SlideShare ist ein Scribd-Unternehmen logo
1 von 25
CYBER CRIME
Science and crime
   Crime is a social and economic phenomenon
   “a legal wrong that can be followed by criminal
    proceedings which may result into
    punishment.”
   Legal definition : Crime is an intentional act
    of commission or omission in contravention
    to the law of the land and accordingly
    punishable when proved in judicial
    proceeding
   Conventional and new forms of crime
   White collar crime
   Organized crime
   Victimless crime
   The term “cyber crime” was first coined by
    Barry Collins in 1980’s
   “Any criminal activity that uses a computer
    either as an instrumentality, target or a means
    for perpetuating further crimes comes within
    the ambit of cyber crime”
   A generalized definition of cyber crime may
    be “ unlawful acts wherein the computer is
    either a tool or target or both”
   Capacity to store data in comparatively small
    space
   Easy to access
   Complex
   Negligence
   Loss of evidence
   The cyber criminals constitute of various
    groups/ category. The following are the
    category of cyber criminals:
•   Children and adolescents between the age
    group of 6 – 18 years
•   Organised hackers
•   Professional hackers / crackers
•   Discontented employees
   Hacking
   Theft of information contained in electronic
    form
   Email bombing
   Data diddling
   Salami attacks
   Denial of Service attack
   Virus / worm attacks
   Logic bombs
   Trojan attacks
   Internet time thefts
   Web jacking
Internal           Virus             worms              Trojan horses
Computer
crimes
Telecommunicati-   Phone breaking    Phone tapping      Hacking
on crimes

Computer           Embezzlements     Frauds
Manipulation
Crimes
Support of         Data bases to     Data bases to      Money laundering
Criminal           support drug      keep records of
Enterprises        Distribution      client
                                     transaction
Hardware and       Software piracy   Theft of computer Theft of trade
software                             and microchips    secrets
Theft
Classification of cyber crime
   1. Against            2. Against
  Individuals           Organization
a. their person &       a. Government      3. Against Society at
                               c.                  large
b. their property   Firm, Company, Group
 of an individual        of Individuals
    Harassment via e-mails.
   Cyber-stalking.
   Dissemination of obscene material.
   Defamation.
   Unauthorized control/access over computers
   Indecent exposure
   Email spoofing
    Cheating & Fraud
    Computer vandalism.
   Transmitting virus.
    Net trespass
    Unauthorized control/access over computers
   Intellectual Property crimes
    Internet time thefts
   Cyber terrorism against the government
    organization.
   Distribution of pirated software etc.
CYBER TERRORISM
Scientific war against
Governments
   Cyber terrorism is the convergence of terrorism
    and cyberspace. It is generally understood to
    mean unlawful attacks and threats of attack
    against computers, networks, and the
    information stored therein when done to
    intimidate or coerce a government or its people
    in furtherance of political or social objectives.
LTTE                     AUM

Perpetrator   Group/Individual          Group/Individual

Place         Sri                       Japan/US/Worldwide
              Lanka/London/Australia    Worldwide
Tool          Threats/Violence/Recruitm Violence/Recruitment/
              ent/Education/Strategies  Education/Strategies

Target        Government                Governments
              Officials/Recruits
Motivation    Social/Political Change   World Domination
   DETERRENCE
   CRIMINAL JUSTICE
   ENHANCED DEFENSE
   NEGOTIATIONS
    Pornography (basically child pornography)
    Polluting the youth through indecent
    exposure
    Trafficking
   Financial crimes
   Sale of illegal articles
   Online gambling
   Forgery
   The Indian parliament considered it necessary to give effect
    to the resolution by which the General Assembly adopted
    Model Law on Electronic Commerce adopted by the United
    Nations
   As a consequence of which the Information Technology Act
    2000 was passed and enforced on 17th May 2000.
   The Information Technology Act deals with the various cyber
    crimes in chapters IX & XI. The important sections are Ss.
    43,65,66,67
deals with the unauthorised access, unauthorised
Section 43   downloading, virus attacks or any contaminant, causes
             damage, disruption, denial of access, interference with
             the service availed by a person
             deals with ‘tampering with computer source documents’
Section 65   and provides for imprisonment up to 3 years or fine


             deals with ‘hacking with computer system’ and provides
Section 66   for imprisonment up to 3 years or fine


             deals with publication of obscene material and provides
section 67   for imprisonment up to a term of 10 years
   To prevent cyber stalking avoid disclosing any
    information pertaining to oneself. This is as good as
    disclosing your identity to strangers in public place.
   Always avoid sending any photograph online
    particularly to strangers and chat friends as there
    have been incidents of misuse of the photographs.
   Always use latest and up date anti virus software to
    guard against virus attacks.
   Always keep back up volumes so that one may not
    suffer data loss in case of virus contamination
   Never send your credit card number to any site that is
    not secured, to guard against frauds.
   Always keep a watch on the sites that your
    children are accessing to prevent any kind of
    harassment or depravation in children.
   Web site owners should watch traffic and check
    any irregularity on the site. Putting host-based
    intrusion detection devices on servers may do
    this
   Web servers running public sites must be
    physically separate protected from internal
    corporate network.
   History is the witness that no legislation has
    succeeded in totally eliminating crime from the globe.

   The only possible step is to make people aware of
    their rights and duties (to report crime as a collective
    duty towards the society) and further making the
    application of the laws more stringent to check crime.

   Undoubtedly the IT Act is a historical step in the cyber
    world. Further I all together do not deny that there is a
    need to bring changes in the Information Technology
    Act to make it more effective to combat cyber crime.

Weitere ähnliche Inhalte

Was ist angesagt?

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

Was ist angesagt? (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 

Andere mochten auch

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
june21harsh
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
Siddharth Anand
 

Andere mochten auch (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentation
 
Cybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber SpiesCybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber Spies
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...
 
Secure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSecure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual Intelligence
 
Crime Detection And Prevention Method By Using HCI
Crime Detection And  Prevention Method By Using HCICrime Detection And  Prevention Method By Using HCI
Crime Detection And Prevention Method By Using HCI
 
CRIME DETECTION
CRIME DETECTIONCRIME DETECTION
CRIME DETECTION
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 

Ähnlich wie Cyber crime

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
 

Ähnlich wie Cyber crime (20)

Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 

Mehr von Paul Senthil (7)

CRPF
CRPFCRPF
CRPF
 
police force ppt.pptx
police force ppt.pptxpolice force ppt.pptx
police force ppt.pptx
 
Environmental administration
Environmental administrationEnvironmental administration
Environmental administration
 
Hr and un
Hr and unHr and un
Hr and un
 
Japan constitution
Japan constitutionJapan constitution
Japan constitution
 
Motivation
MotivationMotivation
Motivation
 
Ne gp
Ne gpNe gp
Ne gp
 

Kürzlich hochgeladen

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

Cyber crime

  • 2. Crime is a social and economic phenomenon  “a legal wrong that can be followed by criminal proceedings which may result into punishment.”  Legal definition : Crime is an intentional act of commission or omission in contravention to the law of the land and accordingly punishable when proved in judicial proceeding
  • 3. Conventional and new forms of crime  White collar crime  Organized crime  Victimless crime
  • 4. The term “cyber crime” was first coined by Barry Collins in 1980’s  “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”  A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both”
  • 5. Capacity to store data in comparatively small space  Easy to access  Complex  Negligence  Loss of evidence
  • 6. The cyber criminals constitute of various groups/ category. The following are the category of cyber criminals: • Children and adolescents between the age group of 6 – 18 years • Organised hackers • Professional hackers / crackers • Discontented employees
  • 7. Hacking  Theft of information contained in electronic form  Email bombing  Data diddling  Salami attacks  Denial of Service attack  Virus / worm attacks  Logic bombs
  • 8. Trojan attacks  Internet time thefts  Web jacking
  • 9. Internal Virus worms Trojan horses Computer crimes Telecommunicati- Phone breaking Phone tapping Hacking on crimes Computer Embezzlements Frauds Manipulation Crimes Support of Data bases to Data bases to Money laundering Criminal support drug keep records of Enterprises Distribution client transaction Hardware and Software piracy Theft of computer Theft of trade software and microchips secrets Theft
  • 10. Classification of cyber crime 1. Against 2. Against Individuals Organization a. their person & a. Government 3. Against Society at c. large b. their property Firm, Company, Group of an individual of Individuals
  • 11. Harassment via e-mails.  Cyber-stalking.  Dissemination of obscene material.  Defamation.  Unauthorized control/access over computers  Indecent exposure  Email spoofing  Cheating & Fraud
  • 12. Computer vandalism.  Transmitting virus.  Net trespass  Unauthorized control/access over computers  Intellectual Property crimes  Internet time thefts
  • 13. Cyber terrorism against the government organization.  Distribution of pirated software etc.
  • 14. CYBER TERRORISM Scientific war against Governments
  • 15. Cyber terrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
  • 16. LTTE AUM Perpetrator Group/Individual Group/Individual Place Sri Japan/US/Worldwide Lanka/London/Australia Worldwide Tool Threats/Violence/Recruitm Violence/Recruitment/ ent/Education/Strategies Education/Strategies Target Government Governments Officials/Recruits Motivation Social/Political Change World Domination
  • 17. DETERRENCE  CRIMINAL JUSTICE  ENHANCED DEFENSE  NEGOTIATIONS
  • 18. Pornography (basically child pornography)  Polluting the youth through indecent exposure  Trafficking  Financial crimes  Sale of illegal articles  Online gambling  Forgery
  • 19.
  • 20.
  • 21. The Indian parliament considered it necessary to give effect to the resolution by which the General Assembly adopted Model Law on Electronic Commerce adopted by the United Nations  As a consequence of which the Information Technology Act 2000 was passed and enforced on 17th May 2000.  The Information Technology Act deals with the various cyber crimes in chapters IX & XI. The important sections are Ss. 43,65,66,67
  • 22. deals with the unauthorised access, unauthorised Section 43 downloading, virus attacks or any contaminant, causes damage, disruption, denial of access, interference with the service availed by a person deals with ‘tampering with computer source documents’ Section 65 and provides for imprisonment up to 3 years or fine deals with ‘hacking with computer system’ and provides Section 66 for imprisonment up to 3 years or fine deals with publication of obscene material and provides section 67 for imprisonment up to a term of 10 years
  • 23. To prevent cyber stalking avoid disclosing any information pertaining to oneself. This is as good as disclosing your identity to strangers in public place.  Always avoid sending any photograph online particularly to strangers and chat friends as there have been incidents of misuse of the photographs.  Always use latest and up date anti virus software to guard against virus attacks.  Always keep back up volumes so that one may not suffer data loss in case of virus contamination  Never send your credit card number to any site that is not secured, to guard against frauds.
  • 24. Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children.  Web site owners should watch traffic and check any irregularity on the site. Putting host-based intrusion detection devices on servers may do this  Web servers running public sites must be physically separate protected from internal corporate network.
  • 25. History is the witness that no legislation has succeeded in totally eliminating crime from the globe.  The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime.  Undoubtedly the IT Act is a historical step in the cyber world. Further I all together do not deny that there is a need to bring changes in the Information Technology Act to make it more effective to combat cyber crime.