SlideShare a Scribd company logo
The Genesis of Cyber
Crimes
Dr Sapna Deo
“Unlawful acts wherein the
computer is either a tool or
target or both
Tool Target
•CYBER DEFAMATION
•FORGERY
•ONLINE GAMBLING
•INTERNET TIME THEFT
• FINANCIAL CRIMES
•INTELLECTUAL PROPERTY
CRIMES
•SALE OF ILLEGAL ARTICLES
TROJANS AND KEYLOGGERS
•EMAIL BOMBING
•DENIAL OF SERVICE ATTACK
•WEB DEFACEMENT
•SALAMI ATTACK
•LOGIC BOMBS
•CYBER STALKING
•EMAIL SPOOFING
Dr Sapna Deo
Cybersquatting
• Cybersquatting is registering, trafficking in,
or using a domain name with bad faith
intent to profit from the goodwill of a
trademark belonging to someone else.
Cybersquatters will either monetize
accidental traffic to their site through ads, or
offer to sell the domain name to someone
else at a grossly inflated price
Dr Sapna Deo
Domain
Dr Sapna Deo
• Obtaining of a domain name in order to
seek payment from the owner of the
trademark .
• One person uses a domain name that is
already being used by some other person,
• Either to reap undue benefit from such
reputed or
• popular name or
• in order to take money
Cyber Squatting : Domain Names
/Passing Off Actions
Dr Sapna Deo
Typosquatting
• Cybersquatters also use the practice of
typosquatting to snare careless Internet users.
• They register common misspellings of
websites in order to redirect traffic intended
for the actual site to their site. Eg.
• albequerquebusinesslaw.com to snag visitors
intending to reach
albuquerquebusinesslaw.com, capitalizing on
the fact that Albuquerque is a difficult name to
spell. Dr Sapna Deo
Phishing
• phishing is a term used to describe a malicious
individual or group of individuals who scam
users.
• They do so by sending e-mails or creating web
pages that are designed to collect an individual's
online bank, credit card, or other login
information.
• Because these e-mails and web pages look like
legitimate companies users trust them and enter
their personal information..
Dr Sapna Deo
Example
• Dear eBay customer,
Your Account has been Suspended. We
will ask for your password only once. We
will charge your account once per year.
However you will receive a confirmation
request in about 24 hours after the make
complete unsuspend process. You have 24 hours
from the time you'll receive the e-mail to complete this
eBay request.
Note: Ignoring this message can cause eBay TKO delete
your account forever.
Dr Sapna Deo
• Bay will request personal data(password;and
so on) in this email.
Thank you for using eBay!
http://www.ebay.com/
-------------------------------------------------------
--------------
This eBay notice was sent to you based on
your eBay account preferences. If you would
like to review your notification preferences
for other communications, click here. If you
would like to receive this email in text only,
click here. Dr Sapna Deo
What to do if you are not sure
if an e-mail is official.
• Never follow any links in an e-mail. Instead of following
the link in the e-mail, visit the page by manually typing the
address of the company. For example, in the above
example, instead of visiting the fake eBay URL, you
would type: http://www.ebay.com in your web browser
and log in to the official website.
• Never send any personal information through e-mail. If a
company is requesting personal information about your
account or are saying your account is invalid, visit the web
page and log into the account as you normally would.
Dr Sapna Deo
Common companies affected
by phishing
• Any major bank
• Popular websites such as Amazon,
Facebook, MySpace, PayPal, eBay,
Microsoft, Apple, Hotmail, YouTube, etc.
• Government: FBI, CIA, IRS, etc.
• Internet service providers such as AOL,
Comcast, Cox, MSN, etc.
• Casinos and lottery.
• Online dating or community websites.
Dr Sapna Deo
Both Smishing and Vishing are
forms of Internet Phishing.
• Smishing
• "Smishing" stands for SMS Phishing.
• a message with an urgent tone is sent to the
user to take action.
• The text message usually asks the user to
call a phone number or go to a Website to
take immediate action.
Dr Sapna Deo
Vishing / Voice Phishing
• When a fraudster creates an automated voice
system to make voice calls to phone users to
ask for private information it is called Vishing
or Voice Phishing.
• the voice call creates a sense of urgency for
the user to take action and provide
information to do so.
Dr Sapna Deo
• Deliberately destroying or damaging property of
another.
• It includes – any kind of physical harm done to the
computer of any other person.
• The intention of the offender is generally cause
damage or harassment to the computer owner.
• The use of internet to hinder the normal functioning
of a computer system
• Corruption and destruction of Digital property
Computer Vandalism
Dr Sapna Deo
Email fraud
• Email fraud is the intentional deception made for
personal gain or to damage another individual through
Email Almost as soon as Email became widely used,
it began to be used as a means to defraud people.
• Email fraud can take the form of a con game or scam.
Confidence tricks tend to exploit the inherent greed
and dishonesty of their victims: the prospect of a
'bargain' or 'something for nothing' can be very
tempting.
Dr Sapna Deo
Internet Time Theft
• Basically, Internet time theft comes under hacking.
• It is the use by an unauthorised person, of the Internet hours
paid for by another person.
• The person who gets access to some one else’s ISP user ID and
password, either by hacking or by gaining access to it by illegal
means, uses it to access the Internet without the other person’s
knowledge.
• You can identify time theft if your Internet time has to be
recharged often, despite infrequent usage.
• This connotes the usage by an unauthorized person of the
Internet hours paid for by another person
Dr Sapna Deo
Sale of Illegal Articles
• Sale of illegal articles narcotics drugs, weapons,
wildlife
• It is practically impossible to control or prevent a
criminal from setting up a website to transact in
illegal articles
• there are several online payment gateways that can
transfer money around the world at the click of a
button.
Dr Sapna Deo
Illustration
• A branch of the erstwhile Global Trust Bank
in India experienced a run on the bank.
Numerous customers decided to withdraw all
their money and close their
• accounts.
• An investigation revealed that someone had
sent out spoofed emails to many of the
bank’s customers stating that the bank was
• in very bad shape financially and could close
operations at any time.
• The spoofed email appeared to have
originated from the bank itself.Dr Sapna Deo
Cyber Pornography
• Cyber pornography covers pornographic websites,
pornographic magazines produced using
computers (to publish and print the material)
• and the Internet (to download and transmit
pornographic pictures, photos, writings etc).
Dr Sapna Deo
Intellectual Property Crimes
Dr Sapna Deo
Trojans and Keyloggers
• A Trojan, as this program is aptly called, is
an unauthorized program
• which functions from inside what seems to
be an authorized program,
• thereby concealing what it is actually doing.
Dr Sapna Deo
Use of encryption by terrorists
• A disturbing trend that is emerging nowadays is
the increasing use of
• encryption, high-frequency encrypted
voice/data links, encryption
• software like Pretty Good Privacy (PGP) etc by
terrorists and members of organized crime
cartels.
Dr Sapna Deo
Financial Crimes
• Money is the most common motive behind all crime. The same is
also true for cyber crime. Globally it is being observed that more and
more cyber crimes are being committed for financial motives rather
than for “revenge” or for “fun”.
• With the tremendous increase in the use of internet and mobile
banking, online share trading, dematerialization of shares and
securities, this trend is likely to increase unabated.
• Financial crimes include cyber cheating, credit card frauds, money
laundering, hacking into bank servers, computer manipulation,
accounting scams etc.
• Illustration 1
• Punjab National Bank in India was cheated to the tune of Rs. 13.9
million through false debits and credits in computerized accountsDr Sapna Deo
Cyber Defamation
• This occurs when defamation takes place
with the help of computers and
• / or the Internet.
• e.g. Sameer publishes defamatory matter
about Pooja on a website or sends e-mails
containing defamatory information to
Pooja’s friends.
Dr Sapna Deo
Cyber terrorism
• Cyber terrorism is the premeditated use of
disruptive activities, or the threat thereof, in
cyber space, with the
• intention to further social, ideological,
religious, political or
• similar objectives, or to intimidate any
person in furtherance of such objectives.
Dr Sapna Deo
Characteristics of Cyber
Terrorism.
 Attack is predefined and victims are
specifically targeted.
Attack has an objective to destroy or damage
specific targets such as political, economic,
energy, civil and military infrastructures.
Attack may even target specific opposing
religious group’s information infrastructures to
insight religious pandemonium
Dr Sapna Deo
• The purpose of any attack is to create fear of the
group’s intentions
• and further their own political agenda or goals
or gain fellowship by succeeding in their attacks.
• Destroy the enemy’s capabilities to further
operate or operate within their own arena
• Persuade others to believe that the victim or
victims are vulnerable and their stability
negligent.
• Section 66F of IT Act..(Refer next slides)
Dr Sapna Deo
THANK
YOU
Dr Sapna Deo

More Related Content

What's hot

Issues with computers
Issues with computersIssues with computers
Issues with computersayerssaa
 
Computer crime
Computer crimeComputer crime
Computer crime
Uc Man
 
Computer crime
Computer crimeComputer crime
Computer crime
Istiak Niloy
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
Assignment Studio
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
yahooteacher
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
GouthamXander
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
German Teran
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
Alexander Zhuravlev
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
Mo Han
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
Anchalanshri Dixit
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
Ronalyn_Cao
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
Angelito Quiambao
 
security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...
ABHAY PATHAK
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Mark Jhon Oxillo
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
Upekha Vandebona
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
jovellconde1
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
Dharmik Navadiya
 

What's hot (20)

Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Phishing
PhishingPhishing
Phishing
 
Computer crime
Computer crimeComputer crime
Computer crime
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
 

Similar to part 3 cyber crimes

Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
Dheeraj Kumar Tiwari
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
Talwant Singh
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
DjTechs
 
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Nazish Jamali
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
Roel Palmaers
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
ShreyaKushwaha28
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
sweta dargad
 
Dangers in the Internet
Dangers in the InternetDangers in the Internet
Dangers in the Internet
TseAnRS
 
GE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptxGE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptx
MarlynLiagao
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
samina khan
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
Jay Visavadiya
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
Suman Thapaliya
 
A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers
806670
 

Similar to part 3 cyber crimes (20)

Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Dangers in the Internet
Dangers in the InternetDangers in the Internet
Dangers in the Internet
 
GE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptxGE9a- Living in the IT Era: Internet Threats.pptx
GE9a- Living in the IT Era: Internet Threats.pptx
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
Cyber.ppt
Cyber.pptCyber.ppt
Cyber.ppt
 
A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers
 

Recently uploaded

Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
BRELGOSIMAT
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
shweeta209
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
Dr. Oliver Massmann
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
patrons legal
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxRIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
OmGod1
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
gaelcabigunda
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
MwaiMapemba
 

Recently uploaded (20)

Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxASHWINI KUMAR UPADHYAY v/s Union of India.pptx
ASHWINI KUMAR UPADHYAY v/s Union of India.pptx
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
DNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptxDNA Testing in Civil and Criminal Matters.pptx
DNA Testing in Civil and Criminal Matters.pptx
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxRIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptx
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
 

part 3 cyber crimes

  • 1. The Genesis of Cyber Crimes Dr Sapna Deo
  • 2. “Unlawful acts wherein the computer is either a tool or target or both Tool Target •CYBER DEFAMATION •FORGERY •ONLINE GAMBLING •INTERNET TIME THEFT • FINANCIAL CRIMES •INTELLECTUAL PROPERTY CRIMES •SALE OF ILLEGAL ARTICLES TROJANS AND KEYLOGGERS •EMAIL BOMBING •DENIAL OF SERVICE ATTACK •WEB DEFACEMENT •SALAMI ATTACK •LOGIC BOMBS •CYBER STALKING •EMAIL SPOOFING Dr Sapna Deo
  • 3. Cybersquatting • Cybersquatting is registering, trafficking in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. Cybersquatters will either monetize accidental traffic to their site through ads, or offer to sell the domain name to someone else at a grossly inflated price Dr Sapna Deo
  • 5. • Obtaining of a domain name in order to seek payment from the owner of the trademark . • One person uses a domain name that is already being used by some other person, • Either to reap undue benefit from such reputed or • popular name or • in order to take money Cyber Squatting : Domain Names /Passing Off Actions Dr Sapna Deo
  • 6. Typosquatting • Cybersquatters also use the practice of typosquatting to snare careless Internet users. • They register common misspellings of websites in order to redirect traffic intended for the actual site to their site. Eg. • albequerquebusinesslaw.com to snag visitors intending to reach albuquerquebusinesslaw.com, capitalizing on the fact that Albuquerque is a difficult name to spell. Dr Sapna Deo
  • 7. Phishing • phishing is a term used to describe a malicious individual or group of individuals who scam users. • They do so by sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information. • Because these e-mails and web pages look like legitimate companies users trust them and enter their personal information.. Dr Sapna Deo
  • 8. Example • Dear eBay customer, Your Account has been Suspended. We will ask for your password only once. We will charge your account once per year. However you will receive a confirmation request in about 24 hours after the make complete unsuspend process. You have 24 hours from the time you'll receive the e-mail to complete this eBay request. Note: Ignoring this message can cause eBay TKO delete your account forever. Dr Sapna Deo
  • 9. • Bay will request personal data(password;and so on) in this email. Thank you for using eBay! http://www.ebay.com/ ------------------------------------------------------- -------------- This eBay notice was sent to you based on your eBay account preferences. If you would like to review your notification preferences for other communications, click here. If you would like to receive this email in text only, click here. Dr Sapna Deo
  • 10. What to do if you are not sure if an e-mail is official. • Never follow any links in an e-mail. Instead of following the link in the e-mail, visit the page by manually typing the address of the company. For example, in the above example, instead of visiting the fake eBay URL, you would type: http://www.ebay.com in your web browser and log in to the official website. • Never send any personal information through e-mail. If a company is requesting personal information about your account or are saying your account is invalid, visit the web page and log into the account as you normally would. Dr Sapna Deo
  • 11. Common companies affected by phishing • Any major bank • Popular websites such as Amazon, Facebook, MySpace, PayPal, eBay, Microsoft, Apple, Hotmail, YouTube, etc. • Government: FBI, CIA, IRS, etc. • Internet service providers such as AOL, Comcast, Cox, MSN, etc. • Casinos and lottery. • Online dating or community websites. Dr Sapna Deo
  • 12. Both Smishing and Vishing are forms of Internet Phishing. • Smishing • "Smishing" stands for SMS Phishing. • a message with an urgent tone is sent to the user to take action. • The text message usually asks the user to call a phone number or go to a Website to take immediate action. Dr Sapna Deo
  • 13. Vishing / Voice Phishing • When a fraudster creates an automated voice system to make voice calls to phone users to ask for private information it is called Vishing or Voice Phishing. • the voice call creates a sense of urgency for the user to take action and provide information to do so. Dr Sapna Deo
  • 14. • Deliberately destroying or damaging property of another. • It includes – any kind of physical harm done to the computer of any other person. • The intention of the offender is generally cause damage or harassment to the computer owner. • The use of internet to hinder the normal functioning of a computer system • Corruption and destruction of Digital property Computer Vandalism Dr Sapna Deo
  • 15. Email fraud • Email fraud is the intentional deception made for personal gain or to damage another individual through Email Almost as soon as Email became widely used, it began to be used as a means to defraud people. • Email fraud can take the form of a con game or scam. Confidence tricks tend to exploit the inherent greed and dishonesty of their victims: the prospect of a 'bargain' or 'something for nothing' can be very tempting. Dr Sapna Deo
  • 16. Internet Time Theft • Basically, Internet time theft comes under hacking. • It is the use by an unauthorised person, of the Internet hours paid for by another person. • The person who gets access to some one else’s ISP user ID and password, either by hacking or by gaining access to it by illegal means, uses it to access the Internet without the other person’s knowledge. • You can identify time theft if your Internet time has to be recharged often, despite infrequent usage. • This connotes the usage by an unauthorized person of the Internet hours paid for by another person Dr Sapna Deo
  • 17. Sale of Illegal Articles • Sale of illegal articles narcotics drugs, weapons, wildlife • It is practically impossible to control or prevent a criminal from setting up a website to transact in illegal articles • there are several online payment gateways that can transfer money around the world at the click of a button. Dr Sapna Deo
  • 18. Illustration • A branch of the erstwhile Global Trust Bank in India experienced a run on the bank. Numerous customers decided to withdraw all their money and close their • accounts. • An investigation revealed that someone had sent out spoofed emails to many of the bank’s customers stating that the bank was • in very bad shape financially and could close operations at any time. • The spoofed email appeared to have originated from the bank itself.Dr Sapna Deo
  • 19. Cyber Pornography • Cyber pornography covers pornographic websites, pornographic magazines produced using computers (to publish and print the material) • and the Internet (to download and transmit pornographic pictures, photos, writings etc). Dr Sapna Deo
  • 21. Trojans and Keyloggers • A Trojan, as this program is aptly called, is an unauthorized program • which functions from inside what seems to be an authorized program, • thereby concealing what it is actually doing. Dr Sapna Deo
  • 22. Use of encryption by terrorists • A disturbing trend that is emerging nowadays is the increasing use of • encryption, high-frequency encrypted voice/data links, encryption • software like Pretty Good Privacy (PGP) etc by terrorists and members of organized crime cartels. Dr Sapna Deo
  • 23. Financial Crimes • Money is the most common motive behind all crime. The same is also true for cyber crime. Globally it is being observed that more and more cyber crimes are being committed for financial motives rather than for “revenge” or for “fun”. • With the tremendous increase in the use of internet and mobile banking, online share trading, dematerialization of shares and securities, this trend is likely to increase unabated. • Financial crimes include cyber cheating, credit card frauds, money laundering, hacking into bank servers, computer manipulation, accounting scams etc. • Illustration 1 • Punjab National Bank in India was cheated to the tune of Rs. 13.9 million through false debits and credits in computerized accountsDr Sapna Deo
  • 24. Cyber Defamation • This occurs when defamation takes place with the help of computers and • / or the Internet. • e.g. Sameer publishes defamatory matter about Pooja on a website or sends e-mails containing defamatory information to Pooja’s friends. Dr Sapna Deo
  • 25. Cyber terrorism • Cyber terrorism is the premeditated use of disruptive activities, or the threat thereof, in cyber space, with the • intention to further social, ideological, religious, political or • similar objectives, or to intimidate any person in furtherance of such objectives. Dr Sapna Deo
  • 26. Characteristics of Cyber Terrorism.  Attack is predefined and victims are specifically targeted. Attack has an objective to destroy or damage specific targets such as political, economic, energy, civil and military infrastructures. Attack may even target specific opposing religious group’s information infrastructures to insight religious pandemonium Dr Sapna Deo
  • 27. • The purpose of any attack is to create fear of the group’s intentions • and further their own political agenda or goals or gain fellowship by succeeding in their attacks. • Destroy the enemy’s capabilities to further operate or operate within their own arena • Persuade others to believe that the victim or victims are vulnerable and their stability negligent. • Section 66F of IT Act..(Refer next slides) Dr Sapna Deo