Cyber crime
-
Upload
paul-senthil -
Category
Education
-
view
4.783 -
download
0
description
Transcript of Cyber crime
![Page 1: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/1.jpg)
CYBER CRIMEScience and crime
![Page 2: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/2.jpg)
WHAT IS CRIME?
Crime is a social and economic phenomenon
“a legal wrong that can be followed by criminal proceedings which may result into punishment.”
Legal definition : Crime is an intentional act of commission or omission in contravention to the law of the land and accordingly punishable when proved in judicial proceeding
![Page 3: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/3.jpg)
TYPES OF CRIME
Conventional and new forms of crime White collar crime Organized crime Victimless crime
![Page 4: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/4.jpg)
CYBER CRIME
The term “cyber crime” was first coined by Barry Collins in 1980’s
“Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”
A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both”
![Page 5: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/5.jpg)
REASONS FOR CYBER CRIME:
Capacity to store data in comparatively small space
Easy to access Complex Negligence Loss of evidence
![Page 6: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/6.jpg)
CYBER CRIMINALS:
The cyber criminals constitute of various groups/ category. The following are the category of cyber criminals:
• Children and adolescents between the age group of 6 – 18 years
• Organised hackers• Professional hackers / crackers• Discontented employees
![Page 7: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/7.jpg)
MODE AND MANNER OF COMMITING CYBER CRIME:
Hacking Theft of information contained in
electronic form Email bombing Data diddling Salami attacks Denial of Service attack Virus / worm attacks Logic bombs
![Page 8: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/8.jpg)
Contd.
Trojan attacks Internet time thefts Web jacking
![Page 9: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/9.jpg)
CATEGORIES OF CYBER CRIMES
Internal Computer crimes
Virus worms Trojan horses
Telecommunicati-on crimes
Phone breaking
Phone tapping Hacking
Computer Manipulation Crimes
Embezzlements
Frauds
Support of Criminal Enterprises
Data bases to support drug Distribution
Data bases to keep records of client transaction
Money laundering
Hardware and softwareTheft
Software piracy
Theft of computer and microchips
Theft of trade secrets
![Page 10: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/10.jpg)
TYPES OF CYBER CRIME
Classification of cyber crime
1. Against Individuals
a. their person &b. their
property of an individual
2. Against Organization
a. Governmentc. Firm, Company,
Group of Individuals
3. Against Society at large
![Page 11: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/11.jpg)
AGAINST INDIVIDUALS
Harassment via e-mails. Cyber-stalking. Dissemination of obscene material. Defamation. Unauthorized control/access over computers Indecent exposure Email spoofing Cheating & Fraud
![Page 12: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/12.jpg)
AGAINST INIDVIDUAL PROPERTY:
Computer vandalism. Transmitting virus. Net trespass Unauthorized control/access over
computers Intellectual Property crimes Internet time thefts
![Page 13: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/13.jpg)
AGAINST ORGANISATION
Cyber terrorism against the government organization.
Distribution of pirated software etc.
![Page 14: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/14.jpg)
CYBER TERRORISM
Scientific war against Governments
![Page 15: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/15.jpg)
CYBER TERRORISM
Cyber terrorism is the convergence of terrorism and cyberspace. It is generally understood to
mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
![Page 16: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/16.jpg)
WITH INCLUSION OF COMPUTER
LTTE AUM
Perpetrator Group/Individual Group/Individual
Place Sri Lanka/London/Australia
Japan/US/WorldwideWorldwide
Tool Threats/Violence/Recruitment/Education/Strategies
Violence/Recruitment/Education/Strategies
Target Government Officials/Recruits
Governments
Motivation Social/Political Change
World Domination
![Page 17: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/17.jpg)
DEFENDING AGAINST CYBER TERRORISM
DETERRENCE CRIMINAL JUSTICE ENHANCED DEFENSE NEGOTIATIONS
![Page 18: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/18.jpg)
AGAINST SOCIETY AT LARGE
Pornography (basically child pornography)
Polluting the youth through indecent exposure
Trafficking Financial crimes Sale of illegal articles Online gambling Forgery
![Page 19: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/19.jpg)
TOP 20 :
![Page 20: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/20.jpg)
CYBER CRIMES IN INDIA
![Page 21: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/21.jpg)
STATUTORY PROVISONS:
The Indian parliament considered it necessary to give effect to the resolution by which the General Assembly adopted Model Law on Electronic Commerce adopted by the United Nations
As a consequence of which the Information Technology Act 2000 was passed and enforced on 17th May 2000.
The Information Technology Act deals with the various cyber crimes in chapters IX & XI. The important sections are Ss. 43,65,66,67
![Page 22: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/22.jpg)
VARIOUS SECTIONS
Section 43
deals with the unauthorised access, unauthorised downloading, virus attacks or any contaminant, causes damage, disruption, denial of access, interference with the service availed by a person
Section 65 deals with ‘tampering with computer source documents’ and provides for imprisonment up to 3 years or fine
Section 66 deals with ‘hacking with computer system’ and provides for imprisonment up to 3 years or fine
section 67 deals with publication of obscene material and provides for imprisonment up to a term of 10 years
![Page 23: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/23.jpg)
PREVENTION OF CYBER CRIME To prevent cyber stalking avoid disclosing any
information pertaining to oneself. This is as good as disclosing your identity to strangers in public place.
Always avoid sending any photograph online particularly to strangers and chat friends as there have been incidents of misuse of the photographs.
Always use latest and up date anti virus software to guard against virus attacks.
Always keep back up volumes so that one may not suffer data loss in case of virus contamination
Never send your credit card number to any site that is not secured, to guard against frauds.
![Page 24: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/24.jpg)
CONTD.
Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children.
Web site owners should watch traffic and check any irregularity on the site. Putting host-based intrusion detection devices on servers may do this
Web servers running public sites must be physically separate protected from internal corporate network.
![Page 25: Cyber crime](https://reader035.fdocuments.us/reader035/viewer/2022070304/54c8ac9a4a79596d0a8b459d/html5/thumbnails/25.jpg)
CONCLUSION
History is the witness that no legislation has succeeded in totally eliminating crime from the globe.
The only possible step is to make people aware of
their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime.
Undoubtedly the IT Act is a historical step in the cyber world. Further I all together do not deny that there is a need to bring changes in the Information Technology Act to make it more effective to combat cyber crime.