Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

What constitutes a cyber crime in the country


Published on

Published in: Technology
  • Be the first to comment

What constitutes a cyber crime in the country

  1. 1. What Constitutes a Cyber Crime In the Country By- Ujjwal Tripathi Engg. College Ajmer
  2. 2. What is Cyber Crime ? The commission of illegal acts through the use of a computer or against a computer system. Cybercrime is nothing but where the computer used as an object or subject of crime.
  3. 3. Types of Cyber CrimeCriminal activity involving Hacking Virus Dissemination Intellectual Property Crimes Software Piracy Email spoofing Phishing
  4. 4. • Hacking- Hacking in simple terms means an illegalintrusion into a computer system without permission ofcomputer owner/user. Hackers write or use ready-madecomputer programs to attack the target computer. Virus Dissemination - Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious. Software Piracy - Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. The unauthorized copying of software.
  5. 5.  Email spoofing - A spoofed email is one that appears to originate from one source but actually has been sent from another source. Phishing - The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has .
  6. 6. Existing Laws Used for Computer Crimes
  7. 7. U.S. Computer Fraud and Abuse Act Unauthorized access to a computer containing data protected for the national defense or foreign relations concerns Unauthorized access to a computer containing certain banking or financial information Unauthorized access, use, modification, destruction, or disclosure of a computer or information in a computer operated on behalf of the U.S. government
  8. 8. U.S. Computer Fraud and Abuse Act Accessing without permission a “protected computer,” which the courts now interpret to include any computer connected to the Internet . Computer fraud . Transmitting code that causes damage to a computer system or network . Trafficking in computer passwords .
  9. 9. INFORMATION TECHNOLOGY ACT, 2000 We in India also have had a vision to become the 12th nation in the world to enact a Cyber law. We have enacted the Information Technology Act, 2000.
  10. 10. THE IT ACT, 2000 –OBJECTIVES To provide legal recognition for transactions. Carried out by means of electronic data interchange. Other means of electronic communication, commonly referred to as "electronic commerce", involving the use of alternatives to paper-based methods of communication and storage of information.
  11. 11. I.T. ACT 2000 – CONCLUSION The other steps have to follow. However, the government has to be quick in responding to the challenges raised by the constantly changing technologies. Just as time does not wait for anyone, so does Internet. The time to act is right now.
  12. 12. Thank You