SlideShare ist ein Scribd-Unternehmen logo
1 von 22
What is Crime??? ?
An action or omission that constitutes an offense
that may be prosecuted by the state and is
punishable by law.
The greatest crimes do not arise from a want of
feeling for others but from an over sensibility for
ourselves and an over indulgence in our own
desires.
What is Cyber Crime??? ?
Crime committed using a computer and the internet to steal a
person's identity or sell contraband or stalk victims or disrupt
operations with malevolent programs..
Cyber Crime is emerging as a serious threat.
Threatening Email, Assuming someone's Identity, Sexual Harassment,
Defamation, Spam and Phishing are some examples where
computers are used to commit crime.
Viruses, Worms and Industrial Espionage, Software Piracy and
Hacking are examples where computers become target of crime.
Cyber Crime Variants
 Hacking
 "Hacking" is a crime, which entails cracking systems and gaining
unauthorized access to the data stored in them. Hacking had
witnessed a 37 percent increase this year.
 Hacker
 Hacker (programmer subculture), who combines excellence, playfulness, cleverness
and exploration in performed activities.
 Kevin David Mitnick is first hacker.
Cyber Squatting :-
 Cyber Squatting is the act of registering a famous Domain Name and then
selling it for a fortune.
 Phishing :-
 Phishing is just one of the many frauds on the Internet, trying to fool people into
parting with their money.
 Phishing refers to the receipt of unsolicited emails by customers of Financial
Institutions, requesting them to enter their Username, Password or other personal
information to access their Account for some reason.
 The fraudster then has access to the customer's online bank account
and to the funds contained in that account.
How it Works ??? ?
Cyber Stalking :-
 Cyber Stalking is use of the Internet or other electronic means to stalk
someone.
 This term is used interchangeably with online harassment and online
abuse.
 Stalking generally involves harassing or threatening behaviour that an
individual engages in repeatedly, such as following a person, appearing
at a person's home or place of business, making harassing phone calls,
leaving written messages or objects, or vandalizing a person's property.
Vishing :-
 Vishing is the criminal practice of using social engineering and Voice over IP
(VoIP) to gain access to private personal and financial information from the
public for the purpose of financial reward.
 The term is a combination of “Voice" and phishing.
 Vishing exploits the public's trust via landline telephone services.
 Vishing is typically used to steal credit card numbers or other information
used in identity theft schemes from individuals.
Indian Crime Scene
 The major Cyber Crimes reported, in India, are Denial of Services,
Defacement of Websites, Spam, Computer Virus and Worms,
Pornography, Cyber Squatting, Cyber Stalking and Phishing.
 Given the fact that nearly $ 120 million worth of Mobiles are being
lost or stolen in the country every year.
 Nearly 69 per cent of information theft is carried out by current
and ex-employees and 31 per cent by hackers.
Top Countries in Cyber Crime :-
India stands 11th in the ranking for Cyber Crime in the
World, constituting 3% of the Global Cyber Crime.
Why India??? ?
 121 Million Internet Users
 65 Million Active Internet Users, up by 28% from 51 million in 2010
 50 Million users shop online on Ecommerce and Online Shopping
Sites
 46+ Million Social Network Users
 346 million mobile users had subscribed to Data Packages.
A rapidly growing online user base
The majority of cybercrimes are centered on forgery, fraud and Phishing,
India is the third-most targeted country for Phishing attacks after the US and the UK,
Social networks as well as ecommerce sites are major targets,
6.9 million bot-infected systems in 2010,
14,348 website defacements in 2010.
6,850 .in and 4,150 .com domains were defaced during 2011,
15,000 sites hacked in 2011,
India is the number 1 country in the world for generating spam.
The police have recorded 3,038 cases but made only 2,700 arrests in 3 years
(between 2007 and 2010).
India registered only 1,350 cases under the IT Act and IPC in 2010
50% of cybercrimes are not even reported.
Cyber Laws in India
The Information Technology Act, 2000
CHAPTER XI – OFFENCES – 66. Hacking with computer system
 Whoever with the Intent to cause Wrongful Loss or Damage to the public or any person
Destroys or Deletes or Alters any Information Residing in Computer Resource or diminishes
its value or utility or affects it injuriously by any means, commits hack
 Whoever commits hacking shall be punished with imprisonment up to three years, or with fine
which may extend up to two lakh rupees, or with both.
 Whoever without permission of the owner of the computer :-
• Secures Access, Downloads, Copies or extract any data, computer
database or any information;
• Introduce or causes to be introduce any Virus Contaminant
Shall be liable to pay damages by way of compensation not exceeding one crore rupees to the
person so affected.
Information Technology Amendment Act, 2008
 Section – 43,
 Destroys, Deletes or Alters any Information residing in a computer
resource or diminishes its value or utility or affects it injuriously by any
means.
 Steals, conceals, destroys or alters any computer source
code with an intention to cause damage;
 Punishment for sending offensive messages through
communication service, etc.
 Punishment for identity theft
 Punishment for cheating by personation by using computer
resource
 Punishment for violation of privacy.
Arrest And Reports For Cyber Crime in India
o Under the IPC, 356 cybercrime cases were registered in 2010 (276
cases in 2009)
o Geographic breakdown of cases reported
o 104 from Maharashtra
o 66 Andhra Pradesh
o 46 Chhattisgarh
o The majority of these crimes were either forgery or fraud cases.
 Under the ITAct, 966 cybercrime cases were filed in 2010
420 in 2009).
 233 persons were arrested in 2010.
 33% of the cases registered were related to hacking
How to Tackle Such activity??? ?
An important question arises that how can these crimes be prevented. A number of
techniques and solutions have been presented but the problems still exists and are
increasing day by day.
Antivirus And Anti Spyware Software:
Аntivirus software consists of computer programs that attempt to identify,
thwart and eliminate computer viruses and other malicious software.
Anti spywares are used to restrict backdoor program, trojans and
other spywares to be installed on the computer.
Firewalls:
protects a computer network from unauthorized access.
may be hardware devices, software programs, or a combination of the two.
typically guards an internal computer network against malicious access
from outside the network.
Cryptography:
Cryptography is the science of encrypting and decrypting information.
Encryption is like sending a postal mail to another party with a lock code on
the envelope which is known only to the sender and the recipient. A number
of cryptographic methods have been developed and some of them are still
not cracked.
Cyber Ethics and Laws:
Cyber ethics and cyber laws are also being formulated to stop cyber crimes.
Security Software like Anti Viruses and Anti SpyWares should be installed on
all computers.
Internet Service Providers should also provide high level of security at their
servers.
The Future of Cyber-Crimes in India
Continued Website Hacks and Defacements
Data and Information theft
Increasing phishing attacks on Ecommerce and Financial
Websites
Cybercriminals targeting Social and Professional
Networks
Threats directed at the Mobile Platform: Smartphones and
Tablets
Conclusion:-
Indian Laws are well drafted and are capable of handling all
kinds of challenges as posed by cyber criminals. However,
the enforcement agencies are required to be well versed
with the changing technologies and Laws.”
As internet technology advances so does the threat of
cyber crime. In times like these we must protect ourselves
from cyber crime. Anti-virus software, firewalls and security
patches are just the beginning. Never open suspicious e-
mails and only navigate to trusted sites.”
Cyber Crime and Laws

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Cyber Crime and Laws

  • 1.
  • 2. What is Crime??? ? An action or omission that constitutes an offense that may be prosecuted by the state and is punishable by law. The greatest crimes do not arise from a want of feeling for others but from an over sensibility for ourselves and an over indulgence in our own desires.
  • 3. What is Cyber Crime??? ? Crime committed using a computer and the internet to steal a person's identity or sell contraband or stalk victims or disrupt operations with malevolent programs.. Cyber Crime is emerging as a serious threat. Threatening Email, Assuming someone's Identity, Sexual Harassment, Defamation, Spam and Phishing are some examples where computers are used to commit crime. Viruses, Worms and Industrial Espionage, Software Piracy and Hacking are examples where computers become target of crime.
  • 4. Cyber Crime Variants  Hacking  "Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 percent increase this year.  Hacker  Hacker (programmer subculture), who combines excellence, playfulness, cleverness and exploration in performed activities.  Kevin David Mitnick is first hacker.
  • 5. Cyber Squatting :-  Cyber Squatting is the act of registering a famous Domain Name and then selling it for a fortune.  Phishing :-  Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money.  Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason.
  • 6.  The fraudster then has access to the customer's online bank account and to the funds contained in that account.
  • 7. How it Works ??? ?
  • 8. Cyber Stalking :-  Cyber Stalking is use of the Internet or other electronic means to stalk someone.  This term is used interchangeably with online harassment and online abuse.  Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property.
  • 9. Vishing :-  Vishing is the criminal practice of using social engineering and Voice over IP (VoIP) to gain access to private personal and financial information from the public for the purpose of financial reward.  The term is a combination of “Voice" and phishing.  Vishing exploits the public's trust via landline telephone services.  Vishing is typically used to steal credit card numbers or other information used in identity theft schemes from individuals.
  • 10. Indian Crime Scene  The major Cyber Crimes reported, in India, are Denial of Services, Defacement of Websites, Spam, Computer Virus and Worms, Pornography, Cyber Squatting, Cyber Stalking and Phishing.  Given the fact that nearly $ 120 million worth of Mobiles are being lost or stolen in the country every year.  Nearly 69 per cent of information theft is carried out by current and ex-employees and 31 per cent by hackers.
  • 11. Top Countries in Cyber Crime :- India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the Global Cyber Crime.
  • 12. Why India??? ?  121 Million Internet Users  65 Million Active Internet Users, up by 28% from 51 million in 2010  50 Million users shop online on Ecommerce and Online Shopping Sites  46+ Million Social Network Users  346 million mobile users had subscribed to Data Packages. A rapidly growing online user base
  • 13. The majority of cybercrimes are centered on forgery, fraud and Phishing, India is the third-most targeted country for Phishing attacks after the US and the UK, Social networks as well as ecommerce sites are major targets, 6.9 million bot-infected systems in 2010, 14,348 website defacements in 2010. 6,850 .in and 4,150 .com domains were defaced during 2011, 15,000 sites hacked in 2011, India is the number 1 country in the world for generating spam.
  • 14. The police have recorded 3,038 cases but made only 2,700 arrests in 3 years (between 2007 and 2010). India registered only 1,350 cases under the IT Act and IPC in 2010 50% of cybercrimes are not even reported.
  • 15. Cyber Laws in India The Information Technology Act, 2000 CHAPTER XI – OFFENCES – 66. Hacking with computer system  Whoever with the Intent to cause Wrongful Loss or Damage to the public or any person Destroys or Deletes or Alters any Information Residing in Computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack  Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.  Whoever without permission of the owner of the computer :- • Secures Access, Downloads, Copies or extract any data, computer database or any information; • Introduce or causes to be introduce any Virus Contaminant Shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected.
  • 16. Information Technology Amendment Act, 2008  Section – 43,  Destroys, Deletes or Alters any Information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means.  Steals, conceals, destroys or alters any computer source code with an intention to cause damage;  Punishment for sending offensive messages through communication service, etc.  Punishment for identity theft  Punishment for cheating by personation by using computer resource  Punishment for violation of privacy.
  • 17. Arrest And Reports For Cyber Crime in India o Under the IPC, 356 cybercrime cases were registered in 2010 (276 cases in 2009) o Geographic breakdown of cases reported o 104 from Maharashtra o 66 Andhra Pradesh o 46 Chhattisgarh o The majority of these crimes were either forgery or fraud cases.  Under the ITAct, 966 cybercrime cases were filed in 2010 420 in 2009).  233 persons were arrested in 2010.  33% of the cases registered were related to hacking
  • 18. How to Tackle Such activity??? ? An important question arises that how can these crimes be prevented. A number of techniques and solutions have been presented but the problems still exists and are increasing day by day. Antivirus And Anti Spyware Software: Аntivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software. Anti spywares are used to restrict backdoor program, trojans and other spywares to be installed on the computer. Firewalls: protects a computer network from unauthorized access. may be hardware devices, software programs, or a combination of the two. typically guards an internal computer network against malicious access from outside the network.
  • 19. Cryptography: Cryptography is the science of encrypting and decrypting information. Encryption is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender and the recipient. A number of cryptographic methods have been developed and some of them are still not cracked. Cyber Ethics and Laws: Cyber ethics and cyber laws are also being formulated to stop cyber crimes. Security Software like Anti Viruses and Anti SpyWares should be installed on all computers. Internet Service Providers should also provide high level of security at their servers.
  • 20. The Future of Cyber-Crimes in India Continued Website Hacks and Defacements Data and Information theft Increasing phishing attacks on Ecommerce and Financial Websites Cybercriminals targeting Social and Professional Networks Threats directed at the Mobile Platform: Smartphones and Tablets
  • 21. Conclusion:- Indian Laws are well drafted and are capable of handling all kinds of challenges as posed by cyber criminals. However, the enforcement agencies are required to be well versed with the changing technologies and Laws.” As internet technology advances so does the threat of cyber crime. In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls and security patches are just the beginning. Never open suspicious e- mails and only navigate to trusted sites.”