
according to cyber authorities and personnel. to sell their illegal substances through 
encrypted 
Online Gambling (gambling using the Internet.) 
Forgery - person is guilty of forgery if he or she makes a false instrument with the 
intention that it shall be used to induce another person to accept it as genuine and, 
by reason of so accepting it, to do some act, or to make some omission, to the 
prejudice of that person or any other person.
CYBER CRIME 
IN 
INDIA
Cyber Crime in INDIA
Cyber Crime in India Some Facts 
• India is the third-most targeted country for Phishing attacks after the US and the UK 
• The majority of cybercrimes are centered on forgery, fraud and Phishing 
• Social networks as well as ecommerce sites are major targets 
• 6.9 million bot-infected systems in 2013 
• 14,348 websites defacements in 2013 
• 15,000 sites hacked in 2013 
• India is number 1 country in the world for generating spams. 
• 29.9 million people fell victim to cyber crime. 
• 17% of adults online have experienced cybercrime on their mobile phone. 
•Source: Norton Cybercrime Report 2013
WHY INDIA? 
• India : world’s third largest Internet user after China and the US 
• Younger Users 
• 74 million Active Internet users 
• 46+ Million Social Network Users 
• 50 Million users shop online on Ecommerce and Online Shopping 
Sites 
• 164.81 million Internet subscribers (as on March 31, 2013) 
• seven out of eight accessing the Internet from their mobile 
phones.
Cyber Security and Right to Privacy 
“The Information Technology Act 2000 contains 
adequate provisions to deal with various cyber 
related offenses as well as protection of privacy of 
individuals.
IT Act 2000 
Crime: Cyber Stalking 
Definition: Stealthily following a person, tracking his internet chats. 
Mechanism: By using electronic communication, such as e-mail instant 
messaging (IM), messages posted to a Web site or a discussion group. 
Sections and Amendments: 43, 66 
(Compensation and punishment of three years with fine) 
Technical Measures: Not disclosing personal information on Internet, 
chat, IM and interacting over electronic media with known people only. 
•Taking up the matter with concerned Service Providers in stopping cyber 
stalking activities.
IT Act 2000 
Crime: Intellectual Property Crime 
Definition: Source Code Tampering etc. 
Mechanism: Accessing source code or such type of material and stealing or 
manipulating the code etc. 
Sections and Amendments: 43, 65, 66 
(Compensation and punishment of three years with fine) 
Technical Measures: Strong authentication and technical measures for 
prevention of data leakage
IT Act 2000 
Crime : Salami Attack 
(Theft of data or manipulating banking account) 
Definition:Deducting small amounts from an account without coming in to 
notice, to make big amount 
Mechanism: By means of unauthorized access to source code of software 
application and databases 
Sections and Amendments: 43, 66 
(Compensation and punishment of three years) 
Technical Measures: Strong authentication measures for accessing the 
data and securing the IT infrastructure involved
IT Act 2000 
Crime: E-Mail Bombing 
Definition:Flooding an E-mail box with innumerable number of E-mails, to 
disable to notice important message at times. 
Mechanism: Bulk email generation to target specific email account by 
using automated tools 
Sections and Amendments: 43, 66 
(Compensation and punishment of three years) 
Technical Measures: Implementing anti-spam filters
IT Act 2000 
Crime: Phishing 
Definition: Bank Financial Frauds in Electronic Banking 
Mechanism: Using social engineering techniques to commit identity theft 
Sections and Amendments: 43, 66, 66C 
(Compensation and punishment of three years with fine) 
Technical Measures: Immediate take-down of phishing websites. 
•Strong authentication mechanisms for financial and electronic banking. 
•User awareness on phishing attacks 
•Keeping the computer systems secure being used for transacting with the 
financial institutions and banks.
IT Act 2000 
Crime: Personal Data Theft 
Definition:Stealing personal data 
Mechanism:Compromising online personal data, email accounts and 
computer systems 
Sections and Amendments: 43, 43A, 72A 
(Compensation and punishment of three years with fine) 
Technical Measures: Safeguarding the online data and personal computer 
systems
IT Act 2000 
Crime: Identity Theft 
Definition:Stealing Cyberspace identity information of individual 
Mechanism:Hacking the personal identity information or employing 
phishing techniques 
Sections and Amendments: 43 
(Compensation and punishment of three years with fine) 
Technical Measures: Safeguarding of personal identity information, 
securing the personal computer systems, awareness on preventing identity 
theft and adopting safe internet practices
IT Act 2000 
Crime: Spoofing 
Definition:Stealing Credentials using, friendly and familiar GUI’s 
Mechanism:Using tools and other manipulative techniques 
Sections and Amendments: 43, 66 
(Compensation and punishment of three years with fine) 
Technical Measures: Safeguarding the credentials and implementing anti-spoofing 
measures
IT Act 2000 
Crime: Data Theft 
Definition:Stealing Data 
Mechanism:Hacking of computer systems and using malicious methods 
Sections and Amendments: Provisions under 43, 43A, 65,66 and 72 
(Compensation and punishment of three years with fine) 
Technical Measures: Securing the computer systems, implementing data 
leak prevention measures and creating user awareness
IT Act 2000 
Crime: Worms Trojan Horses, Virus etc. 
Definition:Different Hacking mechanisms 
Mechanism:Different methods to install and propagate malicious code 
Sections and Amendments: 43, 66 
(Compensation and punishment of three years with fine) 
Technical Measures: Securing computer systems, installing anti-malware 
systems and creating user awareness.
IT Act 2000 
Crime: Sabotage of Computer 
Definition:Taking control of computer with the help of malware. 
Mechanism:Compromising the computer systems 
Sections and Amendments: 43, 66 
(Compensation and punishment of three years with fine) 
Technical Measures: Securing computer systems and deploying anti-malware 
solution
IT Act 2000 
Crime: DOS, DDOS Demat of Service 
Definition:Flooding a computer with Denial of Service Attacks, DDOS is 
Distributed DOS attack 
Mechanism:Generating flood traffic from thousands and millions of 
compromised computers using automated tools and techniques 
Sections and Amendments: 43, 66, 66F 
(Compensation (up to life imprisonment under 66F) 
Technical Measures: Implementing DOS, DDOS prevention systems
IT Act 2000 
Crime: Web Defacing 
Definition:Web Pages Defacing 
Mechanism:Compromising the websites and adding or manipulating the 
web pages with some messages 
Sections and Amendments: 43, 66 
(Compensation and punishment of three years with fine) 
Technical Measures: Securing the websites and the IT infrastructure used 
for hosting and maintaining the websites
IT Act 2000 
Crime: Spam and spoofing 
Definition:Unsolicited E-mails 
Mechanism:Sending unsolicited emails through manual and automated 
techniques 
Sections and Amendments: 43, 66A, 66D 
(Compensation and punishment of three years with fine) 
Technical Measures: Deploying the anti-spam and anti-spoofing solution at 
email gateways
IT Act 2000 
Crime: Publishing or transmitting obscene material 
Definition:Publishing Obscene in Electronic Form 
Mechanism:Publishing or transmitting the obscene content over electronic 
media like websites, social networking sites etc. 
Sections and Amendments: 67 
(Punishment of three years with fine) 
Technical Measures: Taking down of obscene materials over electronic 
media
IT Act 2000 
Crime: Pornography 
Definition:Publishing or transmitting material containing sexually explicit 
act 
Mechanism:Publishing pornographic material over electronic media like 
websites, social networking sites etc. 
Sections and Amendments: 67A 
(Punishment of five years with fine) 
Technical Measures: Taking down of pornographic material publishing 
websites/ web-pages, online media etc.
IT Act 2000 
Crime: Child Pornography 
Definition:Publishing Obscene in Electronic Form involving children 
Mechanism:Publishing pornographic material involving children over 
electronic media like websites, etc. 
Sections and Amendments: 67B 
Technical Measures: Taking down of pornographic material publishing 
websites/ web-pages, online media etc.
IT Act 2000 
Crime: Video Voyeurism and violation of privacy 
Definition:Transmitting Private/ Personal Video’s on internet and mobiles 
Mechanism:Transmitting Private/Personal Video’s on internet and mobiles 
Sections and Amendments: 66E 
(Punishment of three years with fine) 
Technical Measures: Taking down of such content as available over 
internet and transmitted through mobiles.
IT Act 2000 
Crime: Offensive messages 
Definition:Transmitting Private/ Personal Video’s on internet and mobiles 
Mechanism:Transmitting Private/Personal Video’s on internet and mobiles 
Sections and Amendments: 66E 
(Punishment of three years with fine) 
Technical Measures: Taking down of such content as available over internet 
and transmitted through mobiles.
IT Act 2000 
Crime: Offensive messages 
Definition:Communication of offensive messages through computer/ 
phone 
Mechanism:Sending or publishing the offensive messages over electronic 
media like email, websites and social media 
Sections and Amendments: 66A 
(Punishment of three years with fine) 
Technical Measures: Taking down of offensive messages from electronic 
media and creating user awareness on safe internet practices
IT Act 2000 
Crime: Hacking of Protected Systems 
Definition:Protection of Information Infrastructure 
Mechanism:Hacking the computer systems by using various methods 
Sections and Amendments: 70 
(Punishment of ten years with fine) 
Technical Measures: Securing the computer systems and related 
infrastructure, creating user awareness and training of system 
administrators
PREPAREDNESS AND POLICY INITIATIVES 
WHAI IF the systems like defence establishments, hospitals, 
transportation, Banks, Government organisations, etc., are 
hijacked or manipulated through cyber attacks. 
The Government has taken several actions to improve the 
alertness of the Government and other critical sector 
organisations.
‘Crisis Management Plan’ (CMP) 
For countering cyber attacks and cyber terrorism 
-All Ministries/ Departments of Central Government, State 
Governments and their organizations and critical sectors have 
been mandated to continuously assess the posture of their IT 
systems and networks. 
-The CMP mandates following specific steps: 
1. Nominate Chief Information Security Officers to co-ordinate 
the security related issues/implementation within the 
organisation
‘Crisis Management Plan’ (CMP) 
2. Security devices may be installed at all levels. Servers, Local 
Area Network (LAN) and Wide Area Network (WAN) 
infrastructure should be secured by installing appropriate 
perimeter security devices such as firewalls, Intrusion 
Prevention System and anti-virus system. 
3. These security mechanisms should include appropriate 
devices and methods to log and monitor the events to detect 
network scanning, probing and Reconnaissance attempts on the 
IT infrastructure.
‘Crisis Management Plan’ (CMP) 
4. These attempts should be regularly reviewed and analysed for 
initiating necessary preventive measures. 
5. Deployment of network traffic scanning technique to improve 
the visibility into the state of the network and identifying 
deviations from baselines that may indicate abnormal or 
suspicious behaviour.
Safety Tips to avoid cybercrime 
•Keep your operating systems up to date with critical security 
updates and patches. 
•Don’t open emails or attachments from unknown sources. 
•Read Privacy policy carefully when you submit the data 
through internet. 
•Disable Remote Connectivity. 
•Use hard-to-guess passwords. Don’t use words found in a 
dictionary. Remember that password cracking tools exist. 
•Back-up your computer data on disks or CDs often. 
•Use antivirus software and firewalls –keep them up to date

More Related Content

What's hot (20)

Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
cyber security
cyber securitycyber security
cyber security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 

Viewers also liked

Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slidesthothakhail
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Ethics, Part 1
Ethics, Part 1Ethics, Part 1
Ethics, Part 1ARH_Miller
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
06 professional ethics & code of ethics
06 professional ethics & code of ethics06 professional ethics & code of ethics
06 professional ethics & code of ethicsNimantha Perera
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber Crime and Network Security in India
Cyber Crime and Network Security in IndiaCyber Crime and Network Security in India
Cyber Crime and Network Security in IndiaTata Communications
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 

Viewers also liked (20)

Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Ethics, Part 1
Ethics, Part 1Ethics, Part 1
Ethics, Part 1
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
06 professional ethics & code of ethics
06 professional ethics & code of ethics06 professional ethics & code of ethics
06 professional ethics & code of ethics
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime and Network Security in India
Cyber Crime and Network Security in IndiaCyber Crime and Network Security in India
Cyber Crime and Network Security in India
 
Ethics, Part 2
Ethics, Part 2Ethics, Part 2
Ethics, Part 2
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 

Similar to Cyber crime and cyber security

CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourssuser24dae7
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and historygururaj lulkarni
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internetAlexander Decker
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 

Similar to Cyber crime and cyber security (20)

CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
English in written
English in writtenEnglish in written
English in written
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 

More from jyoti_lakhani

CG02 Computer Graphic Systems.ppsx
CG02 Computer Graphic Systems.ppsxCG02 Computer Graphic Systems.ppsx
CG02 Computer Graphic Systems.ppsxjyoti_lakhani
 
CG04 Color Models.ppsx
CG04 Color Models.ppsxCG04 Color Models.ppsx
CG04 Color Models.ppsxjyoti_lakhani
 
CG03 Random Raster Scan displays and Color CRTs.ppsx
CG03 Random Raster Scan displays and Color CRTs.ppsxCG03 Random Raster Scan displays and Color CRTs.ppsx
CG03 Random Raster Scan displays and Color CRTs.ppsxjyoti_lakhani
 
CG02 Computer Graphic Systems.pptx
CG02 Computer Graphic Systems.pptxCG02 Computer Graphic Systems.pptx
CG02 Computer Graphic Systems.pptxjyoti_lakhani
 
CG01 introduction.ppsx
CG01 introduction.ppsxCG01 introduction.ppsx
CG01 introduction.ppsxjyoti_lakhani
 
Tree terminology and introduction to binary tree
Tree terminology and introduction to binary treeTree terminology and introduction to binary tree
Tree terminology and introduction to binary treejyoti_lakhani
 
Ds006 linked list- delete from front
Ds006   linked list- delete from frontDs006   linked list- delete from front
Ds006 linked list- delete from frontjyoti_lakhani
 
Ds06 linked list- insert a node after a given node
Ds06   linked list-  insert a node after a given nodeDs06   linked list-  insert a node after a given node
Ds06 linked list- insert a node after a given nodejyoti_lakhani
 
Ds06 linked list- insert a node at end
Ds06   linked list- insert a node at endDs06   linked list- insert a node at end
Ds06 linked list- insert a node at endjyoti_lakhani
 
Ds06 linked list- insert a node at beginning
Ds06   linked list- insert a node at beginningDs06   linked list- insert a node at beginning
Ds06 linked list- insert a node at beginningjyoti_lakhani
 
Ds06 linked list- intro and create a node
Ds06   linked list- intro and create a nodeDs06   linked list- intro and create a node
Ds06 linked list- intro and create a nodejyoti_lakhani
 
Ds04 abstract data types (adt) jyoti lakhani
Ds04 abstract data types (adt) jyoti lakhaniDs04 abstract data types (adt) jyoti lakhani
Ds04 abstract data types (adt) jyoti lakhanijyoti_lakhani
 
Ds03 part i algorithms by jyoti lakhani
Ds03 part i algorithms   by jyoti lakhaniDs03 part i algorithms   by jyoti lakhani
Ds03 part i algorithms by jyoti lakhanijyoti_lakhani
 
Ds03 algorithms jyoti lakhani
Ds03 algorithms jyoti lakhaniDs03 algorithms jyoti lakhani
Ds03 algorithms jyoti lakhanijyoti_lakhani
 
Ds02 flow chart and pseudo code
Ds02 flow chart and pseudo codeDs02 flow chart and pseudo code
Ds02 flow chart and pseudo codejyoti_lakhani
 
Ds01 data structure introduction - by jyoti lakhani
Ds01 data structure  introduction - by jyoti lakhaniDs01 data structure  introduction - by jyoti lakhani
Ds01 data structure introduction - by jyoti lakhanijyoti_lakhani
 

More from jyoti_lakhani (20)

CG02 Computer Graphic Systems.ppsx
CG02 Computer Graphic Systems.ppsxCG02 Computer Graphic Systems.ppsx
CG02 Computer Graphic Systems.ppsx
 
Projections.pptx
Projections.pptxProjections.pptx
Projections.pptx
 
CG04 Color Models.ppsx
CG04 Color Models.ppsxCG04 Color Models.ppsx
CG04 Color Models.ppsx
 
CG03 Random Raster Scan displays and Color CRTs.ppsx
CG03 Random Raster Scan displays and Color CRTs.ppsxCG03 Random Raster Scan displays and Color CRTs.ppsx
CG03 Random Raster Scan displays and Color CRTs.ppsx
 
CG02 Computer Graphic Systems.pptx
CG02 Computer Graphic Systems.pptxCG02 Computer Graphic Systems.pptx
CG02 Computer Graphic Systems.pptx
 
CG01 introduction.ppsx
CG01 introduction.ppsxCG01 introduction.ppsx
CG01 introduction.ppsx
 
Doubly linked list
Doubly linked listDoubly linked list
Doubly linked list
 
Double ended queue
Double ended queueDouble ended queue
Double ended queue
 
Tree terminology and introduction to binary tree
Tree terminology and introduction to binary treeTree terminology and introduction to binary tree
Tree terminology and introduction to binary tree
 
Priority queue
Priority queuePriority queue
Priority queue
 
Ds006 linked list- delete from front
Ds006   linked list- delete from frontDs006   linked list- delete from front
Ds006 linked list- delete from front
 
Ds06 linked list- insert a node after a given node
Ds06   linked list-  insert a node after a given nodeDs06   linked list-  insert a node after a given node
Ds06 linked list- insert a node after a given node
 
Ds06 linked list- insert a node at end
Ds06   linked list- insert a node at endDs06   linked list- insert a node at end
Ds06 linked list- insert a node at end
 
Ds06 linked list- insert a node at beginning
Ds06   linked list- insert a node at beginningDs06   linked list- insert a node at beginning
Ds06 linked list- insert a node at beginning
 
Ds06 linked list- intro and create a node
Ds06   linked list- intro and create a nodeDs06   linked list- intro and create a node
Ds06 linked list- intro and create a node
 
Ds04 abstract data types (adt) jyoti lakhani
Ds04 abstract data types (adt) jyoti lakhaniDs04 abstract data types (adt) jyoti lakhani
Ds04 abstract data types (adt) jyoti lakhani
 
Ds03 part i algorithms by jyoti lakhani
Ds03 part i algorithms   by jyoti lakhaniDs03 part i algorithms   by jyoti lakhani
Ds03 part i algorithms by jyoti lakhani
 
Ds03 algorithms jyoti lakhani
Ds03 algorithms jyoti lakhaniDs03 algorithms jyoti lakhani
Ds03 algorithms jyoti lakhani
 
Ds02 flow chart and pseudo code
Ds02 flow chart and pseudo codeDs02 flow chart and pseudo code
Ds02 flow chart and pseudo code
 
Ds01 data structure introduction - by jyoti lakhani
Ds01 data structure  introduction - by jyoti lakhaniDs01 data structure  introduction - by jyoti lakhani
Ds01 data structure introduction - by jyoti lakhani
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Cyber crime and cyber security

  • 1. Cyber Crime, Cyber Security and Cyber Rights in INDIA Ms. Jyoti Lakhani Head, Department of Computer Science Maharaja Ganga Singh University, Bikaner
  • 2. Cyber Crime ANY “CRIMINAL ACTIVITY” PERFORMED USING COMPUTER Electronic Crime e-Crime It’s an “UN-LAWFUL ACT” wherein the computer is either a tool or a target or both
  • 3. First Occurrence of Cyber Crime The first spam email took place in 1978 when it was sent out over the Arpanet (Advanced Research Projects Agency Network) The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk cloner
  • 4. Categories of Cyber Crime Cyber crimes against Persons Cyber crimes against Property Cyber crimes against Government Cyber crimes against Society
  • 6. Cyber-Criminals An Insider threat is a malicious threat to an organization Comes from people within the organization, such as employees, former employees, contractors or business associates Who have inside information concerning the organization's security practices, data and computer systems Employees itself Insider threat
  • 7. Cyber-Criminals Hackers A hacker is someone who seeks and exploits weaknesses in a computer system or computer network
  • 8. Cyber-Criminals Hactivist (overloads e-mail servers or hack web sites to send political message)
  • 9. Cyber-Criminals Virus writers (writes viruses to infect systems)
  • 10. Cyber-Criminals Criminal groups (attack systems & steal password for financial gain)
  • 11. Cyber-Criminals Sensitive intrusions (sensitive information is obtained via computer intrusions)
  • 12. Cyber-Criminals Information warfare (alternative to military attacks)
  • 13. Cyber-Criminals Terrorists (who have potential to disrupt government systems with computer attacks)
  • 14. Cyber-Criminals Cyber Warfare (attack by sovereigns --- Crime or Declaration of war)
  • 16. Weapons Cyber Crime Hacking Unauthorized access to any computer systems or networks is known as ‘HACKING’. That is accessing the information of others without proper authorization.
  • 17. Weapons of Cyber Crime Data Diddling This is altering raw data just before a computer processes it and then changing it back after the processing is completed.
  • 18. Weapons of Cyber Crime Denial of Service Attack The computer is flooded with more requests than it can handle which cause it to crash. Distributed Denial of Service (DDOS) attack is a example.
  • 19. Weapons of Cyber Crime Email Bombing It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing.
  • 20. Weapons of Cyber Crime Trojan Attacks This term has its origin in the word ‘Trojan horse’. In software field this means an unauthorized program, which passively gains control over another’s computer by representing itself as an authorized program. The most common form of installing a Trojan is through e-mail.
  • 21. Weapons of Cyber Crime Web Jacking This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the website of another. He may even manipulate or change the information of the website. This may be done for fulfilling political objectives or for money.
  • 22. Weapons of Cyber Crime Virus Attack Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it.
  • 23. Weapons of Cyber Crime Worm Attacks Worms unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on the computer’s memory.
  • 24. Weapons of Cyber Crime Salami Attacks This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed.
  • 25. Weapons of Cyber Crime Phishing Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason. The fraudster then has access to the customer’s online bank account and to the funds contained in that account.
  • 26. Weapons of Cyber Crime Spamming Electronic spamming is the use of electronic messaging systems to send unsolicited bulk messages (spam), especially advertising, indiscriminately. The most widely recognized form of spam is e-mail spam.
  • 27. Weapons of Cyber Crime Cyber stalking is the use of the internet or other electronic means to stalk someone. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly.
  • 28. Cyber Crimes Against Persons Harassment via E-Mails (Email harassment is the act of consistently sending unwanted electronic communications to a person to intimidate, frighten, or...) Hacking E-Mail / SMS Spoofing (E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.) Carding( False credit card/debit card etc.) Assault by Threat (threatening)
  • 29. Cyber Crimes Against Property Intellectual Property Crimes (Criminal offences (counterfeiting and piracy) Infringement of trade marks and copyrights can be criminal offences) Cyber Squatting (is registering, trafficking in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else.) Cyber Vandalism (Cyber vandals are individuals who damage information infrastructures purely for their own enjoyment and pleasure. Their primary motivation is not financial;) Transmitting Virus Internet Time Thefts - Internet time theft comes under the heading of hacking. It is the use by an unauthorized person of the Internet hours paid for by another person.
  • 30. Cyber Crimes Against Government Cyber Terrorism: Cyber Terrorism is a phrase used to describe the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
  • 31. Cyber crimes Against Society Cyber Trafficking Drug traffickers are increasingly taking advantage of the Internet" according to cyber authorities and personnel. to sell their illegal substances through encrypted Online Gambling (gambling using the Internet.) Forgery - person is guilty of forgery if he or she makes a false instrument with the intention that it shall be used to induce another person to accept it as genuine and, by reason of so accepting it, to do some act, or to make some omission, to the prejudice of that person or any other person.
  • 32. CYBER CRIME IN INDIA
  • 33. Cyber Crime in INDIA
  • 34. Cyber Crime in India Some Facts • India is the third-most targeted country for Phishing attacks after the US and the UK • The majority of cybercrimes are centered on forgery, fraud and Phishing • Social networks as well as ecommerce sites are major targets • 6.9 million bot-infected systems in 2013 • 14,348 websites defacements in 2013 • 15,000 sites hacked in 2013 • India is number 1 country in the world for generating spams. • 29.9 million people fell victim to cyber crime. • 17% of adults online have experienced cybercrime on their mobile phone. •Source: Norton Cybercrime Report 2013
  • 35. WHY INDIA? • India : world’s third largest Internet user after China and the US • Younger Users • 74 million Active Internet users • 46+ Million Social Network Users • 50 Million users shop online on Ecommerce and Online Shopping Sites • 164.81 million Internet subscribers (as on March 31, 2013) • seven out of eight accessing the Internet from their mobile phones.
  • 36. Cyber Security and Right to Privacy “The Information Technology Act 2000 contains adequate provisions to deal with various cyber related offenses as well as protection of privacy of individuals.
  • 37. IT Act 2000 Crime: Cyber Stalking Definition: Stealthily following a person, tracking his internet chats. Mechanism: By using electronic communication, such as e-mail instant messaging (IM), messages posted to a Web site or a discussion group. Sections and Amendments: 43, 66 (Compensation and punishment of three years with fine) Technical Measures: Not disclosing personal information on Internet, chat, IM and interacting over electronic media with known people only. •Taking up the matter with concerned Service Providers in stopping cyber stalking activities.
  • 38. IT Act 2000 Crime: Intellectual Property Crime Definition: Source Code Tampering etc. Mechanism: Accessing source code or such type of material and stealing or manipulating the code etc. Sections and Amendments: 43, 65, 66 (Compensation and punishment of three years with fine) Technical Measures: Strong authentication and technical measures for prevention of data leakage
  • 39. IT Act 2000 Crime : Salami Attack (Theft of data or manipulating banking account) Definition:Deducting small amounts from an account without coming in to notice, to make big amount Mechanism: By means of unauthorized access to source code of software application and databases Sections and Amendments: 43, 66 (Compensation and punishment of three years) Technical Measures: Strong authentication measures for accessing the data and securing the IT infrastructure involved
  • 40. IT Act 2000 Crime: E-Mail Bombing Definition:Flooding an E-mail box with innumerable number of E-mails, to disable to notice important message at times. Mechanism: Bulk email generation to target specific email account by using automated tools Sections and Amendments: 43, 66 (Compensation and punishment of three years) Technical Measures: Implementing anti-spam filters
  • 41. IT Act 2000 Crime: Phishing Definition: Bank Financial Frauds in Electronic Banking Mechanism: Using social engineering techniques to commit identity theft Sections and Amendments: 43, 66, 66C (Compensation and punishment of three years with fine) Technical Measures: Immediate take-down of phishing websites. •Strong authentication mechanisms for financial and electronic banking. •User awareness on phishing attacks •Keeping the computer systems secure being used for transacting with the financial institutions and banks.
  • 42. IT Act 2000 Crime: Personal Data Theft Definition:Stealing personal data Mechanism:Compromising online personal data, email accounts and computer systems Sections and Amendments: 43, 43A, 72A (Compensation and punishment of three years with fine) Technical Measures: Safeguarding the online data and personal computer systems
  • 43. IT Act 2000 Crime: Identity Theft Definition:Stealing Cyberspace identity information of individual Mechanism:Hacking the personal identity information or employing phishing techniques Sections and Amendments: 43 (Compensation and punishment of three years with fine) Technical Measures: Safeguarding of personal identity information, securing the personal computer systems, awareness on preventing identity theft and adopting safe internet practices
  • 44. IT Act 2000 Crime: Spoofing Definition:Stealing Credentials using, friendly and familiar GUI’s Mechanism:Using tools and other manipulative techniques Sections and Amendments: 43, 66 (Compensation and punishment of three years with fine) Technical Measures: Safeguarding the credentials and implementing anti-spoofing measures
  • 45. IT Act 2000 Crime: Data Theft Definition:Stealing Data Mechanism:Hacking of computer systems and using malicious methods Sections and Amendments: Provisions under 43, 43A, 65,66 and 72 (Compensation and punishment of three years with fine) Technical Measures: Securing the computer systems, implementing data leak prevention measures and creating user awareness
  • 46. IT Act 2000 Crime: Worms Trojan Horses, Virus etc. Definition:Different Hacking mechanisms Mechanism:Different methods to install and propagate malicious code Sections and Amendments: 43, 66 (Compensation and punishment of three years with fine) Technical Measures: Securing computer systems, installing anti-malware systems and creating user awareness.
  • 47. IT Act 2000 Crime: Sabotage of Computer Definition:Taking control of computer with the help of malware. Mechanism:Compromising the computer systems Sections and Amendments: 43, 66 (Compensation and punishment of three years with fine) Technical Measures: Securing computer systems and deploying anti-malware solution
  • 48. IT Act 2000 Crime: DOS, DDOS Demat of Service Definition:Flooding a computer with Denial of Service Attacks, DDOS is Distributed DOS attack Mechanism:Generating flood traffic from thousands and millions of compromised computers using automated tools and techniques Sections and Amendments: 43, 66, 66F (Compensation (up to life imprisonment under 66F) Technical Measures: Implementing DOS, DDOS prevention systems
  • 49. IT Act 2000 Crime: Web Defacing Definition:Web Pages Defacing Mechanism:Compromising the websites and adding or manipulating the web pages with some messages Sections and Amendments: 43, 66 (Compensation and punishment of three years with fine) Technical Measures: Securing the websites and the IT infrastructure used for hosting and maintaining the websites
  • 50. IT Act 2000 Crime: Spam and spoofing Definition:Unsolicited E-mails Mechanism:Sending unsolicited emails through manual and automated techniques Sections and Amendments: 43, 66A, 66D (Compensation and punishment of three years with fine) Technical Measures: Deploying the anti-spam and anti-spoofing solution at email gateways
  • 51. IT Act 2000 Crime: Publishing or transmitting obscene material Definition:Publishing Obscene in Electronic Form Mechanism:Publishing or transmitting the obscene content over electronic media like websites, social networking sites etc. Sections and Amendments: 67 (Punishment of three years with fine) Technical Measures: Taking down of obscene materials over electronic media
  • 52. IT Act 2000 Crime: Pornography Definition:Publishing or transmitting material containing sexually explicit act Mechanism:Publishing pornographic material over electronic media like websites, social networking sites etc. Sections and Amendments: 67A (Punishment of five years with fine) Technical Measures: Taking down of pornographic material publishing websites/ web-pages, online media etc.
  • 53. IT Act 2000 Crime: Child Pornography Definition:Publishing Obscene in Electronic Form involving children Mechanism:Publishing pornographic material involving children over electronic media like websites, etc. Sections and Amendments: 67B Technical Measures: Taking down of pornographic material publishing websites/ web-pages, online media etc.
  • 54. IT Act 2000 Crime: Video Voyeurism and violation of privacy Definition:Transmitting Private/ Personal Video’s on internet and mobiles Mechanism:Transmitting Private/Personal Video’s on internet and mobiles Sections and Amendments: 66E (Punishment of three years with fine) Technical Measures: Taking down of such content as available over internet and transmitted through mobiles.
  • 55. IT Act 2000 Crime: Offensive messages Definition:Transmitting Private/ Personal Video’s on internet and mobiles Mechanism:Transmitting Private/Personal Video’s on internet and mobiles Sections and Amendments: 66E (Punishment of three years with fine) Technical Measures: Taking down of such content as available over internet and transmitted through mobiles.
  • 56. IT Act 2000 Crime: Offensive messages Definition:Communication of offensive messages through computer/ phone Mechanism:Sending or publishing the offensive messages over electronic media like email, websites and social media Sections and Amendments: 66A (Punishment of three years with fine) Technical Measures: Taking down of offensive messages from electronic media and creating user awareness on safe internet practices
  • 57. IT Act 2000 Crime: Hacking of Protected Systems Definition:Protection of Information Infrastructure Mechanism:Hacking the computer systems by using various methods Sections and Amendments: 70 (Punishment of ten years with fine) Technical Measures: Securing the computer systems and related infrastructure, creating user awareness and training of system administrators
  • 58. PREPAREDNESS AND POLICY INITIATIVES WHAI IF the systems like defence establishments, hospitals, transportation, Banks, Government organisations, etc., are hijacked or manipulated through cyber attacks. The Government has taken several actions to improve the alertness of the Government and other critical sector organisations.
  • 59. ‘Crisis Management Plan’ (CMP) For countering cyber attacks and cyber terrorism -All Ministries/ Departments of Central Government, State Governments and their organizations and critical sectors have been mandated to continuously assess the posture of their IT systems and networks. -The CMP mandates following specific steps: 1. Nominate Chief Information Security Officers to co-ordinate the security related issues/implementation within the organisation
  • 60. ‘Crisis Management Plan’ (CMP) 2. Security devices may be installed at all levels. Servers, Local Area Network (LAN) and Wide Area Network (WAN) infrastructure should be secured by installing appropriate perimeter security devices such as firewalls, Intrusion Prevention System and anti-virus system. 3. These security mechanisms should include appropriate devices and methods to log and monitor the events to detect network scanning, probing and Reconnaissance attempts on the IT infrastructure.
  • 61. ‘Crisis Management Plan’ (CMP) 4. These attempts should be regularly reviewed and analysed for initiating necessary preventive measures. 5. Deployment of network traffic scanning technique to improve the visibility into the state of the network and identifying deviations from baselines that may indicate abnormal or suspicious behaviour.
  • 62. Safety Tips to avoid cybercrime •Keep your operating systems up to date with critical security updates and patches. •Don’t open emails or attachments from unknown sources. •Read Privacy policy carefully when you submit the data through internet. •Disable Remote Connectivity. •Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist. •Back-up your computer data on disks or CDs often. •Use antivirus software and firewalls –keep them up to date