Topic : Cyber Crime
Department : Electrical
Engineering
Sem : 5
Division : B
Name Enroll. No.
Rohan Patel 150280109098
• Introduction
• Need for Cyber Laws.
• Cyber Laws in India.
• Cyber Crimes.
• Offences and crimes in Cyber Space.
• Amendments in Cyber Law.
• Conclusion.
• Onset of Internet.
• Growth of Cyber Space and birth of Cyber
Crime.
• Framing of Cyber Laws.
BIRTH OF INTERNET
• The Internet began as an unanticipated result of an unsuccessful
military, scientific and academic research program called
ARPANET.
• Nobody knows who first used the word Internet - it just became a
shortcut around this time for "internetworking". The earliest
written use of the word appears to be by Vint Cerf in 1974, who
was one of the pioneers in building the foundation of modern day
Internet and also team member of the group which worked on
development of ARPANET.
What is Cyber Crime?
• In common words we can say that cyber crime is
illegal acts wherein the computer is either a tool or
a target or both.
• Cyber crimes can involve criminal activities that
are traditional in nature, such as theft, fraud,
forgery, defamation and mischief, all of which are
subject to the Indian Penal Code.
• The abuse of computers has also given birth to a
gamut of new age crimes that are addressed by the
Information Technology Act, 2000.
 We can categorize Cyber crimes in two ways
based on use of computer :-
• The computer as a Target i.e. using a computer to
attack other computers.
e.g. Hacking, Virus/Worm attacks, DOS attack etc.
• The computer as a weapon i.e. using a computer to
commit real world crimes.
e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds,
Pornography etc.
 Types of Cyber Crime based on target :-
• CYBER CRIMES AGAINST PERSONS e
g :- ‘melissa’ and ‘lovebug’ virus
• CYBER CRIMES AGAINST PROPERTY e
g :- Computer Vandalism
• CYBER CRIMES AGAINST
GOVERNMENT
eg :- ‘Al-Qaeda’
Effect of Cyber crime on
children
• 20% - 30% of Internet pornography consumption is b
y children of ages 12 - 17.
• MySpace was being used by predators to meet and
entice kids online.
• Specific marketing strategies are being used to attract
children to porn sites.
• Today, there are many disturbing things
happening in cyberspace. Due to the anonymous
nature of the Internet, it is possible to engage into
a variety of criminal activities with impunity and
people with intelligence, have been grossly
misusing this aspect of the Internet to perpetuate
criminal activities in cyberspace. Hence the need
for Cyber Laws in India.
IT Acts : Amendments,
Provisions and Penalties
• The original Act contained 94 sections, divided in 13 chapters
and 4 schedules. The laws apply to the whole of India. Persons of
other nationalities can also be indicted under the law, if the
crime involves a computer or network located in India.
• A major amendment was made in 2008. It introduced the
Section 66A which penalized sending of "offensive
messages". It also introduced the Section 69, which gave
authorities the power of "interception or monitoring or
decryption of any information through any computer
resource". It also introduced penalties for child porn, cyber
terrorism and voyeurism.
 The IT Act has proposed following legal framework
for any and all cyber activities :-
• From the perspective of e-commerce in India, the IT Act 2000
and its provisions contain many positive aspects. Firstly, the
implications of these provisions for the e-businesses would be
that email would now be a valid and legal form of
communication in our country that can be duly produced and
approved in a court of law.
• Companies shall now be able to carry out electronic commerce
using the legal infrastructure provided by the Act.
• Digital signatures have been given legal validity and sanction
in the Act.
• The Act throws open the doors for the entry of corporate
companies in the business of being Certifying Authorities for
issuing Digital Signatures Certificates.
• The Act now allows Government to issue notification on the
web thus heralding e-governance.
• The Act enables the companies to file any form, application or
any other document with any office, authority, body or agency
owned or controlled by the appropriate Government in
electronic form by means of such electronic form as may be
prescribed by the appropriate Government.
• The IT Act also addresses the important issues of security,
which are so critical to the success of electronic transactions.
The Act has given a legal definition to the concept of secure
digital signatures that would be required to have been passed
through a system of a security procedure, as stipulated by the
Government at a later date.
• Under the IT Act, 2000, it shall now be possible for corporates
to have a statutory remedy in case if anyone breaks into their
computer systems or network and causes damages or copies
data. The remedy provided by the Act is in the form of
monetary damages, not exceeding Rs. 1 crore.
SECTION OFFENCE PENALTY
65 Tampering with
computer source
documents.
Imprisonment up to three
years, or/and with fine up
to ₹200,000
66
Hacking with computer
system.
Imprisonment up to three
years, or/and with fine up
to ₹500,000
66B Receiving stolen
computer or
communication device.
Imprisonment up to three
years, or/and with fine up
to ₹100,000
66C Using password of
another person.
Imprisonment up to three
years, or/and with fine up
to ₹100,000
66D Cheating using computer
resource
Imprisonment up to three
years, or/and with fine up
to ₹100,000
66E Publishing private
images of others
Imprisonment up to three
years, or/and with fine up
to ₹200,000
SECTION OFFENCE PENALTY
66F Acts of cyberterrorism. Imprisonment up to life.
67 Publishing information
which is obscene in
electronic form.
Imprisonment up to five
years, or/and with fine
up to ₹1,000,000.
67A Publishing images
containing sexual acts.
Imprisonment up to
seven years, or/and with
fine up to ₹1,000,000.
67B Publishing child
porn or predating
children online.
Imprisonment up to five
years, or/and with fine
up to ₹1,000,000 on first
conviction.
Imprisonment up to
seven years, or/and with
fine up to ₹1,000,000 on
second conviction.
67C Failure to maintain
records.
Imprisonment up to
three years, or/and with
fine.
SECTION OFFENCE PENALTY
68
Failure/refusal to comply
with orders.
Imprisonment up to three
years, or/and with fine up
to ₹200,000
69 Failure/refusal to decrypt
data.
Imprisonment up to
seven years and possible
fine.
70 Securing access or
attempting to secure
access to a protected
system.
Imprisonment up to ten
years, or/and with fine.
71
Misrepresentation
Imprisonment up to three
years, or/and with fine up
to ₹100,000.
Cyber Security

Cyber Security

  • 1.
    Topic : CyberCrime Department : Electrical Engineering Sem : 5 Division : B Name Enroll. No. Rohan Patel 150280109098
  • 2.
    • Introduction • Needfor Cyber Laws. • Cyber Laws in India. • Cyber Crimes. • Offences and crimes in Cyber Space. • Amendments in Cyber Law. • Conclusion.
  • 3.
    • Onset ofInternet. • Growth of Cyber Space and birth of Cyber Crime. • Framing of Cyber Laws.
  • 4.
    BIRTH OF INTERNET •The Internet began as an unanticipated result of an unsuccessful military, scientific and academic research program called ARPANET. • Nobody knows who first used the word Internet - it just became a shortcut around this time for "internetworking". The earliest written use of the word appears to be by Vint Cerf in 1974, who was one of the pioneers in building the foundation of modern day Internet and also team member of the group which worked on development of ARPANET.
  • 5.
    What is CyberCrime? • In common words we can say that cyber crime is illegal acts wherein the computer is either a tool or a target or both. • Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. • The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.
  • 6.
     We cancategorize Cyber crimes in two ways based on use of computer :- • The computer as a Target i.e. using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc. • The computer as a weapon i.e. using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
  • 7.
     Types ofCyber Crime based on target :- • CYBER CRIMES AGAINST PERSONS e g :- ‘melissa’ and ‘lovebug’ virus • CYBER CRIMES AGAINST PROPERTY e g :- Computer Vandalism • CYBER CRIMES AGAINST GOVERNMENT eg :- ‘Al-Qaeda’
  • 8.
    Effect of Cybercrime on children • 20% - 30% of Internet pornography consumption is b y children of ages 12 - 17. • MySpace was being used by predators to meet and entice kids online. • Specific marketing strategies are being used to attract children to porn sites.
  • 9.
    • Today, thereare many disturbing things happening in cyberspace. Due to the anonymous nature of the Internet, it is possible to engage into a variety of criminal activities with impunity and people with intelligence, have been grossly misusing this aspect of the Internet to perpetuate criminal activities in cyberspace. Hence the need for Cyber Laws in India.
  • 10.
    IT Acts :Amendments, Provisions and Penalties • The original Act contained 94 sections, divided in 13 chapters and 4 schedules. The laws apply to the whole of India. Persons of other nationalities can also be indicted under the law, if the crime involves a computer or network located in India. • A major amendment was made in 2008. It introduced the Section 66A which penalized sending of "offensive messages". It also introduced the Section 69, which gave authorities the power of "interception or monitoring or decryption of any information through any computer resource". It also introduced penalties for child porn, cyber terrorism and voyeurism.
  • 11.
     The ITAct has proposed following legal framework for any and all cyber activities :- • From the perspective of e-commerce in India, the IT Act 2000 and its provisions contain many positive aspects. Firstly, the implications of these provisions for the e-businesses would be that email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. • Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act.
  • 12.
    • Digital signatureshave been given legal validity and sanction in the Act. • The Act throws open the doors for the entry of corporate companies in the business of being Certifying Authorities for issuing Digital Signatures Certificates. • The Act now allows Government to issue notification on the web thus heralding e-governance. • The Act enables the companies to file any form, application or any other document with any office, authority, body or agency owned or controlled by the appropriate Government in electronic form by means of such electronic form as may be prescribed by the appropriate Government.
  • 13.
    • The ITAct also addresses the important issues of security, which are so critical to the success of electronic transactions. The Act has given a legal definition to the concept of secure digital signatures that would be required to have been passed through a system of a security procedure, as stipulated by the Government at a later date. • Under the IT Act, 2000, it shall now be possible for corporates to have a statutory remedy in case if anyone breaks into their computer systems or network and causes damages or copies data. The remedy provided by the Act is in the form of monetary damages, not exceeding Rs. 1 crore.
  • 14.
    SECTION OFFENCE PENALTY 65Tampering with computer source documents. Imprisonment up to three years, or/and with fine up to ₹200,000 66 Hacking with computer system. Imprisonment up to three years, or/and with fine up to ₹500,000 66B Receiving stolen computer or communication device. Imprisonment up to three years, or/and with fine up to ₹100,000 66C Using password of another person. Imprisonment up to three years, or/and with fine up to ₹100,000 66D Cheating using computer resource Imprisonment up to three years, or/and with fine up to ₹100,000 66E Publishing private images of others Imprisonment up to three years, or/and with fine up to ₹200,000
  • 15.
    SECTION OFFENCE PENALTY 66FActs of cyberterrorism. Imprisonment up to life. 67 Publishing information which is obscene in electronic form. Imprisonment up to five years, or/and with fine up to ₹1,000,000. 67A Publishing images containing sexual acts. Imprisonment up to seven years, or/and with fine up to ₹1,000,000. 67B Publishing child porn or predating children online. Imprisonment up to five years, or/and with fine up to ₹1,000,000 on first conviction. Imprisonment up to seven years, or/and with fine up to ₹1,000,000 on second conviction. 67C Failure to maintain records. Imprisonment up to three years, or/and with fine.
  • 16.
    SECTION OFFENCE PENALTY 68 Failure/refusalto comply with orders. Imprisonment up to three years, or/and with fine up to ₹200,000 69 Failure/refusal to decrypt data. Imprisonment up to seven years and possible fine. 70 Securing access or attempting to secure access to a protected system. Imprisonment up to ten years, or/and with fine. 71 Misrepresentation Imprisonment up to three years, or/and with fine up to ₹100,000.