PRESENTED BYPresented byFaizan Ahmad09-arid-1380M.Sc. Sociology 3rd
CRIMINAL ACTIVITY INVOLVINGINFORMATION TECHNOLOGY INFRASTRUCTURE ILLEGAL ACCESS DATA INTERFERENCE MISUSE OF DEVICESFORGERY AND ELECTRONIC FRAUD.
• Children and adolescents between the age group of 6 – 18 years
• Organised hackers• Professional hackers / crackers • Discontented employees
• Unauthorized access to computer systems or networks / Hacking
• Theft of information contained in electronic form• Email bombing• Data diddling• Salami attacks• Denial of Service attack• Virus / worm attacks• Logic bombs• Trojan attacks• Internet time thefts• Web jacking
CLASSIFICATION
Against Individuals
Against Individual Property
Against Organization
Against Society at large
Harassment via e-mails.
Cyber-stalking.
Dissemination of obscene material.
Defamation. Unauthorized control/access over computer system.
Indecent exposure
Email spoofing
Cheating & Fraud
• Computer vandalism.• Transmitting virus.• Unauthorized control/access over computer system.• Intellectual Property crimes• Internet time thefts
Unauthorized control/access
over computer system
Possession of unauthorized information.
Cyber terrorism against the
government organization.
Distribution of pirated software etc.
Pornography (basically child pornography). Polluting the youth through indecent exposure. Trafficking Financial crimes Sale of illegal articles Online gambling Forgery
• The hurry in which the legislation was passed, without sufficient public debate, did not really serve the desired purpose
• Cyber laws, in their very preamble and aim, state that they are targeted at aiding e-commerce, and are not meant to regulate cybercrime
• Cyber torts• Cyber crime in the Act is neither comprehensive nor exhaustive• Ambiguity in the definitions• Uniform law• Lack of awareness• Jurisdiction issues• Extra territorial application• Raising a cyber army• Hesitation to report offences
HOW TO DEAL WITH THIS PROBLEM
International Agreements and Cooperation –Essential due to the Worldwide Nature of the Internet
Software and Hardware defenses (e.g., antispam, antivirus software, firewalls)Other practical steps….
Avoid disclosing any information pertaining to oneself.
Avoid sending any photograph online particularly to strangers.
Use latest and up date anti virus software.Keep back up volumes.Never send your credit card number to any site
that is not secured.Use of firewalls may be beneficial.
CONCLUSIONCONCLUSION
• The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime.
Top Related