Submitted To: Submitted by:
Mrs. Mamta Sakpal Shivangi Sharma
Contents
 Introduction
 History of cyber crime
 Categories of cyber crime
 Types of cyber crime
 Cyber laws
 Birth of Cyber laws
 IT Act 2000
 Case Study
Introduction
 Computer crime or cyber crime, the
use of a computer as an instrument to
further illegal ends, such as
committing fraud , stealing identities, or
violating privacy.
 Computer crime, or cybercrime, is any
crime that involves a computer and
a network. The computer may have
been used in the commission of a crime,
or it may be the target.
History of Cyber Crime
 The first recorded cyber crime took place in
1820.
 This is not surprising considering the fact
that the abacus , which is the earliest form
of a computer has been around since 3500
B.C.
 The first spam mail took place in
1976,when it was sent out over ARPANET.
 The first virus was installed on an Apple
Computer in 1982.
Categories of cyber crime
 The computer as a target-
using a computer to attack other
computer . E.g. Hacking ,virus /worm
attack , Dos attack etc.
 The computer as a weapon-using a
computer to commit real world crime
e.g. cyber terrorism , credit card fraud
and pornography.
Types of cyber crime
 HACKING :- Hacking in simple terms means
an illegal intrusion of information from a
computer system and/or network .
 TELECOMMUNICATIONS PIRACY:-Digital
technology permits perfect reproduction and
easy dissemination of print, graphics, sound,
and multimedia combinations. The
temptation to reproduce copyrighted material
for personal use, for sale at a lower price, for
free distribution.
 DENIAL OF SERVICE ATTACKS : This is
an act by the criminals who floods the
bandwidth of the victims network or fills his
E-mail box with spam mail depriving him of
the service he is entitled to access or
provide.
 VIRUS DISSMINITION : Malicious software
that attaches itself to other software. Virus ,
Worms, Trojan horse etc.
 COMPUTER VANDALISM :
Damaging or destroying data rather
than stealing or misusing them is
called cyber vandalism. These are
program that attach themselves to a
file and then circulate.
 CYBER TERRORISM : Terrorist
attacks on the Internet is by
distributed denial of service attacks,
hate websites and hate E-mails etc.
Cyber laws
 Cyber law is a system of law and
regulation for the cyber space. It is a
generic term which refers to all the legal
and regulatory aspects of internet and
the world wide web.
 Cyber law is important because it
touches almost all aspects of
transactions and activities concerning
the Internet, the World Wide Web and
Cyberspace.
Birth of Cyber law
 The United Nations General Assembly
have adopted the Model Law on
Electronic Commerce on 30th January
1997.
 India passed the Information Technology
Act, 2000 on 17th October, 2000.
 Amended on 27th October 2009.
Amended Act is known as - The
Information Technology (amendment)
Act, 2008.
The IT Act 2000
Objectives
 To provide legal recognition for
transactions carried out by means of
electronic data interchange
 To facilitate electronic filing of
documents with the Government
agencies
Cybercrime provisions under IT
Act,2000
 Sec.65: Tampering with Computer
source documents
 Sec.66 : Hacking with Computer
systems, Data alteration
 Sec.67 : Publishing obscene information
 Sec.70 : Un-authorized access to
protected system
 Sec.72 : Breach of Confidentiality and
Privacy
 Sec.73 : Publishing false digital
signature certificates
Case study
ONLINE CREDIT CARD
FRAUD ON E-bay
 Bhubaneswar: Rourkela police busted a
racket involving an online fraud worth Rs
12.5 lakh. The modus operandi of the
accused was to hack into the eBay India
website and make purchases in the names
of credit cardholders.
 Two persons, including alleged mastermind
Debasis Pandit, a BCA student, were
arrested and forwarded to the court of the
subdivisional judicial magistrate, Rourkela.
The other arrested person is Rabi Narayan
Sahu.
 Superintendent of police D.S. Kutty said
the a case has been registered against the
accused under Sections 420 and 34 of the
Indian Penal Code and Section 66 of the IT
Act and further investigation is on, he said.
 Pandit allegedly hacked into the eBay India
site and gathered the details of around 700
credit cardholders. He then made
purchases by using their passwords.
 The fraud came to the notice of eBay
officials when it was detected that several
purchases were made from Rourkela while
the customers were based in cities such as
Bangalore, Baroda and Jaipur and even
London, said V. Naini, deputy manager of
eBay.
 The company brought the matter to the
notice of Rourkela police after some
customers lodged complaints.
 Pandit used the address of Sahu for
delivery of the purchased goods, said
police.
 The gang was involved in train, flight and
hotel reservations.
 The hand of one Satya Samal, recently
arrested in Bangalore, is suspected in the
crime. Samal had booked a room in a
Bangalore hotel for three months. The
hotel and transport bills rose to Rs 5 lakh,
which he did not pay.
 Samal was arrested for non-payment of
bills, following which Pandit rushed to
Bangalore and stood guarantor for his
release on bail, police sources said.
Thank You!!

Presentation1

  • 1.
    Submitted To: Submittedby: Mrs. Mamta Sakpal Shivangi Sharma
  • 2.
    Contents  Introduction  Historyof cyber crime  Categories of cyber crime  Types of cyber crime  Cyber laws  Birth of Cyber laws  IT Act 2000  Case Study
  • 3.
    Introduction  Computer crimeor cyber crime, the use of a computer as an instrument to further illegal ends, such as committing fraud , stealing identities, or violating privacy.  Computer crime, or cybercrime, is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
  • 4.
    History of CyberCrime  The first recorded cyber crime took place in 1820.  This is not surprising considering the fact that the abacus , which is the earliest form of a computer has been around since 3500 B.C.  The first spam mail took place in 1976,when it was sent out over ARPANET.  The first virus was installed on an Apple Computer in 1982.
  • 5.
    Categories of cybercrime  The computer as a target- using a computer to attack other computer . E.g. Hacking ,virus /worm attack , Dos attack etc.  The computer as a weapon-using a computer to commit real world crime e.g. cyber terrorism , credit card fraud and pornography.
  • 6.
    Types of cybercrime  HACKING :- Hacking in simple terms means an illegal intrusion of information from a computer system and/or network .  TELECOMMUNICATIONS PIRACY:-Digital technology permits perfect reproduction and easy dissemination of print, graphics, sound, and multimedia combinations. The temptation to reproduce copyrighted material for personal use, for sale at a lower price, for free distribution.
  • 7.
     DENIAL OFSERVICE ATTACKS : This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide.  VIRUS DISSMINITION : Malicious software that attaches itself to other software. Virus , Worms, Trojan horse etc.
  • 8.
     COMPUTER VANDALISM: Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.  CYBER TERRORISM : Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails etc.
  • 9.
    Cyber laws  Cyberlaw is a system of law and regulation for the cyber space. It is a generic term which refers to all the legal and regulatory aspects of internet and the world wide web.  Cyber law is important because it touches almost all aspects of transactions and activities concerning the Internet, the World Wide Web and Cyberspace.
  • 10.
    Birth of Cyberlaw  The United Nations General Assembly have adopted the Model Law on Electronic Commerce on 30th January 1997.  India passed the Information Technology Act, 2000 on 17th October, 2000.  Amended on 27th October 2009. Amended Act is known as - The Information Technology (amendment) Act, 2008.
  • 11.
  • 12.
    Objectives  To providelegal recognition for transactions carried out by means of electronic data interchange  To facilitate electronic filing of documents with the Government agencies
  • 13.
    Cybercrime provisions underIT Act,2000  Sec.65: Tampering with Computer source documents  Sec.66 : Hacking with Computer systems, Data alteration  Sec.67 : Publishing obscene information  Sec.70 : Un-authorized access to protected system  Sec.72 : Breach of Confidentiality and Privacy  Sec.73 : Publishing false digital signature certificates
  • 14.
  • 15.
    ONLINE CREDIT CARD FRAUDON E-bay  Bhubaneswar: Rourkela police busted a racket involving an online fraud worth Rs 12.5 lakh. The modus operandi of the accused was to hack into the eBay India website and make purchases in the names of credit cardholders.  Two persons, including alleged mastermind Debasis Pandit, a BCA student, were arrested and forwarded to the court of the subdivisional judicial magistrate, Rourkela. The other arrested person is Rabi Narayan Sahu.
  • 16.
     Superintendent ofpolice D.S. Kutty said the a case has been registered against the accused under Sections 420 and 34 of the Indian Penal Code and Section 66 of the IT Act and further investigation is on, he said.  Pandit allegedly hacked into the eBay India site and gathered the details of around 700 credit cardholders. He then made purchases by using their passwords.
  • 17.
     The fraudcame to the notice of eBay officials when it was detected that several purchases were made from Rourkela while the customers were based in cities such as Bangalore, Baroda and Jaipur and even London, said V. Naini, deputy manager of eBay.  The company brought the matter to the notice of Rourkela police after some customers lodged complaints.  Pandit used the address of Sahu for delivery of the purchased goods, said police.  The gang was involved in train, flight and hotel reservations.
  • 18.
     The handof one Satya Samal, recently arrested in Bangalore, is suspected in the crime. Samal had booked a room in a Bangalore hotel for three months. The hotel and transport bills rose to Rs 5 lakh, which he did not pay.  Samal was arrested for non-payment of bills, following which Pandit rushed to Bangalore and stood guarantor for his release on bail, police sources said.
  • 19.