The document discusses various types of cyber crimes such as cyber defamation, forgery, online gambling, intellectual property crimes, and financial crimes. It provides examples of different cyber crimes including phishing scams, identity theft, cyber terrorism, and computer hacking. Cyber crimes can involve using computers as tools to commit offenses like distributing malware, or targeting computers and data directly through hacking and data theft. The document aims to educate about the different genres of cyber crimes and techniques used by cyber criminals.
Internet and computers have changed working, communication, meeting and business requirements and conditions all over globe. Due to this high profile technology, everyone can share any activity that was unexpected and unimaginable few decades back. It was the imagination of people that they will live their lives in this manner and do their business quickly and imagination and dream has come true with the introduction of internet only. Modern society is now associated with internet and related technologies, over a quarter of the world's population is wired into the net and this number is growing every day
[Exposicion] Computer and Internet CrimeGerman Teran
Society is turning digital and so its crimes. Internet is not only a great tool for research, it is also a perfect place for criminal... how to apply law in those cases?
Create another jurisdiction?
security privacy,security,web,internet,prevention from hackers,the onion rout...ABHAY PATHAK
security privacy,security,web,internet,prevention from hackers,the onion routing ,tor,vpn,dark web,deep web,surface web ,case on cybersecurity ,fraud on atm machine
CYBERSPACE
CYBER POWER
INTERNET
CYBER-ATTACK
INDIA AND PAKISTAN CYBER ATTACKS
TYPES OF CYBER CRIME
Hypotheses in the Research
Literature on the Influence of Mass Media on Criminal Behavior
Technology-Related Risk Factors for Criminal Behavior
COPYCAT CRIME:
CYBER SECURITY
SAFETY TIPS FOR CYBER CRIME
Presented by Vipin Chandra Joshi at IJSARD (International Journal of Socio-legal Analysis and Rural Development) International Virtual Conference 2017 On Law and Social Sciences.
Internet and computers have changed working, communication, meeting and business requirements and conditions all over globe. Due to this high profile technology, everyone can share any activity that was unexpected and unimaginable few decades back. It was the imagination of people that they will live their lives in this manner and do their business quickly and imagination and dream has come true with the introduction of internet only. Modern society is now associated with internet and related technologies, over a quarter of the world's population is wired into the net and this number is growing every day
[Exposicion] Computer and Internet CrimeGerman Teran
Society is turning digital and so its crimes. Internet is not only a great tool for research, it is also a perfect place for criminal... how to apply law in those cases?
Create another jurisdiction?
security privacy,security,web,internet,prevention from hackers,the onion rout...ABHAY PATHAK
security privacy,security,web,internet,prevention from hackers,the onion routing ,tor,vpn,dark web,deep web,surface web ,case on cybersecurity ,fraud on atm machine
CYBERSPACE
CYBER POWER
INTERNET
CYBER-ATTACK
INDIA AND PAKISTAN CYBER ATTACKS
TYPES OF CYBER CRIME
Hypotheses in the Research
Literature on the Influence of Mass Media on Criminal Behavior
Technology-Related Risk Factors for Criminal Behavior
COPYCAT CRIME:
CYBER SECURITY
SAFETY TIPS FOR CYBER CRIME
Presented by Vipin Chandra Joshi at IJSARD (International Journal of Socio-legal Analysis and Rural Development) International Virtual Conference 2017 On Law and Social Sciences.
Technology is negative only in the hands of people who do not realize that they are one and the same process as the universe.
tips to avoid cyber crime:
Ignore the unwanted messages or e-mails
Protect your e-identity (electronic identity)
Never store your own details on any mobile device (Secure mobile devices)
If in doubt, block
Ignore pop-ups
Only shop online on secure sites
Different site, different passwords (don’t use same key for all locks)
Lock down your FB account
Always make sure that login pages use SSL and that the login pages starts with https://
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
This presentation contains Introduction of Phishing attack, its types and Various techniques, their impact with real live example, after that its Avoidance, Prevention and Solution. Also it contains brief introduction of SSL and HTTPS with their working.
data protection and security means to protect your data from unauthorized user access. we should apply some privacy measures to protect our data from unauthorized access. security measures taken to protect the integrity of the data
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxshweeta209
transfer of the P.I.L filed by lawyer Ashwini Kumar Upadhyay in Delhi High Court to Supreme Court.
on the issue of UNIFORM MARRIAGE AGE of men and women.
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
DNA Testing in Civil and Criminal Matters.pptxpatrons legal
Get insights into DNA testing and its application in civil and criminal matters. Find out how it contributes to fair and accurate legal proceedings. For more information: https://www.patronslegal.com/criminal-litigation.html
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxOmGod1
Victims of crime have a range of rights designed to ensure their protection, support, and participation in the justice system. These rights include the right to be treated with dignity and respect, the right to be informed about the progress of their case, and the right to be heard during legal proceedings. Victims are entitled to protection from intimidation and harm, access to support services such as counseling and medical care, and the right to restitution from the offender. Additionally, many jurisdictions provide victims with the right to participate in parole hearings and the right to privacy to protect their personal information from public disclosure. These rights aim to acknowledge the impact of crime on victims and to provide them with the necessary resources and involvement in the judicial process.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
2. “Unlawful acts wherein the
computer is either a tool or
target or both
Tool Target
•CYBER DEFAMATION
•FORGERY
•ONLINE GAMBLING
•INTERNET TIME THEFT
• FINANCIAL CRIMES
•INTELLECTUAL PROPERTY
CRIMES
•SALE OF ILLEGAL ARTICLES
TROJANS AND KEYLOGGERS
•EMAIL BOMBING
•DENIAL OF SERVICE ATTACK
•WEB DEFACEMENT
•SALAMI ATTACK
•LOGIC BOMBS
•CYBER STALKING
•EMAIL SPOOFING
Dr Sapna Deo
3. Cybersquatting
• Cybersquatting is registering, trafficking in,
or using a domain name with bad faith
intent to profit from the goodwill of a
trademark belonging to someone else.
Cybersquatters will either monetize
accidental traffic to their site through ads, or
offer to sell the domain name to someone
else at a grossly inflated price
Dr Sapna Deo
5. • Obtaining of a domain name in order to
seek payment from the owner of the
trademark .
• One person uses a domain name that is
already being used by some other person,
• Either to reap undue benefit from such
reputed or
• popular name or
• in order to take money
Cyber Squatting : Domain Names
/Passing Off Actions
Dr Sapna Deo
6. Typosquatting
• Cybersquatters also use the practice of
typosquatting to snare careless Internet users.
• They register common misspellings of
websites in order to redirect traffic intended
for the actual site to their site. Eg.
• albequerquebusinesslaw.com to snag visitors
intending to reach
albuquerquebusinesslaw.com, capitalizing on
the fact that Albuquerque is a difficult name to
spell. Dr Sapna Deo
7. Phishing
• phishing is a term used to describe a malicious
individual or group of individuals who scam
users.
• They do so by sending e-mails or creating web
pages that are designed to collect an individual's
online bank, credit card, or other login
information.
• Because these e-mails and web pages look like
legitimate companies users trust them and enter
their personal information..
Dr Sapna Deo
8. Example
• Dear eBay customer,
Your Account has been Suspended. We
will ask for your password only once. We
will charge your account once per year.
However you will receive a confirmation
request in about 24 hours after the make
complete unsuspend process. You have 24 hours
from the time you'll receive the e-mail to complete this
eBay request.
Note: Ignoring this message can cause eBay TKO delete
your account forever.
Dr Sapna Deo
9. • Bay will request personal data(password;and
so on) in this email.
Thank you for using eBay!
http://www.ebay.com/
-------------------------------------------------------
--------------
This eBay notice was sent to you based on
your eBay account preferences. If you would
like to review your notification preferences
for other communications, click here. If you
would like to receive this email in text only,
click here. Dr Sapna Deo
10. What to do if you are not sure
if an e-mail is official.
• Never follow any links in an e-mail. Instead of following
the link in the e-mail, visit the page by manually typing the
address of the company. For example, in the above
example, instead of visiting the fake eBay URL, you
would type: http://www.ebay.com in your web browser
and log in to the official website.
• Never send any personal information through e-mail. If a
company is requesting personal information about your
account or are saying your account is invalid, visit the web
page and log into the account as you normally would.
Dr Sapna Deo
11. Common companies affected
by phishing
• Any major bank
• Popular websites such as Amazon,
Facebook, MySpace, PayPal, eBay,
Microsoft, Apple, Hotmail, YouTube, etc.
• Government: FBI, CIA, IRS, etc.
• Internet service providers such as AOL,
Comcast, Cox, MSN, etc.
• Casinos and lottery.
• Online dating or community websites.
Dr Sapna Deo
12. Both Smishing and Vishing are
forms of Internet Phishing.
• Smishing
• "Smishing" stands for SMS Phishing.
• a message with an urgent tone is sent to the
user to take action.
• The text message usually asks the user to
call a phone number or go to a Website to
take immediate action.
Dr Sapna Deo
13. Vishing / Voice Phishing
• When a fraudster creates an automated voice
system to make voice calls to phone users to
ask for private information it is called Vishing
or Voice Phishing.
• the voice call creates a sense of urgency for
the user to take action and provide
information to do so.
Dr Sapna Deo
14. • Deliberately destroying or damaging property of
another.
• It includes – any kind of physical harm done to the
computer of any other person.
• The intention of the offender is generally cause
damage or harassment to the computer owner.
• The use of internet to hinder the normal functioning
of a computer system
• Corruption and destruction of Digital property
Computer Vandalism
Dr Sapna Deo
15. Email fraud
• Email fraud is the intentional deception made for
personal gain or to damage another individual through
Email Almost as soon as Email became widely used,
it began to be used as a means to defraud people.
• Email fraud can take the form of a con game or scam.
Confidence tricks tend to exploit the inherent greed
and dishonesty of their victims: the prospect of a
'bargain' or 'something for nothing' can be very
tempting.
Dr Sapna Deo
16. Internet Time Theft
• Basically, Internet time theft comes under hacking.
• It is the use by an unauthorised person, of the Internet hours
paid for by another person.
• The person who gets access to some one else’s ISP user ID and
password, either by hacking or by gaining access to it by illegal
means, uses it to access the Internet without the other person’s
knowledge.
• You can identify time theft if your Internet time has to be
recharged often, despite infrequent usage.
• This connotes the usage by an unauthorized person of the
Internet hours paid for by another person
Dr Sapna Deo
17. Sale of Illegal Articles
• Sale of illegal articles narcotics drugs, weapons,
wildlife
• It is practically impossible to control or prevent a
criminal from setting up a website to transact in
illegal articles
• there are several online payment gateways that can
transfer money around the world at the click of a
button.
Dr Sapna Deo
18. Illustration
• A branch of the erstwhile Global Trust Bank
in India experienced a run on the bank.
Numerous customers decided to withdraw all
their money and close their
• accounts.
• An investigation revealed that someone had
sent out spoofed emails to many of the
bank’s customers stating that the bank was
• in very bad shape financially and could close
operations at any time.
• The spoofed email appeared to have
originated from the bank itself.Dr Sapna Deo
19. Cyber Pornography
• Cyber pornography covers pornographic websites,
pornographic magazines produced using
computers (to publish and print the material)
• and the Internet (to download and transmit
pornographic pictures, photos, writings etc).
Dr Sapna Deo
21. Trojans and Keyloggers
• A Trojan, as this program is aptly called, is
an unauthorized program
• which functions from inside what seems to
be an authorized program,
• thereby concealing what it is actually doing.
Dr Sapna Deo
22. Use of encryption by terrorists
• A disturbing trend that is emerging nowadays is
the increasing use of
• encryption, high-frequency encrypted
voice/data links, encryption
• software like Pretty Good Privacy (PGP) etc by
terrorists and members of organized crime
cartels.
Dr Sapna Deo
23. Financial Crimes
• Money is the most common motive behind all crime. The same is
also true for cyber crime. Globally it is being observed that more and
more cyber crimes are being committed for financial motives rather
than for “revenge” or for “fun”.
• With the tremendous increase in the use of internet and mobile
banking, online share trading, dematerialization of shares and
securities, this trend is likely to increase unabated.
• Financial crimes include cyber cheating, credit card frauds, money
laundering, hacking into bank servers, computer manipulation,
accounting scams etc.
• Illustration 1
• Punjab National Bank in India was cheated to the tune of Rs. 13.9
million through false debits and credits in computerized accountsDr Sapna Deo
24. Cyber Defamation
• This occurs when defamation takes place
with the help of computers and
• / or the Internet.
• e.g. Sameer publishes defamatory matter
about Pooja on a website or sends e-mails
containing defamatory information to
Pooja’s friends.
Dr Sapna Deo
25. Cyber terrorism
• Cyber terrorism is the premeditated use of
disruptive activities, or the threat thereof, in
cyber space, with the
• intention to further social, ideological,
religious, political or
• similar objectives, or to intimidate any
person in furtherance of such objectives.
Dr Sapna Deo
26. Characteristics of Cyber
Terrorism.
Attack is predefined and victims are
specifically targeted.
Attack has an objective to destroy or damage
specific targets such as political, economic,
energy, civil and military infrastructures.
Attack may even target specific opposing
religious group’s information infrastructures to
insight religious pandemonium
Dr Sapna Deo
27. • The purpose of any attack is to create fear of the
group’s intentions
• and further their own political agenda or goals
or gain fellowship by succeeding in their attacks.
• Destroy the enemy’s capabilities to further
operate or operate within their own arena
• Persuade others to believe that the victim or
victims are vulnerable and their stability
negligent.
• Section 66F of IT Act..(Refer next slides)
Dr Sapna Deo