SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Govt. Engineering College, Ajmer
Seminar Presentation
On
“Cyber Crime in India”
SESSION(2012-2013)
Guided By: Submitted By:
Mr. Dinesh Kunteta Asish Verma
Rol No : 09cs19
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
GOVT. ENGINEERING COLLEGE, AJMER
4/12/2013 Designed By:-Asish Verma 1
Contents:
‱ What is Cyber Crime?
‱ History of Cyber Crime.
‱ Types of Cyber Crime.
‱ Mode and Manner of Committing Cyber Crime:
‱ What is IT Law & Cyber Law?
Acts made to deal with Cyber Crime in
‱ India
‱ Case Study in India
‱ Recommendations
4/12/2013 Designed By:-Asish Verma 2
What is Cyber crime???
‱ Cyber crime is simply defined as crimes that
are directly related to computers and using
computers.
‱ An increasing number of domestic and
international criminal activities are using the
Internet. Computers and other electronic
devices can be tools to commit crime or are
targeted by criminals. A personal computer
connected to the Internet without protection
may be infected with malicious software in
under a minute.
4/12/2013 Designed By:-Asish Verma 3
‱ Cybercrime is one of the fastest-growing criminal activities on the planet. It
covers a huge range of illegal activity including financial scams, computer
hacking, virus attacks, stalking by e-mail and creating websites that promote
racial hatred.
‱ Cybercrime has been used to describe a wide range of offences, including
offences against computer data and systems (such as “hacking”), computer-
related forgery and fraud (such as “phishing”), content offences and
copyright offences (such as the dissemination of pirated content).
4/12/2013 Designed By:-Asish Verma 4
History of Cyber Crime
‱ In the early decades of modern information
technology (IT), computer crimes were largely
committed by individual disgruntled and
dishonest employees.
‱ Physical damage to computer systems was a
prominent threat until the 1980s.
‱ Criminals often used unauthorized access to
subvert security systems as they modified data for
financial gain or destroyed data for revenge.
‱ As telecommunications technology spread
throughout the IT world, programmers began
writing malicious software, including self-
replicating programs, to interfere with personal
computers.
4/12/2013 Designed By:-Asish Verma 5
‱ As the 1990s progressed, financial crime using penetration and
subversion of computer systems increased.
‱ The types of malware shifted during the 1990s, taking advantage of new
vulnerabilities and dying out as operating systems were strengthened.
‱ Illegitimate applications of e-mail grew rapidly from the mid-1990s
onward, generating torrents of unsolicited commercial and fraudulent e-
mail.
‱ The most common cyber crimes during this time were phishing scams,
cyber stalking, computer viruses, and identity theft.
4/12/2013 Designed By:-Asish Verma 6
Types of cyber crime
Target group of
computer
devices
Target personal
computer
devices
Against
Person
Against
Property
Against
Govt.
Denial of
service
Malware
Computer
Viruses
Transmission
of indecent
material
Harassment
(sexual,
racial,
religious
etc.)
Computer
Vandalism
Transmission
of harmful
programs
Terrorize
international
Govt.
Cracking
into
military
maintained
website
4/12/2013 Designed By:-Asish Verma 7
Modes and manner of committing crimes
Unauthorized access
Unauthorized access means any kind of access without the permission of either the
rightful owner or the person in charge of a computer, computer system or computer
network.
Hacking
Every act committed towards breaking into a computer and/or network is hacking.
Hackers write or use ready-made computer programs to attack the target computer.
Trojan Attack
The program that act like something useful but do the things that are quiet damping.
The programs of this kind are called as Trojans.
Virus and Worm attack:-
A program that has capability to infect other programs and make copies of itself and
spread into other programs is called virus.
Programs that multiply like viruses but spread from computer to computer are called as
worms.
4/12/2013 Designed By:-Asish Verma 8
Script-kiddies
Crackers do more than just spoiling websites. Novices, who are called "script-kiddies"
in their circles, gain "root" access to a computer system, giving them the same power
over a system as an administrator – such as the power to modify features. They cause
damage by planting viruses.
Email spoofing
Email spoofing refers to email that appears to have been originated from one source
when it was actually sent from another source.
Phishing scams and fraud
A ‘phisher’ may use spoof emails to direct a computer user to fraudulent websites to
elicit a transfer of money, or sensitive information such as passwords or credit card
details, from the user.
4/12/2013 Designed By:-Asish Verma 9
‱ Cyber law or Internet law is a term that encapsulates the legal issues
related to use of the Internet. It is less a distinct field of law than intellectual
property or contract law, as it is a domain covering many areas of law and
regulation. Some leading topics include internet access and usage, privacy,
freedom of expression.
What is IT Law and Cyber Law
‱ IT Law is a set of legal enactments,
currently in existence in several
countries, which governs the digital
dissemination of both (digitalized)
information and software.
4/12/2013 Designed By:-Asish Verma 10
Case study
.
 e-bay.in is the most popular online shopping mall providing free online auctions for
products like mobiles/cell phones, cameras, computers, etc.
 Bhubaneswar: Rourkela police busted a racket involving an online fraud worth Rs
12.5 lakh.
 Two persons, including alleged mastermind Debasis Pandit, a BCA student, were
arrested and forwarded to the court of the subdivisional judicial magistrate,
Rourkela the other arrested person is Rabi Narayan Sahu.
 A case has been registered against the accused under Sections 420 and 34 of the
Indian Penal Code and Section 66 of the IT Act and further investigation is on, he
said.
4/12/2013 Designed By:-Asish Verma 11
 Pandit allegedly hacked into the eBay India site and gathered the details of
around 700 credit cardholders. He then made purchases by using their passwords.
 The fraud came to the notice of eBay officials when it was detected that several
purchases were made from Rourkela while the customers were based in cities such
as Bangalore, Baroda and Jaipur and even London
 The company brought the matter to the notice of Rourkela police after some
customers lodged complaints
 Pandit used the address of Sahu for delivery of the purchased goods
 The gang was involved in train, flight and hotel reservations.
4/12/2013 Designed By:-Asish Verma 12
Why India?
A rapidly growing online user
base
 121 Million Internet Users
 65 Million Active Internet
Users, up by 28% from 51
million in 2010
 50 Million users shop online
on Ecommerce and Online
Shopping Sites
 46+ Million Social Network
Users
 346 million mobile users had
subscribed to Data Packages.
4/12/2013 Designed By:-Asish Verma 13
 The majority of cybercrimes are centered on fraud and Phishing,
 India is the third-most targeted country for Phishing attacks after the US and the
UK,
 Social networks as well as ecommerce sites are major targets,
 6.9 million bot-infected systems in 2010,
 14,348 website defacements in 2010,
 6,850 .in and 4,150 .com domains were defaced during 2011,
 15,000 sites hacked in 2011,
 India is the number 1 country in the world for generating spam.
Cyber Crime In
India
4/12/2013 Designed By:-Asish Verma 14
Cost Of Cyber Crime In India (2010)
 29.9 million people fell victim to cybercrime,
 $4 billion in direct financial losses,
 $3.6 billion in time spent resolving the crime,
 4 in 5 online adults (80%) have been a victim of Cybercrime,
 17% of adults online have experienced cybercrime on their mobile phone.
Source: Norton Cybercrime Report 2011
4/12/2013 Designed By:-Asish Verma 15
We have covered about three instances where high-profile government websites were
hacked and defaced. However, the actual number of Government Websites that were
hacked are quite huge.
A total number of 90, 119, 252 and 219 Government websites tracked by the Indian
Computer Emergency Response Team (CERT-In) were hacked / defaced by various
hacker groups in the year 2008, 2009, 2010 and Jan–Oct 2011 respectively.
4/12/2013 Designed By:-Asish Verma 16
 The police have recorded 3,038 cases but made only 2,700 arrests in 3 years
(between 2007 and 2010)
 India registered only 1,350 cases under the IT Act and IPC in 2010
 50% of cybercrimes are not even reported.
 Again, this is growing
trend and it is
surprising that
authorities have
not taken stern actions to
curb the growth of these
cyber-crimes.
4/12/2013 Designed By:-Asish Verma 17
Cyber Laws in India
Under The Information
Technology Act, 2000
CHAPTER XI – OFFENCES – 66. Hacking with
computer system.
(1) Whoever with the Intent to cause or knowing
that he is likely to cause Wrongful Loss or
Damage to the public or any person Destroys or
Deletes or Alters any Information Residing in a
Computer Resource or diminishes its value or
utility or affects it injuriously by any means,
commits hack.
(2) Whoever commits hacking shall be punished with imprisonment up to three years,
or with fine which may extend up to two lakh rupees, or with both.
4/12/2013 Designed By:-Asish Verma 18
Information Technology Amendment Act,
2008
Section – 43,
Destroys, Deletes or Alters any Information residing in a computer resource or
diminishes its value or utility or affects it injuriously by any means;
Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or
alter any computer source code used for a computer resource with an intention to
cause damage;
“If any person, dishonestly, or fraudulently, does any act referred to in section 43, he
shall be punishable with imprisonment for a term which may extend to two three
years or with fine which may extend to five lakh rupees or with both.” [S.66]
4/12/2013 Designed By:-Asish Verma 19
S.66A - Punishment for sending offensive messages through communication
service, etc
 Any person who sends, by means of a computer resource or a communication
device;
 Any information that is grossly offensive or has menacing character; or
 Any information which he knows to be false, but for the purpose of causing
annoyance, inconvenience, danger, obstruction, insult, injury, criminal
intimidation, enmity, hatred, or ill will, persistently makes by making use of
such computer resource or a communication device;
 Any electronic mail or electronic mail message for the purpose of causing
annoyance or inconvenience or to deceive or to mislead the addressee or
recipient about the origin of such messages;
Shall be punishable with imprisonment for a term which may extend to three years
and with fine.
4/12/2013 Designed By:-Asish Verma 20
S. 66C - Punishment for identity theft
“Whoever, fraudulently or dishonestly make use of the electronic
signature, password or any other unique identification feature of any other person,
shall be punished with imprisonment of either description for a term which may
extend to three years and shall also be liable to fine which may extend to rupees
one lakh”
S. 66D - Punishment for cheating by personation by using computer resource
“Whoever, by means of any communication device or computer resource
cheats by personation, shall be punished with imprisonment of either description
for a term which may extend to three years and shall also be liable to fine which
may extend to one lakh rupees. “
4/12/2013 Designed By:-Asish Verma 21
S. 66E - Punishment for violation of privacy.
“Whoever, intentionally or knowingly captures, publishes or transmits the image
of a private area of any person without his or her consent, under circumstances
violating the privacy of that person, shall be punished with imprisonment which
may extend to three years or with fine not exceeding two lakh rupees, or with
both”
S. 67 A - Punishment for publishing or transmitting of material containing
sexually explicit act, etc. in electronic form
“Whoever publishes or transmits or causes to be published or transmitted in the
electronic form any material which contains sexually explicit act or conduct shall
be punished on first conviction with imprisonment of either description for a
term which may extend to five years and with fine which may extend to ten lakh
rupees”
4/12/2013 Designed By:-Asish Verma 22
S. 67 C - Preservation and Retention of information by intermediaries.
“(1) Intermediary shall preserve and retain such information as may be specified
for such duration and in such manner and format as the Central Government may
prescribe.
(2) Any intermediary who intentionally or knowingly contravenes the provisions
of sub section (1) shall be punished with an imprisonment for a term which may
extend to three years and shall also be liable to fine.”
4/12/2013 Designed By:-Asish Verma 23
Recommendations
 More Public awareness campaigns
 Training of police officers to effectively
combat cyber crimes
 More Cyber crime police cells set up across
the country
 Effective E-surveillance
 Websites aid in creating awareness and
encouraging reporting of cyber crime cases
 Specialised Training of forensic investigators
and experts
 Active coordination between police and other
law enforcement agencies and authorities is
required.
4/12/2013 Designed By:-Asish Verma 24
Conclusions
 Cybercrime greatly affects individuals, businesses, and national security
due to the pervasiveness of the Internet .
 Different countries should work together and use legal, organizational, and
technological approaches to combat cybercrime
‱ To reduce the damage to critical infrastructures
‱ To protect the Internet from being abused
"The modern thief can steal more with a computer than with a gun.
Tomorrow's terrorist may be able to do more damage with a keyboard
than with a bomb".
4/12/2013 Designed By:-Asish Verma 25
4/12/2013 Designed By:-Asish Verma 26
4/12/2013 Designed By:-Asish Verma 27

Weitere Àhnliche Inhalte

Was ist angesagt?

Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry RansomwareZoho Corporation
 
Phishing
PhishingPhishing
PhishingSagar Rai
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber AttacksRubal Sagwal
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crimeParas Kansagara
 
Phishing ppt
Phishing pptPhishing ppt
Phishing pptshindept123
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptRitesh Thakur
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and securitySheetal Kandhare
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Dinidu Weeraratne
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?Datto
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 

Was ist angesagt? (20)

Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
 
Phishing
PhishingPhishing
Phishing
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Phishing
PhishingPhishing
Phishing
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 

Andere mochten auch

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the countryUjjwal Tripathi
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among studentsjune21harsh
 
Cyber training 23 5 2012
Cyber training 23 5 2012Cyber training 23 5 2012
Cyber training 23 5 2012Jacqueline Fick
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Crime against women
Crime against womenCrime against women
Crime against womenMADDY125
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityAjay Singh
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidenceShahid Jamal Tubrazy
 
Ch 8 Property Crimes
Ch 8 Property CrimesCh 8 Property Crimes
Ch 8 Property Crimesrharrisonaz
 
Child labour
Child labourChild labour
Child labourtanyaisrani
 

Andere mochten auch (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber training 23 5 2012
Cyber training 23 5 2012Cyber training 23 5 2012
Cyber training 23 5 2012
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Crime against women
Crime against womenCrime against women
Crime against women
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Isys20261 lecture 04
Isys20261 lecture 04Isys20261 lecture 04
Isys20261 lecture 04
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
 
Ch 8 Property Crimes
Ch 8 Property CrimesCh 8 Property Crimes
Ch 8 Property Crimes
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Child labour
Child labourChild labour
Child labour
 
Jagritiksol
JagritiksolJagritiksol
Jagritiksol
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Ähnlich wie Asis Verma cyber crime ppt

Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer Choudhary
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
It presentation cyber crime
It presentation cyber crimeIt presentation cyber crime
It presentation cyber crimeAshish Ojha
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensicSANTANU KUMAR DAS
 
Cyber crime
Cyber crimeCyber crime
Cyber crimepraveen1792
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updatedPrabhatChoudhary11
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptxOmprakashRaut
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 

Ähnlich wie Asis Verma cyber crime ppt (20)

Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
It presentation cyber crime
It presentation cyber crimeIt presentation cyber crime
It presentation cyber crime
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
English in written
English in writtenEnglish in written
English in written
 

Mehr von Asish Verma

Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing Asish Verma
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)Asish Verma
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)Asish Verma
 
SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)Asish Verma
 
Major pro lab synopsis
Major pro lab synopsisMajor pro lab synopsis
Major pro lab synopsisAsish Verma
 
MINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVERMINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVERAsish Verma
 
Pt report(body)
Pt report(body)Pt report(body)
Pt report(body)Asish Verma
 
Pro lab synopsis (cert)
Pro lab synopsis (cert)Pro lab synopsis (cert)
Pro lab synopsis (cert)Asish Verma
 
Pro lab synopsis (body)
Pro lab synopsis (body)Pro lab synopsis (body)
Pro lab synopsis (body)Asish Verma
 
Pt report(cert)
Pt report(cert)Pt report(cert)
Pt report(cert)Asish Verma
 
Asish verma
Asish vermaAsish verma
Asish vermaAsish Verma
 
Microsoft project (msp) group 6
Microsoft project (msp)  group 6Microsoft project (msp)  group 6
Microsoft project (msp) group 6Asish Verma
 

Mehr von Asish Verma (14)

Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)
 
Major pro lab synopsis
Major pro lab synopsisMajor pro lab synopsis
Major pro lab synopsis
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
CCNA 2
CCNA 2 CCNA 2
CCNA 2
 
MINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVERMINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVER
 
Pt report(body)
Pt report(body)Pt report(body)
Pt report(body)
 
Pro lab synopsis (cert)
Pro lab synopsis (cert)Pro lab synopsis (cert)
Pro lab synopsis (cert)
 
Pro lab synopsis (body)
Pro lab synopsis (body)Pro lab synopsis (body)
Pro lab synopsis (body)
 
Pt report(cert)
Pt report(cert)Pt report(cert)
Pt report(cert)
 
Asish verma
Asish vermaAsish verma
Asish verma
 
Microsoft project (msp) group 6
Microsoft project (msp)  group 6Microsoft project (msp)  group 6
Microsoft project (msp) group 6
 

KĂŒrzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 

KĂŒrzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Asis Verma cyber crime ppt

  • 1. Govt. Engineering College, Ajmer Seminar Presentation On “Cyber Crime in India” SESSION(2012-2013) Guided By: Submitted By: Mr. Dinesh Kunteta Asish Verma Rol No : 09cs19 DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING GOVT. ENGINEERING COLLEGE, AJMER 4/12/2013 Designed By:-Asish Verma 1
  • 2. Contents: ‱ What is Cyber Crime? ‱ History of Cyber Crime. ‱ Types of Cyber Crime. ‱ Mode and Manner of Committing Cyber Crime: ‱ What is IT Law & Cyber Law? Acts made to deal with Cyber Crime in ‱ India ‱ Case Study in India ‱ Recommendations 4/12/2013 Designed By:-Asish Verma 2
  • 3. What is Cyber crime??? ‱ Cyber crime is simply defined as crimes that are directly related to computers and using computers. ‱ An increasing number of domestic and international criminal activities are using the Internet. Computers and other electronic devices can be tools to commit crime or are targeted by criminals. A personal computer connected to the Internet without protection may be infected with malicious software in under a minute. 4/12/2013 Designed By:-Asish Verma 3
  • 4. ‱ Cybercrime is one of the fastest-growing criminal activities on the planet. It covers a huge range of illegal activity including financial scams, computer hacking, virus attacks, stalking by e-mail and creating websites that promote racial hatred. ‱ Cybercrime has been used to describe a wide range of offences, including offences against computer data and systems (such as “hacking”), computer- related forgery and fraud (such as “phishing”), content offences and copyright offences (such as the dissemination of pirated content). 4/12/2013 Designed By:-Asish Verma 4
  • 5. History of Cyber Crime ‱ In the early decades of modern information technology (IT), computer crimes were largely committed by individual disgruntled and dishonest employees. ‱ Physical damage to computer systems was a prominent threat until the 1980s. ‱ Criminals often used unauthorized access to subvert security systems as they modified data for financial gain or destroyed data for revenge. ‱ As telecommunications technology spread throughout the IT world, programmers began writing malicious software, including self- replicating programs, to interfere with personal computers. 4/12/2013 Designed By:-Asish Verma 5
  • 6. ‱ As the 1990s progressed, financial crime using penetration and subversion of computer systems increased. ‱ The types of malware shifted during the 1990s, taking advantage of new vulnerabilities and dying out as operating systems were strengthened. ‱ Illegitimate applications of e-mail grew rapidly from the mid-1990s onward, generating torrents of unsolicited commercial and fraudulent e- mail. ‱ The most common cyber crimes during this time were phishing scams, cyber stalking, computer viruses, and identity theft. 4/12/2013 Designed By:-Asish Verma 6
  • 7. Types of cyber crime Target group of computer devices Target personal computer devices Against Person Against Property Against Govt. Denial of service Malware Computer Viruses Transmission of indecent material Harassment (sexual, racial, religious etc.) Computer Vandalism Transmission of harmful programs Terrorize international Govt. Cracking into military maintained website 4/12/2013 Designed By:-Asish Verma 7
  • 8. Modes and manner of committing crimes Unauthorized access Unauthorized access means any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. Hacking Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. Trojan Attack The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans. Virus and Worm attack:- A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. Programs that multiply like viruses but spread from computer to computer are called as worms. 4/12/2013 Designed By:-Asish Verma 8
  • 9. Script-kiddies Crackers do more than just spoiling websites. Novices, who are called "script-kiddies" in their circles, gain "root" access to a computer system, giving them the same power over a system as an administrator – such as the power to modify features. They cause damage by planting viruses. Email spoofing Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source. Phishing scams and fraud A ‘phisher’ may use spoof emails to direct a computer user to fraudulent websites to elicit a transfer of money, or sensitive information such as passwords or credit card details, from the user. 4/12/2013 Designed By:-Asish Verma 9
  • 10. ‱ Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet. It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include internet access and usage, privacy, freedom of expression. What is IT Law and Cyber Law ‱ IT Law is a set of legal enactments, currently in existence in several countries, which governs the digital dissemination of both (digitalized) information and software. 4/12/2013 Designed By:-Asish Verma 10
  • 11. Case study .  e-bay.in is the most popular online shopping mall providing free online auctions for products like mobiles/cell phones, cameras, computers, etc.  Bhubaneswar: Rourkela police busted a racket involving an online fraud worth Rs 12.5 lakh.  Two persons, including alleged mastermind Debasis Pandit, a BCA student, were arrested and forwarded to the court of the subdivisional judicial magistrate, Rourkela the other arrested person is Rabi Narayan Sahu.  A case has been registered against the accused under Sections 420 and 34 of the Indian Penal Code and Section 66 of the IT Act and further investigation is on, he said. 4/12/2013 Designed By:-Asish Verma 11
  • 12.  Pandit allegedly hacked into the eBay India site and gathered the details of around 700 credit cardholders. He then made purchases by using their passwords.  The fraud came to the notice of eBay officials when it was detected that several purchases were made from Rourkela while the customers were based in cities such as Bangalore, Baroda and Jaipur and even London  The company brought the matter to the notice of Rourkela police after some customers lodged complaints  Pandit used the address of Sahu for delivery of the purchased goods  The gang was involved in train, flight and hotel reservations. 4/12/2013 Designed By:-Asish Verma 12
  • 13. Why India? A rapidly growing online user base  121 Million Internet Users  65 Million Active Internet Users, up by 28% from 51 million in 2010  50 Million users shop online on Ecommerce and Online Shopping Sites  46+ Million Social Network Users  346 million mobile users had subscribed to Data Packages. 4/12/2013 Designed By:-Asish Verma 13
  • 14.  The majority of cybercrimes are centered on fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK,  Social networks as well as ecommerce sites are major targets,  6.9 million bot-infected systems in 2010,  14,348 website defacements in 2010,  6,850 .in and 4,150 .com domains were defaced during 2011,  15,000 sites hacked in 2011,  India is the number 1 country in the world for generating spam. Cyber Crime In India 4/12/2013 Designed By:-Asish Verma 14
  • 15. Cost Of Cyber Crime In India (2010)  29.9 million people fell victim to cybercrime,  $4 billion in direct financial losses,  $3.6 billion in time spent resolving the crime,  4 in 5 online adults (80%) have been a victim of Cybercrime,  17% of adults online have experienced cybercrime on their mobile phone. Source: Norton Cybercrime Report 2011 4/12/2013 Designed By:-Asish Verma 15
  • 16. We have covered about three instances where high-profile government websites were hacked and defaced. However, the actual number of Government Websites that were hacked are quite huge. A total number of 90, 119, 252 and 219 Government websites tracked by the Indian Computer Emergency Response Team (CERT-In) were hacked / defaced by various hacker groups in the year 2008, 2009, 2010 and Jan–Oct 2011 respectively. 4/12/2013 Designed By:-Asish Verma 16
  • 17.  The police have recorded 3,038 cases but made only 2,700 arrests in 3 years (between 2007 and 2010)  India registered only 1,350 cases under the IT Act and IPC in 2010  50% of cybercrimes are not even reported.  Again, this is growing trend and it is surprising that authorities have not taken stern actions to curb the growth of these cyber-crimes. 4/12/2013 Designed By:-Asish Verma 17
  • 18. Cyber Laws in India Under The Information Technology Act, 2000 CHAPTER XI – OFFENCES – 66. Hacking with computer system. (1) Whoever with the Intent to cause or knowing that he is likely to cause Wrongful Loss or Damage to the public or any person Destroys or Deletes or Alters any Information Residing in a Computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack. (2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both. 4/12/2013 Designed By:-Asish Verma 18
  • 19. Information Technology Amendment Act, 2008 Section – 43, Destroys, Deletes or Alters any Information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means; Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage; “If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both.” [S.66] 4/12/2013 Designed By:-Asish Verma 19
  • 20. S.66A - Punishment for sending offensive messages through communication service, etc  Any person who sends, by means of a computer resource or a communication device;  Any information that is grossly offensive or has menacing character; or  Any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device;  Any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages; Shall be punishable with imprisonment for a term which may extend to three years and with fine. 4/12/2013 Designed By:-Asish Verma 20
  • 21. S. 66C - Punishment for identity theft “Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh” S. 66D - Punishment for cheating by personation by using computer resource “Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees. “ 4/12/2013 Designed By:-Asish Verma 21
  • 22. S. 66E - Punishment for violation of privacy. “Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both” S. 67 A - Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form “Whoever publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees” 4/12/2013 Designed By:-Asish Verma 22
  • 23. S. 67 C - Preservation and Retention of information by intermediaries. “(1) Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe. (2) Any intermediary who intentionally or knowingly contravenes the provisions of sub section (1) shall be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.” 4/12/2013 Designed By:-Asish Verma 23
  • 24. Recommendations  More Public awareness campaigns  Training of police officers to effectively combat cyber crimes  More Cyber crime police cells set up across the country  Effective E-surveillance  Websites aid in creating awareness and encouraging reporting of cyber crime cases  Specialised Training of forensic investigators and experts  Active coordination between police and other law enforcement agencies and authorities is required. 4/12/2013 Designed By:-Asish Verma 24
  • 25. Conclusions  Cybercrime greatly affects individuals, businesses, and national security due to the pervasiveness of the Internet .  Different countries should work together and use legal, organizational, and technological approaches to combat cybercrime ‱ To reduce the damage to critical infrastructures ‱ To protect the Internet from being abused "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb". 4/12/2013 Designed By:-Asish Verma 25

Hinweis der Redaktion

  1. "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb".