Cyber crime:The Transformation Of Crime In The Information Age.
-
Upload
omkar-walavalkar -
Category
Engineering
-
view
126 -
download
4
Transcript of Cyber crime:The Transformation Of Crime In The Information Age.
![Page 1: Cyber crime:The Transformation Of Crime In The Information Age.](https://reader035.fdocuments.us/reader035/viewer/2022062902/58f9ad4f1a28ab936d8b45ff/html5/thumbnails/1.jpg)
Cyber crime
-- Omkar .G.Walavalkar
![Page 2: Cyber crime:The Transformation Of Crime In The Information Age.](https://reader035.fdocuments.us/reader035/viewer/2022062902/58f9ad4f1a28ab936d8b45ff/html5/thumbnails/2.jpg)
Introduction.History of Cyber Crime.Definition.Categories of Cyber Crime.Types of Cyber Crime.Cyber Criminals.Cyber Crime In INDIA.Conclusion.References.
CONTENTS
![Page 3: Cyber crime:The Transformation Of Crime In The Information Age.](https://reader035.fdocuments.us/reader035/viewer/2022062902/58f9ad4f1a28ab936d8b45ff/html5/thumbnails/3.jpg)
Introduction
- Activity done using computers & Internet.
Cyber crime - Criminal Activity
There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
CYBER CRIME !!
![Page 4: Cyber crime:The Transformation Of Crime In The Information Age.](https://reader035.fdocuments.us/reader035/viewer/2022062902/58f9ad4f1a28ab936d8b45ff/html5/thumbnails/4.jpg)
History of Cyber Crime
First recorded cyber crime in 1820.
Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom.
![Page 5: Cyber crime:The Transformation Of Crime In The Information Age.](https://reader035.fdocuments.us/reader035/viewer/2022062902/58f9ad4f1a28ab936d8b45ff/html5/thumbnails/5.jpg)
It’s an unlawful act wherein the computer is either a tool or a target or both. Acts that are punishable by the Information Technology Act.
Defining Cyber Crime
• Cybercrime is second only to asset misappropriation amongeconomic crimes affecting companies in the financial services
sector- PwC Survey 2011
• India has suffered losses of approximately $8 billion due to cybercrime in 2011 and an estimated 14,392 websites in
the country were hacked in 2012, according to Cert-In.- Deccan Chronicle
![Page 6: Cyber crime:The Transformation Of Crime In The Information Age.](https://reader035.fdocuments.us/reader035/viewer/2022062902/58f9ad4f1a28ab936d8b45ff/html5/thumbnails/6.jpg)
Categories of Cyber Crime
• CYBER CRIMES AGAINST PERSONS
• CYBER CRIMES AGAINST PROPERTY
• CYBER CRIMES AGAINST GOVERNMENT (CYBER TERRORISM)
![Page 7: Cyber crime:The Transformation Of Crime In The Information Age.](https://reader035.fdocuments.us/reader035/viewer/2022062902/58f9ad4f1a28ab936d8b45ff/html5/thumbnails/7.jpg)
Types of Cyber Crime
(Insiders & Intruders)
![Page 8: Cyber crime:The Transformation Of Crime In The Information Age.](https://reader035.fdocuments.us/reader035/viewer/2022062902/58f9ad4f1a28ab936d8b45ff/html5/thumbnails/8.jpg)
Cyber Criminals
Kids (age group 9-16 etc.)
Organized hacktivists
Disgruntled employees
Professional hackers (corporate espionage)
![Page 9: Cyber crime:The Transformation Of Crime In The Information Age.](https://reader035.fdocuments.us/reader035/viewer/2022062902/58f9ad4f1a28ab936d8b45ff/html5/thumbnails/9.jpg)
India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the
Global Cyber Crime.
Cyber Crime In India
![Page 10: Cyber crime:The Transformation Of Crime In The Information Age.](https://reader035.fdocuments.us/reader035/viewer/2022062902/58f9ad4f1a28ab936d8b45ff/html5/thumbnails/10.jpg)
Why India?
A rapidly growing online user base
121 Million Internet Users 46+ Million Social Network Users 50 Million users shop online on Ecommerce and Online
Shopping Sites
![Page 11: Cyber crime:The Transformation Of Crime In The Information Age.](https://reader035.fdocuments.us/reader035/viewer/2022062902/58f9ad4f1a28ab936d8b45ff/html5/thumbnails/11.jpg)
Conclusion
Within the law enforcement agencies, a set of rules must be developed to address the various categories of computer crime.
As such, investigators will know what and which materials to search and seize, the electronic evidence to recover, and the chain of custody to maintain .
![Page 12: Cyber crime:The Transformation Of Crime In The Information Age.](https://reader035.fdocuments.us/reader035/viewer/2022062902/58f9ad4f1a28ab936d8b45ff/html5/thumbnails/12.jpg)
References Fraud and related activity in connection with access devices
18 U.S. Code Sec. 1029.
Fraud and related activity in connection with computers 18 U.S. Code Sec. 1030.
Theft of criminal trade secrets 18 U.S. Code, pp. 1831 -1839.
K. G. Allred, , R. J. Bies, R. J. Lewicki, and B. H. Sheppard, Eds., “Anger driven retaliation: Toward an understanding of impassioned conflict in organizations,” in Research on Negotiations in Organizations. Greenwich, CT: JAI Press, 1999, vol. 7.
![Page 13: Cyber crime:The Transformation Of Crime In The Information Age.](https://reader035.fdocuments.us/reader035/viewer/2022062902/58f9ad4f1a28ab936d8b45ff/html5/thumbnails/13.jpg)
THANK YOU…