2. WHAT IS CYBER CRIMEWHAT IS CYBER CRIME
COMPUTER CRIMECOMPUTER CRIME
refers to any crimerefers to any crime
that involves athat involves a
computer and acomputer and a
network where thenetwork where the
computers may or maycomputers may or may
not have played annot have played an
instrumental part ininstrumental part in
the commission of athe commission of a
crime.crime.
3. DEFINITION(CONT)DEFINITION(CONT)
A computer can be a source of evidence.A computer can be a source of evidence.
Even though the computer is not directlyEven though the computer is not directly
used for criminal purposes. It is anused for criminal purposes. It is an
excellent device for record keeping , andexcellent device for record keeping , and
can be of great value to criminalcan be of great value to criminal
investigationsinvestigations
Technological advancements have createdTechnological advancements have created
new possibilities for criminal activity innew possibilities for criminal activity in
particular the criminal misuse ofparticular the criminal misuse of
information technologies.information technologies.
4. TYPES OF CRIMETYPES OF CRIME
1. Unauthorized access and hacking1. Unauthorized access and hacking
It means any kind of access without the permission of eitherIt means any kind of access without the permission of either
the rightful owner or the person in charge of a computer ,the rightful owner or the person in charge of a computer ,
computer system , computer network.computer system , computer network.
2. Trojan attack2. Trojan attack
The program that act like something useful but do the thingsThe program that act like something useful but do the things
that are quiet damaging . The programs of this kind arethat are quiet damaging . The programs of this kind are
called as Trojanscalled as Trojans
the name Trojan is very popularthe name Trojan is very popular
5. TYPES (CONT.)TYPES (CONT.)
3.3. Virus and worm attackVirus and worm attack
A program that has capability to inject other programsA program that has capability to inject other programs
and make copies of itself and spread into other programs isand make copies of itself and spread into other programs is
called virus.called virus.
4.4. E-mail and IRL related crimesE-mail and IRL related crimes
(i) Email spoofing(i) Email spoofing
It refers to email that appears to have been originated fromIt refers to email that appears to have been originated from
one source when it was actually sent from another sourceone source when it was actually sent from another source
6. TYPES (CONT.)TYPES (CONT.)
(ii) Email spamming(ii) Email spamming
It refers to sending email to thousands and thousands ofIt refers to sending email to thousands and thousands of
users similar to a chain letterusers similar to a chain letter
(iii) Sending malicious order through email(iii) Sending malicious order through email
Emails are used to send virus Trojan etc through emails asEmails are used to send virus Trojan etc through emails as
an attachmentan attachment
Email bombingEmail bombing
(iv)(iv) It is characterized by abuses repeatedly sending an identicalIt is characterized by abuses repeatedly sending an identical
email message to a particular addressemail message to a particular address
7. TYPES (CONTD)TYPES (CONTD)
(v)(v) Sending threatening emailsSending threatening emails
(vi) Defamatory emails(vi) Defamatory emails
(vii) Email frauds(vii) Email frauds
(viii) IRC related(viii) IRC related
5. Denial of service attack5. Denial of service attack
flooding a computer resource with more requestsflooding a computer resource with more requests thanthan
it can handle. This causes the resourceit can handle. This causes the resource to crash therebyto crash thereby
denying access of service to authorized users.denying access of service to authorized users.
8. TYPES(CONT)TYPES(CONT)
6.6. ForgeryForgery
Counterfeit currency notes postage and revenue stampsCounterfeit currency notes postage and revenue stamps
mark sheets etc can be forged using sophisticatedmark sheets etc can be forged using sophisticated
computers printers and scannerscomputers printers and scanners
7.7. IPR violationsIPR violations
These include software piracy copyright infringementThese include software piracy copyright infringement
trademark violation theft of computer source code etc.trademark violation theft of computer source code etc.
9. TYPES (CONT)TYPES (CONT)
8. Cyber terrorism8. Cyber terrorism
Targeted attacks on militaryTargeted attacks on military
installations, power plants, air traffic control, banks,installations, power plants, air traffic control, banks,
telecommunications networks are the most likely targets.telecommunications networks are the most likely targets.
99.. Banking/Credit card related crimesBanking/Credit card related crimes
Use of stolen card information or fake credit/debit cards areUse of stolen card information or fake credit/debit cards are
common.common.
1010.. Theft of Internet hoursTheft of Internet hours
Unauthorized use of internet hours paid for by anotherUnauthorized use of internet hours paid for by another
person.person.
10. TYPES (CONT)TYPES (CONT)
11. Defamation11. Defamation
When someone publishes defamatory matter about someoneWhen someone publishes defamatory matter about someone
on a website or sends e-mails containing defamatoryon a website or sends e-mails containing defamatory
information to all of that persons friends.information to all of that persons friends.
12. Cyber stalking12. Cyber stalking
It involves following a persons movement across the internetIt involves following a persons movement across the internet
by posting messages on the bulletins board frequented by theby posting messages on the bulletins board frequented by the
victim , constantly bombarding the victim with emails etcvictim , constantly bombarding the victim with emails etc
13. Identity theft13. Identity theft
It occurs when someone appropriates another’s personalIt occurs when someone appropriates another’s personal
information without their knowledge to commit theft.information without their knowledge to commit theft.
11. IT ACT OF INDIA 2000IT ACT OF INDIA 2000
In May 2000 both the houses of the Indian Parliament passedIn May 2000 both the houses of the Indian Parliament passed
the Information Technology Bill.the Information Technology Bill.
This act deals with the various cyber crimes in Chapter IX andThis act deals with the various cyber crimes in Chapter IX and
XI, Sections 43 in particular deals with the unauthorizedXI, Sections 43 in particular deals with the unauthorized
access, unauthorized downloading, virus attacks, denial ofaccess, unauthorized downloading, virus attacks, denial of
access, distributions. This section provide for a fine up to Rs.access, distributions. This section provide for a fine up to Rs.
one crore by way of remedy. Sec 65 deals with tampering withone crore by way of remedy. Sec 65 deals with tampering with
computer source documents and provides for imprisonmentcomputer source documents and provides for imprisonment
upto 3 years or fine which may extend upto 2 years or both.upto 3 years or fine which may extend upto 2 years or both.
Section 66 deals with hacking with computer system andSection 66 deals with hacking with computer system and
provides for imprisonment upto 3 years or fine which mayprovides for imprisonment upto 3 years or fine which may
extend upto 2 years or both.extend upto 2 years or both.
12. PREVENTION OF CYBER CRIMEPREVENTION OF CYBER CRIME
Prevention is better than cure. It is always better to takePrevention is better than cure. It is always better to take
certain precaution while operating the net. One should keep incertain precaution while operating the net. One should keep in
mind the following:-mind the following:-
1. To prevent cyber stalking avoid disclosing any information1. To prevent cyber stalking avoid disclosing any information
pertaining to oneself.pertaining to oneself.
2. Always use latest and update antivirus software to guard2. Always use latest and update antivirus software to guard
against virus attacks.against virus attacks.
3. Always avoid sending any photograph online particularly to3. Always avoid sending any photograph online particularly to
strangers and chat friends.strangers and chat friends.
4. Never send your credit card numbers to any site that is not4. Never send your credit card numbers to any site that is not
secured to guard against frauds.secured to guard against frauds.
5. Use of firewalls may be beneficial.5. Use of firewalls may be beneficial.
13. PREVENTION (CONT)PREVENTION (CONT)
6. Always keep a watch on the sides that your children are6. Always keep a watch on the sides that your children are
accessing to prevent any kind of harrassmentaccessing to prevent any kind of harrassment
7. It is better to use a security programme that gives7. It is better to use a security programme that gives
control over the cookies.control over the cookies.
14. CONCLUSIONCONCLUSION
Capacity of human mind is unfathomable.Capacity of human mind is unfathomable.
It is not possible to eliminate cyber crimeIt is not possible to eliminate cyber crime
from the cyber space. The only possiblefrom the cyber space. The only possible
step is to make people aware of their rightsstep is to make people aware of their rights
and duties and further making theand duties and further making the
application of the laws more stringent toapplication of the laws more stringent to
check crime.check crime.