SlideShare a Scribd company logo
Monday, September 24, 2012
GROUP
                              1
Monday, September 24, 2012
Crimes are not to be measured by the issue of
   events, but by the bad intensions of men.




 The greatest crimes do not arise from a want of
feeling for others but from an over sensibility for
   ourselves and an over indulgence in our own
                     desires.


  Monday, September 24, 2012
CYBER CRIME !!
The expression ‘Crime’ is defined as an act, which subjects the doer to
legal punishment or any offence against morality, social order or any
unjust or shameful act. The “Offence" is defined in the Code of
Criminal Procedure to mean as an act or omission made punishable by
any law for the time being in force.

Cyber Crime is emerging as a serious threat. World wide
governments, police departments and intelligence units have started
to react.




   Monday, September 24, 2012
Cyber Crime is a term used to broadly describe criminal activity in which computers
or computer networks are a tool, a target, or a place of criminal activity and include
  everything from electronic cracking to denial of service attacks. It is also used to
 include traditional crimes in which computers or networks are used to enable the
                                   illicit activity.


 Computer crime mainly consists of unauthorized access to computer systems data
alteration, data destruction, theft of intellectual property. Cyber crime in the context
   of national security may involve hacking, traditional espionage, or information
                             warfare and related activities.


 Pornography, Threatening Email, Assuming someone's Identity, Sexual Harassment,
  Defamation, Spam and Phishing are some examples where computers are used to
commit crime, whereas Viruses, Worms and Industrial Espionage, Software Piracy and
          Hacking are examples where computers become target of crime.


    Monday, September 24, 2012
Indian Crime Scene

                                        The major Cyber Crimes reported, in
                                 India, are Denial of Services, Defacement of
                                Websites, Spam, Computer Virus and Worms,
                               Pornography, Cyber Squatting, Cyber Stalking
                                                                  and Phishing.
                                     Given the fact that nearly $ 120 million
                              worth of Mobiles are being lost or stolen in the
                                 country every year, the users have to protect
                                 Information, Contact details and Telephone
                              numbers as these could be misused. Nearly 69
                                per cent of information theft is carried out by
                                current and ex-employees and 31 per cent by
                             hackers. India has to go a long way in protecting
                                                         the vital information.
                                      [3 The Hindu, Saturday, Oct 27, 2007].
Monday, September 24, 2012
Cyber Crime Variants

Hacking
"Hacking" is a crime, which entails cracking
systems and gaining unauthorized access to the
data stored in them. Hacking had witnessed a 37
per cent increase this year.

Cyber Squatting
Cyber Squatting is the act of registering a famous
Domain Name and then selling it for a fortune.
This is an issue that has not been tackled in
IT ACT 2000.




    Monday, September 24, 2012
Phishing is just one of the many frauds on
the Internet, trying to fool people into
parting with their money. Phishing refers to
the receipt of unsolicited emails by
customers of Financial Institutions,
requesting them to enter their Username,
Password or other personal information to
access their Account for some reason.

The fraudster then has access to the
customer's online bank account and to the
funds contained in that account.
 Monday, September 24, 2012
Cyber Stalking is use of the Internet or other
                         electronic means to stalk someone. This
                         term is used interchangeably with online
                         harassment and online abuse. Stalking
                         generally involves harassing or threatening
                         behaviour that an individual engages in
                         repeatedly, such as following a person,
                         appearing at a person's home or place of
                         business, making harassing phone calls,
                         leaving written messages or objects, or
                         vandalizing a person's property.
Monday, September 24, 2012
VISHING
                             Vishing is the criminal practice of using
                                social engineering and Voice over IP
                             (VoIP) to gain access to private personal
                                 and financial information from the
                                 public for the purpose of financial
                                reward. The term is a combination of
                               “Voice" and phishing. Vishing exploits
                              the public's trust in landline telephone
                                               services.

                              Vishing is typically used to steal credit
                             card numbers or other information used
                                  in identity theft schemes from
Monday, September 24, 2012                  individuals.
India stands 11th in the ranking for Cyber Crime in
         the World, constituting 3% of the Global Cyber
Monday, September 24, 2012
                             Crime.
Why India?
A rapidly growing online user
base
     121 Million Internet Users
     65 Million Active Internet Users,
      up by 28% from 51 million in
      2010
     50 Million users shop online on
      Ecommerce and Online
      Shopping Sites
     46+ Million Social Network
      Users
     346 million mobile users had
      subscribed to Data Packages.
  Monday, September 24, 2012
    Source: IAMAI; Juxt; wearesocial 2011
Cyber Crime                              In
India


 The majority of cybercrimes are centered on forgery, fraud and
  Phishing,
 India is the third-most targeted country for Phishing attacks
  after the US and the UK,
 Social networks as well as ecommerce sites are major targets,
 6.9 million bot-infected systems in 2010,
 14,348 website defacements in 2010,
 6,850 .in and 4,150 .com domains were defaced during 2011,
 15,000 sites hacked in 2011,
 India is the number 1 country in the world for generating spam.
 Monday, September 24, 2012
Cost Of Cyber Crime In India (2010)



 29.9 million people fell victim to cybercrime,
 $4 billion in direct financial losses,
 $3.6 billion in time spent resolving the crime,
 4 in 5 online adults (80%) have been a victim of
  Cybercrime,
 17% of adults online have experienced cybercrime
  on their mobile phone.

Source: Norton Cybercrime Report 2011


Monday, September 24, 2012
We have covered about three instances where high-profile government websites were
   hacked and defaced. However, the actual number of Government Websites that were
   hacked are quite huge.

   A total number of 90, 119, 252 and 219 Government websites tracked by the Indian
   Computer Emergency Response Team (CERT-In) were hacked / defaced by various
   hacker groups in the year 2008, 2009, 2010 and Jan–Oct 2011 respectively.
Monday, September 24, 2012
 Again, this is
                                                  growing trend and
                                                  it is surprising that
                                                  authorities have
                                               not taken stern
                                               actions to curb the
                                               growth of these
                                               cyber-crimes.



 The police have recorded 3,038 cases but made only 2,700
  arrests in 3 years (between 2007 and 2010)

 India registered only 1,350 cases under the IT Act and IPC in
  2010

 50% of cybercrimes are not even reported.
  Monday, September 24, 2012
Cyber Laws in India

Under The Information
Technology Act, 2000
CHAPTER XI – OFFENCES – 66. Hacking with
computer system.

(1) Whoever with the Intent to cause or knowing
 that he is likely to cause Wrongful Loss or
Damage to the public or any person Destroys or
Deletes or Alters any Information Residing in a
Computer Resource or diminishes its value or
utility or affects it injuriously by any means,
commits hack.

(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with
fine which may extend up to two lakh rupees, or with both.



    Monday, September 24, 2012
Whoever without permission of
  the owner of the computer :

         Secures Access;
         Downloads, Copies or extracts
        any data, computer database or
        any information;
         Introduce or causes to be introduce
        any Virus or Contaminant;
         Disrupts or causes disruption;
         Denies or causes denial of access to any person;
         Provides any assistance to any person to facilitate access
         Charges the services availed of by a person to the account of
            another person by Tampering with or Manipulating any Computer,
            Computer System, or Computer Network;

        Shall be liable to pay damages by way of compensation not exceeding one
        crore rupees to the person so affected.
Monday, September 24, 2012
Information Technology Amendment Act,
                    2008
Section – 43,
Destroys, Deletes or Alters any Information residing in a computer resource or
diminishes its value or utility or affects it injuriously by any means;

Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy
or alter any computer source code used for a computer resource with an intention
to cause damage;

“If any person, dishonestly, or fraudulently, does any act referred to in section 43,
he shall be punishable with imprisonment for a term which may extend to two
three years or with fine which may extend to five lakh rupees or with both.” [S.66]
  Monday, September 24, 2012
S .66A      - P u n i s h me n tf or s e ndi ng
o f f e n s i v e me s s a g e s t h r o u g h
c o mmu n i c a t i o n s e r v i c e , e t c
 A n y p e r s o n w h o s e n d s , b y me a n s o f   a
  c o mp u t e r r e s o u r c e o r a
  c o mmu n i c a t i o n d e v i c e ;
 A n y i n f o r ma t i o n t h a t i s g r o s s l y
  o f f e n s i v e o r h a s me n a c i n g
  c ha r a c t e r ; or
 An    y i n f o r ma t i o n w h i c h h e k n o w s t o
  be     f a l s e , but f or t he pur pos e of
  c a   us i ng a nnoy a nc e , i nc onv e ni e nc e ,
  da    nge r , obs t r uc t i on , i ns ul t ,
  i n   j u r y , c r i mi n a l i n t i mi d a t i o n ,
  e n   mi t y , h a t r e d , o r i l l w i l l ,
  pe    r s i s t e n t l y ma k e s b y ma k i n g u s e
  of     s u c h c o mp u t e r r e s o u r c e o r a
  c o   mmu n i c a t i o n d e v i c e ;
 A n y e l e c t r o n i c ma i l o r e l e c t r o n i c
 Monday, September m 2012 s a g e
  m a i l 24, e s                 f or t he pur pos e of
  c a us i ng a nnoy a nc e or
S. 66C - Punishment for identity theft
        “Whoever, fraudulently or dishonestly make use of the
electronic signature, password or any other unique identification
feature of any other person, shall be punished with imprisonment
of either description for a term which may extend to three years
and shall also be liable to fine which may extend to rupees one
lakh”

S. 66D - Punishment for cheating by personation by using
computer resource

            “Whoever, by means of any communication device or
computer resource cheats by personation, shall be punished with
imprisonment of either description for a term which may extend
to three years and shall also be liable to fine which may extend to
one lakh rupees. “
  Monday, September 24, 2012
S . 66E - P u n i s h m e n t f o r
v i ol a t i on of             pr i v a c y .

“Wh o e v e r , i n t e n t i o n a l l y o r
k n o wi n g l y c a p t u r e s , p u b l i s h e s o r
t   r a   n s mi t s t h e i ma g e o f a p r i v a t e
a   r e   a o f a n y p e r s o n wi t h o u t h i s o r
h   e r    c o n s e n t , u n d e r c i r c u ms t a n c e s
v   i o   l a t i ng t he pr i v a c y of t ha t
p   e r   s o n , s h a l l b e p u n i s h e d wi t h
i   mp    r i s o n me n t w h i c h ma y e x t e n d t o
t   hr    e e y e a r s o r wi t h f i n e n o t
e   x c   e e d i n g t wo l a k h r u p e e s , o r wi t h
b   ot    h”

S . 67 A         - P u n i s h me n t    f    or
publ i s hi ng or t r a ns                   mi t t i n g
o f ma t e r i a l c o n t a i n             i ng
sMonday,x u a 24, 2012 y e x p l i c i t a
   e September l l                           c t , e t c . i n
S. 67 C - Preservation and Retention of information
by intermediaries.


“(1) Intermediary shall preserve and retain such
information as may be specified for such duration and
in such manner and format as the Central Government
may prescribe.

(2) Any intermediary who intentionally or knowingly
contravenes the provisions of sub section (1) shall be
punished with an imprisonment for a term which may
extend to three years and shall also be liable to fine.”

Monday, September 24, 2012
Arrests & Reports Under IT Act
                              Under the IT Act, 966 cybercrime
                               cases were filed in 2010
                               420 in 2009)
                              Geographic breakdown of cases
                               reported:
                                o   153 from Karnataka,
                                o   148 from Kerala
                                o   142 from Maharashtra
                                o   105 Andhra Pradesh
                                o   52 Rajasthan
                                o   52 Punjab
                              233 persons were arrested in 2010
                              33% of the cases registered were
                               related to hacking
                             Source: National Crime Records Bureau

Monday, September 24, 2012
Arrests & Reports Under IPC
 Under the IPC, 356 cybercrime cases were registered in
  2010 (276 cases in 2009)
 Geographic breakdown of cases reported --

      o 104 from Maharashtra
      o 66 Andhra Pradesh
      o 46 Chhattisgarh


                            The majority of these crimes were
    either                          forgery or fraud cases.

                             Source: National Crime Records Bureau


Monday, September 24, 2012
How to Tackle Such Activities?

An important question arises that how can these crimes be prevented. A
number of techniques and solutions have been presented but the problems still
exists and are increasing day by day.

Antivirus And Anti Spyware Software:
Аntivirus software consists of computer programs that attempt to identify,
thwart and eliminate computer viruses and other malicious software. Anti spy
wares are used to restrict backdoor program, trojans and other spy wares to be
installed on the computer.

Firewalls:
A firewall protects a computer network from unauthorized access. Network
firewalls may be hardware devices, software programs, or a combination of the
two. A network firewall typically guards an internal computer network against
malicious access from outside the network.

 Monday, September 24, 2012
Cr y p t o g r a p h y :
Cr    y pt ogr a phy i s t he s c i e nc e of
e n   c r y pt i ng a nd de c r y pt i ng
i n   f o r ma t i o n . E n c r y p t i o n i s l i k e
s e   n d i n g a p o s t a l ma i l t o a n o t h e r
pa    r t y wi t h a l o c k c o d e o n t h e
e n   v e l o p e wh i c h i s k n o wn o n l y t o
t h   e s e nde r a nd t he r e c i pi e nt . A
nu    mb e r o f c r y p t o g r a p h i c me t h o d s
ha    v e b e e n d e v e l o p e d a n d s o me o f
t h   e m a r e s t i l l not c r a c k e d.


Cy b e r      E t h i c s a n d L a ws :
Cy b e r e t h i c s a       n d c y b e r l a ws a r e
a l s o be i ng f or         mu l a t e d t o s t o p
c y b e r c r i me s . I      t i s a
r e s pons i bi l i t        y of e v e r y
i ndi v i dua l t o          f ol l ow c y be r e t hi c s
Monday, September 24, 2012
a n d c y b e r l a ws        s o t ha t t he
The Future of Cyber-Crimes in India
• Continued Website Hacks and
  Defacements

• Data and Information theft

• Increasing phishing attacks on
  Ecommerce and Financial Websites

• Cybercriminals targeting Social and
  Professional Networks

• Threats directed at the Mobile Platform:
  Smartphones and Tablets
  Monday, September 24, 2012
Conclusion…
“Indian Laws are well drafted and are capable of handling all kinds of
challenges as posed by cyber criminals. However, the enforcement
agencies are required to be well versed with the changing technologies
and Laws.”

"As internet technology advances so does the threat of cyber crime.
In times like these we must protect ourselves from cyber crime. Anti-
virus software, firewalls and security patches are just the beginning.
Never open suspicious e-mails and only navigate to trusted sites.”
  Monday, September 24, 2012
THANK YOU!!
                             F.Y.B.M.S. – B
                           -- Namita Ludbe (140)
                           -- Kavish Pandya (149)
                        -- Mohammed Lakdawala (117)
                           -- Ruchit Mehta (114)
                           -- Kalpesh Solanki (70)
                             -- Yash Dodia (93)
                             -- Pratik Jain (72)
Monday, September 24, 2012

More Related Content

What's hot

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
Sanjay Kumar
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
bhavya mohindru
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
Tejesh Dhaypule
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah
 

What's hot (20)

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 

Viewers also liked

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Cyber security
Cyber securityCyber security
Cyber security
Siblu28
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Zara Tariq
 
Death To Bullshit
Death To BullshitDeath To Bullshit
Death To Bullshit
Brad Frost
 
Simone Burgess Career Portfolio 2012
Simone Burgess Career Portfolio 2012Simone Burgess Career Portfolio 2012
Simone Burgess Career Portfolio 2012
simoneburgess
 
ppt on e crime management system
ppt on e crime management systemppt on e crime management system
ppt on e crime management system
Krishna Kinkar Jha
 
SydMobNet July 2014: Xamarin 3 & Xamarin Forms
SydMobNet July 2014: Xamarin 3 & Xamarin FormsSydMobNet July 2014: Xamarin 3 & Xamarin Forms
SydMobNet July 2014: Xamarin 3 & Xamarin Forms
Alec Tucker
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
Madhushree Shettigar
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of InternetAreeb Khan
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
n|u - The Open Security Community
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
fariez91
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Tushar Malhotra
 
Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)
gunpreet kamboj
 
2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography
Frederick Lane
 
Child labour
Child labourChild labour
Child labour
Sandy Rathore
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
008_Anuj
 
PPT on Child labor
PPT on Child labor PPT on Child labor
PPT on Child labor
Mv Raam
 
Presentation on farmer suicides
Presentation on farmer suicidesPresentation on farmer suicides
Presentation on farmer suicides
Divya Ravali
 
111124 farmer suicides presentation
111124 farmer suicides presentation111124 farmer suicides presentation
111124 farmer suicides presentationRamanjaneyulu GV
 

Viewers also liked (20)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Crime Record Management System (CRMS)
Crime Record Management System (CRMS)Crime Record Management System (CRMS)
Crime Record Management System (CRMS)
 
Death To Bullshit
Death To BullshitDeath To Bullshit
Death To Bullshit
 
Simone Burgess Career Portfolio 2012
Simone Burgess Career Portfolio 2012Simone Burgess Career Portfolio 2012
Simone Burgess Career Portfolio 2012
 
ppt on e crime management system
ppt on e crime management systemppt on e crime management system
ppt on e crime management system
 
SydMobNet July 2014: Xamarin 3 & Xamarin Forms
SydMobNet July 2014: Xamarin 3 & Xamarin FormsSydMobNet July 2014: Xamarin 3 & Xamarin Forms
SydMobNet July 2014: Xamarin 3 & Xamarin Forms
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)
 
2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography
 
Child labour
Child labourChild labour
Child labour
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
PPT on Child labor
PPT on Child labor PPT on Child labor
PPT on Child labor
 
Presentation on farmer suicides
Presentation on farmer suicidesPresentation on farmer suicides
Presentation on farmer suicides
 
111124 farmer suicides presentation
111124 farmer suicides presentation111124 farmer suicides presentation
111124 farmer suicides presentation
 

Similar to Cyber crime ppt

Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER
Sooraj Maurya
 
cybercrimeppt-120924121427-phpapp01.ppt
cybercrimeppt-120924121427-phpapp01.pptcybercrimeppt-120924121427-phpapp01.ppt
cybercrimeppt-120924121427-phpapp01.ppt
SIRINET2
 
cybercrimeppt-1209241214217-phpapp01.ppt
cybercrimeppt-1209241214217-phpapp01.pptcybercrimeppt-1209241214217-phpapp01.ppt
cybercrimeppt-1209241214217-phpapp01.ppt
SIRINET2
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
Ajnish Rana
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
IJARIIT
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Aamir Malik
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
Gaurav Patel
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
PrabhatChoudhary11
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
Aman Sharma
 
Types of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on SocietyTypes of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on Society
nanjeebarifa
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
kirtigoyal328
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
PrabhatChoudhary11
 
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
A Study On The Cyber-Crime And Cyber Criminals  A Global ProblemA Study On The Cyber-Crime And Cyber Criminals  A Global Problem
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
Christina Bauer
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
Priyatham Kanigarla
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Arindam Sarkar
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
Aman Bhargava
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
Michele Thomas
 

Similar to Cyber crime ppt (20)

Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER
 
cybercrimeppt-120924121427-phpapp01.ppt
cybercrimeppt-120924121427-phpapp01.pptcybercrimeppt-120924121427-phpapp01.ppt
cybercrimeppt-120924121427-phpapp01.ppt
 
cybercrimeppt-1209241214217-phpapp01.ppt
cybercrimeppt-1209241214217-phpapp01.pptcybercrimeppt-1209241214217-phpapp01.ppt
cybercrimeppt-1209241214217-phpapp01.ppt
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Types of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on SocietyTypes of Cybercrime and Its Impact on Society
Types of Cybercrime and Its Impact on Society
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
A Study On The Cyber-Crime And Cyber Criminals  A Global ProblemA Study On The Cyber-Crime And Cyber Criminals  A Global Problem
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 

Recently uploaded

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 

Recently uploaded (20)

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

Cyber crime ppt

  • 2. GROUP 1 Monday, September 24, 2012
  • 3. Crimes are not to be measured by the issue of events, but by the bad intensions of men. The greatest crimes do not arise from a want of feeling for others but from an over sensibility for ourselves and an over indulgence in our own desires. Monday, September 24, 2012
  • 4. CYBER CRIME !! The expression ‘Crime’ is defined as an act, which subjects the doer to legal punishment or any offence against morality, social order or any unjust or shameful act. The “Offence" is defined in the Code of Criminal Procedure to mean as an act or omission made punishable by any law for the time being in force. Cyber Crime is emerging as a serious threat. World wide governments, police departments and intelligence units have started to react. Monday, September 24, 2012
  • 5. Cyber Crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to enable the illicit activity. Computer crime mainly consists of unauthorized access to computer systems data alteration, data destruction, theft of intellectual property. Cyber crime in the context of national security may involve hacking, traditional espionage, or information warfare and related activities. Pornography, Threatening Email, Assuming someone's Identity, Sexual Harassment, Defamation, Spam and Phishing are some examples where computers are used to commit crime, whereas Viruses, Worms and Industrial Espionage, Software Piracy and Hacking are examples where computers become target of crime. Monday, September 24, 2012
  • 6. Indian Crime Scene The major Cyber Crimes reported, in India, are Denial of Services, Defacement of Websites, Spam, Computer Virus and Worms, Pornography, Cyber Squatting, Cyber Stalking and Phishing. Given the fact that nearly $ 120 million worth of Mobiles are being lost or stolen in the country every year, the users have to protect Information, Contact details and Telephone numbers as these could be misused. Nearly 69 per cent of information theft is carried out by current and ex-employees and 31 per cent by hackers. India has to go a long way in protecting the vital information. [3 The Hindu, Saturday, Oct 27, 2007]. Monday, September 24, 2012
  • 7. Cyber Crime Variants Hacking "Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 per cent increase this year. Cyber Squatting Cyber Squatting is the act of registering a famous Domain Name and then selling it for a fortune. This is an issue that has not been tackled in IT ACT 2000. Monday, September 24, 2012
  • 8. Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason. The fraudster then has access to the customer's online bank account and to the funds contained in that account. Monday, September 24, 2012
  • 9. Cyber Stalking is use of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse. Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. Monday, September 24, 2012
  • 10. VISHING Vishing is the criminal practice of using social engineering and Voice over IP (VoIP) to gain access to private personal and financial information from the public for the purpose of financial reward. The term is a combination of “Voice" and phishing. Vishing exploits the public's trust in landline telephone services. Vishing is typically used to steal credit card numbers or other information used in identity theft schemes from Monday, September 24, 2012 individuals.
  • 11. India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the Global Cyber Monday, September 24, 2012 Crime.
  • 12. Why India? A rapidly growing online user base  121 Million Internet Users  65 Million Active Internet Users, up by 28% from 51 million in 2010  50 Million users shop online on Ecommerce and Online Shopping Sites  46+ Million Social Network Users  346 million mobile users had subscribed to Data Packages. Monday, September 24, 2012 Source: IAMAI; Juxt; wearesocial 2011
  • 13. Cyber Crime In India  The majority of cybercrimes are centered on forgery, fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK,  Social networks as well as ecommerce sites are major targets,  6.9 million bot-infected systems in 2010,  14,348 website defacements in 2010,  6,850 .in and 4,150 .com domains were defaced during 2011,  15,000 sites hacked in 2011,  India is the number 1 country in the world for generating spam. Monday, September 24, 2012
  • 14. Cost Of Cyber Crime In India (2010)  29.9 million people fell victim to cybercrime,  $4 billion in direct financial losses,  $3.6 billion in time spent resolving the crime,  4 in 5 online adults (80%) have been a victim of Cybercrime,  17% of adults online have experienced cybercrime on their mobile phone. Source: Norton Cybercrime Report 2011 Monday, September 24, 2012
  • 15. We have covered about three instances where high-profile government websites were hacked and defaced. However, the actual number of Government Websites that were hacked are quite huge. A total number of 90, 119, 252 and 219 Government websites tracked by the Indian Computer Emergency Response Team (CERT-In) were hacked / defaced by various hacker groups in the year 2008, 2009, 2010 and Jan–Oct 2011 respectively. Monday, September 24, 2012
  • 16.  Again, this is growing trend and it is surprising that authorities have not taken stern actions to curb the growth of these cyber-crimes.  The police have recorded 3,038 cases but made only 2,700 arrests in 3 years (between 2007 and 2010)  India registered only 1,350 cases under the IT Act and IPC in 2010  50% of cybercrimes are not even reported. Monday, September 24, 2012
  • 17. Cyber Laws in India Under The Information Technology Act, 2000 CHAPTER XI – OFFENCES – 66. Hacking with computer system. (1) Whoever with the Intent to cause or knowing that he is likely to cause Wrongful Loss or Damage to the public or any person Destroys or Deletes or Alters any Information Residing in a Computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack. (2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both. Monday, September 24, 2012
  • 18. Whoever without permission of the owner of the computer :  Secures Access;  Downloads, Copies or extracts any data, computer database or any information;  Introduce or causes to be introduce any Virus or Contaminant;  Disrupts or causes disruption;  Denies or causes denial of access to any person;  Provides any assistance to any person to facilitate access  Charges the services availed of by a person to the account of another person by Tampering with or Manipulating any Computer, Computer System, or Computer Network; Shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected. Monday, September 24, 2012
  • 19. Information Technology Amendment Act, 2008 Section – 43, Destroys, Deletes or Alters any Information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means; Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage; “If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both.” [S.66] Monday, September 24, 2012
  • 20. S .66A - P u n i s h me n tf or s e ndi ng o f f e n s i v e me s s a g e s t h r o u g h c o mmu n i c a t i o n s e r v i c e , e t c  A n y p e r s o n w h o s e n d s , b y me a n s o f a c o mp u t e r r e s o u r c e o r a c o mmu n i c a t i o n d e v i c e ;  A n y i n f o r ma t i o n t h a t i s g r o s s l y o f f e n s i v e o r h a s me n a c i n g c ha r a c t e r ; or  An y i n f o r ma t i o n w h i c h h e k n o w s t o be f a l s e , but f or t he pur pos e of c a us i ng a nnoy a nc e , i nc onv e ni e nc e , da nge r , obs t r uc t i on , i ns ul t , i n j u r y , c r i mi n a l i n t i mi d a t i o n , e n mi t y , h a t r e d , o r i l l w i l l , pe r s i s t e n t l y ma k e s b y ma k i n g u s e of s u c h c o mp u t e r r e s o u r c e o r a c o mmu n i c a t i o n d e v i c e ;  A n y e l e c t r o n i c ma i l o r e l e c t r o n i c Monday, September m 2012 s a g e m a i l 24, e s f or t he pur pos e of c a us i ng a nnoy a nc e or
  • 21. S. 66C - Punishment for identity theft “Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh” S. 66D - Punishment for cheating by personation by using computer resource “Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees. “ Monday, September 24, 2012
  • 22. S . 66E - P u n i s h m e n t f o r v i ol a t i on of pr i v a c y . “Wh o e v e r , i n t e n t i o n a l l y o r k n o wi n g l y c a p t u r e s , p u b l i s h e s o r t r a n s mi t s t h e i ma g e o f a p r i v a t e a r e a o f a n y p e r s o n wi t h o u t h i s o r h e r c o n s e n t , u n d e r c i r c u ms t a n c e s v i o l a t i ng t he pr i v a c y of t ha t p e r s o n , s h a l l b e p u n i s h e d wi t h i mp r i s o n me n t w h i c h ma y e x t e n d t o t hr e e y e a r s o r wi t h f i n e n o t e x c e e d i n g t wo l a k h r u p e e s , o r wi t h b ot h” S . 67 A - P u n i s h me n t f or publ i s hi ng or t r a ns mi t t i n g o f ma t e r i a l c o n t a i n i ng sMonday,x u a 24, 2012 y e x p l i c i t a e September l l c t , e t c . i n
  • 23. S. 67 C - Preservation and Retention of information by intermediaries. “(1) Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe. (2) Any intermediary who intentionally or knowingly contravenes the provisions of sub section (1) shall be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.” Monday, September 24, 2012
  • 24. Arrests & Reports Under IT Act  Under the IT Act, 966 cybercrime cases were filed in 2010 420 in 2009)  Geographic breakdown of cases reported: o 153 from Karnataka, o 148 from Kerala o 142 from Maharashtra o 105 Andhra Pradesh o 52 Rajasthan o 52 Punjab  233 persons were arrested in 2010  33% of the cases registered were related to hacking Source: National Crime Records Bureau Monday, September 24, 2012
  • 25. Arrests & Reports Under IPC  Under the IPC, 356 cybercrime cases were registered in 2010 (276 cases in 2009)  Geographic breakdown of cases reported -- o 104 from Maharashtra o 66 Andhra Pradesh o 46 Chhattisgarh  The majority of these crimes were either forgery or fraud cases. Source: National Crime Records Bureau Monday, September 24, 2012
  • 26. How to Tackle Such Activities? An important question arises that how can these crimes be prevented. A number of techniques and solutions have been presented but the problems still exists and are increasing day by day. Antivirus And Anti Spyware Software: Аntivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software. Anti spy wares are used to restrict backdoor program, trojans and other spy wares to be installed on the computer. Firewalls: A firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two. A network firewall typically guards an internal computer network against malicious access from outside the network. Monday, September 24, 2012
  • 27. Cr y p t o g r a p h y : Cr y pt ogr a phy i s t he s c i e nc e of e n c r y pt i ng a nd de c r y pt i ng i n f o r ma t i o n . E n c r y p t i o n i s l i k e s e n d i n g a p o s t a l ma i l t o a n o t h e r pa r t y wi t h a l o c k c o d e o n t h e e n v e l o p e wh i c h i s k n o wn o n l y t o t h e s e nde r a nd t he r e c i pi e nt . A nu mb e r o f c r y p t o g r a p h i c me t h o d s ha v e b e e n d e v e l o p e d a n d s o me o f t h e m a r e s t i l l not c r a c k e d. Cy b e r E t h i c s a n d L a ws : Cy b e r e t h i c s a n d c y b e r l a ws a r e a l s o be i ng f or mu l a t e d t o s t o p c y b e r c r i me s . I t i s a r e s pons i bi l i t y of e v e r y i ndi v i dua l t o f ol l ow c y be r e t hi c s Monday, September 24, 2012 a n d c y b e r l a ws s o t ha t t he
  • 28. The Future of Cyber-Crimes in India • Continued Website Hacks and Defacements • Data and Information theft • Increasing phishing attacks on Ecommerce and Financial Websites • Cybercriminals targeting Social and Professional Networks • Threats directed at the Mobile Platform: Smartphones and Tablets Monday, September 24, 2012
  • 29. Conclusion… “Indian Laws are well drafted and are capable of handling all kinds of challenges as posed by cyber criminals. However, the enforcement agencies are required to be well versed with the changing technologies and Laws.” "As internet technology advances so does the threat of cyber crime. In times like these we must protect ourselves from cyber crime. Anti- virus software, firewalls and security patches are just the beginning. Never open suspicious e-mails and only navigate to trusted sites.” Monday, September 24, 2012
  • 30. THANK YOU!! F.Y.B.M.S. – B -- Namita Ludbe (140) -- Kavish Pandya (149) -- Mohammed Lakdawala (117) -- Ruchit Mehta (114) -- Kalpesh Solanki (70) -- Yash Dodia (93) -- Pratik Jain (72) Monday, September 24, 2012