1
© AIR LAW ACADEMY & RESEARCH CENTRE,
NAGPUR
Cyber crime
Cyber
Stalking
Cyber
Contraband
Cyber
trespassing
Cyber
laundering
Cyber
Vandalism
Cyber
Slandering
Cyber Theft
Cyber Porn
Cyber
Terrorism
Cyber
Fraud
2© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Misuse of Computer Technology.
 Any crime in which the Computer system or
Technology used as a Tool or Weapon to commit
a crime.
3© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
1. Cyber Fraud 6. Cyber Theft
1. Cyber Trespassing 7. Cyber Pornography
1. Cyber Laundering 8. Cyber Stalking
1. Cyber Terrorism 9. Cyber Slandering
1. Cyber Vandalism 10. Cyber Contraband
4© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Wrong doings
 It includes Financial Fraud.
Example: In U.S one of the top most nationalized bank had
his interest calculation programme malfunctioning i.e. from
every account Indian Rs. 2/- were being taken & deposited
in the account of an unknown person in the bank. Since the
bank had almost 20 lakh account holders taking Indian Rs.
2/- from each account meant that Rs. 40 lakh were
transferred to an unknown account.
5© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 In this type of crime the victim is followed
online by the accused through Computer system.
 Distinguished emails are sent to the victim who
unknowingly downloads the mails into the
machine, not knowing that the email containing
attachment will later work as a spy program to
send the details of the victim to the accused.
6© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 In this type of crime, emails are sent to the
victim making them believe that they have won
lottery or some million dollars, receiving emails
by the victims that their ancestral property is
deposited in some certain bank etc.
 These emails ask for the personal details of the
victim such as name, address, occupation, bank
account number, passport details etc.
7© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Misuse of technology to commit any terrorist
activity.
 In the internet world terrorist use code word
such as Honey for selling & buying of guns,
weapons etc.
 Around 50,000 websites promote terrorism.
8© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Spoiling individual's/ country’s/ organization’s
image.
 Sites such as Orkut, Face book etc are mostly used
for Vandalism.
For e.g. in a recent case a girls profile was tarnished
on a famous social network site “Orkut”. On further
investigation by the police it was revealed that the
profile was put by the victims best friend.
9© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
The reason for tarnishing the image was that
both girls were in love with the same boy and
therefore to break up her relationship the girl’s
best friend did it, such that the boy could
develop a negative attitude towards the girl and
therefore she will get to marry that boy. Similar
circumstances in Vandalism took place when
Maharashtra Supreme patriot “ Shivaji
Maharaja” image was tarnished on Orkut
10© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Stealing internet time
 Unauthorized sharing of USB Modem/Data
11© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Publishing the information or broadcasting website which
is lascivious in nature.
 Pornography MMS.
Example: A boy who had pocked nose, to take revenge
from his friend and teacher fabricated the original
photograph with some unwarranted porno image and
published it on the website. On further investigation by
the police it was found the photograph was a morphed
one. It is assumed that there are 42 lakh website which
promote pornography through out the world.
12© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Includes chatting crimes, threatening E-mails
recording of the chat in unauthorized manner.
13© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Giving wrong information while registering a
website.
14© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Buying and selling of illegal on internet.
 Smuggling
15© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
 Awareness is the first step in protecting yourself,
your family and your business.
 Use antivirus software’s
 Insert Firewalls
 Uninstall unnecessary software
 Maintain backup
 Check security setting
 Stay anonymous –Choose a genderless screen name
 Never give your full name or address to strangers
16© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
17
THANK YOU

Cyber crime ppt new

  • 1.
    1 © AIR LAWACADEMY & RESEARCH CENTRE, NAGPUR
  • 2.
  • 3.
     Misuse ofComputer Technology.  Any crime in which the Computer system or Technology used as a Tool or Weapon to commit a crime. 3© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 4.
    1. Cyber Fraud6. Cyber Theft 1. Cyber Trespassing 7. Cyber Pornography 1. Cyber Laundering 8. Cyber Stalking 1. Cyber Terrorism 9. Cyber Slandering 1. Cyber Vandalism 10. Cyber Contraband 4© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 5.
     Wrong doings It includes Financial Fraud. Example: In U.S one of the top most nationalized bank had his interest calculation programme malfunctioning i.e. from every account Indian Rs. 2/- were being taken & deposited in the account of an unknown person in the bank. Since the bank had almost 20 lakh account holders taking Indian Rs. 2/- from each account meant that Rs. 40 lakh were transferred to an unknown account. 5© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 6.
     In thistype of crime the victim is followed online by the accused through Computer system.  Distinguished emails are sent to the victim who unknowingly downloads the mails into the machine, not knowing that the email containing attachment will later work as a spy program to send the details of the victim to the accused. 6© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 7.
     In thistype of crime, emails are sent to the victim making them believe that they have won lottery or some million dollars, receiving emails by the victims that their ancestral property is deposited in some certain bank etc.  These emails ask for the personal details of the victim such as name, address, occupation, bank account number, passport details etc. 7© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 8.
     Misuse oftechnology to commit any terrorist activity.  In the internet world terrorist use code word such as Honey for selling & buying of guns, weapons etc.  Around 50,000 websites promote terrorism. 8© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 9.
     Spoiling individual's/country’s/ organization’s image.  Sites such as Orkut, Face book etc are mostly used for Vandalism. For e.g. in a recent case a girls profile was tarnished on a famous social network site “Orkut”. On further investigation by the police it was revealed that the profile was put by the victims best friend. 9© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 10.
    The reason fortarnishing the image was that both girls were in love with the same boy and therefore to break up her relationship the girl’s best friend did it, such that the boy could develop a negative attitude towards the girl and therefore she will get to marry that boy. Similar circumstances in Vandalism took place when Maharashtra Supreme patriot “ Shivaji Maharaja” image was tarnished on Orkut 10© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 11.
     Stealing internettime  Unauthorized sharing of USB Modem/Data 11© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 12.
     Publishing theinformation or broadcasting website which is lascivious in nature.  Pornography MMS. Example: A boy who had pocked nose, to take revenge from his friend and teacher fabricated the original photograph with some unwarranted porno image and published it on the website. On further investigation by the police it was found the photograph was a morphed one. It is assumed that there are 42 lakh website which promote pornography through out the world. 12© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 13.
     Includes chattingcrimes, threatening E-mails recording of the chat in unauthorized manner. 13© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 14.
     Giving wronginformation while registering a website. 14© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 15.
     Buying andselling of illegal on internet.  Smuggling 15© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 16.
     Awareness isthe first step in protecting yourself, your family and your business.  Use antivirus software’s  Insert Firewalls  Uninstall unnecessary software  Maintain backup  Check security setting  Stay anonymous –Choose a genderless screen name  Never give your full name or address to strangers 16© AIR LAW ACADEMY & RESEARCH CENTRE, NAGPUR
  • 17.
    © AIR LAWACADEMY & RESEARCH CENTRE, NAGPUR 17 THANK YOU