SlideShare ist ein Scribd-Unternehmen logo
1 von 16
TYPES OF CYBER CRIMES
Submitted by – Payal Nagar
What is cyber crime?
 Cyber crime or computer crime means any illegal activity which is commited
using computer or internet and that activity is prohibited under law.
 Cyber crime is defined as a crime in which a computer is the object of the crime
(hacking, phishing, spamming) or is used as a tool to commit an offence (child
pornography, hate crimes).
 After the implementation of IT Act in 2000 onwards cyber crime was prohibited.
Types of cyber crimes -:
 Cyber Stalking
 Pornography
 Hacking and Cracking
 Computer /Cyber Terrorism
Cyber Stalking
 Stalking generally means a harassing behaviour which one person exhibits
towards the others.
 Stalking may comprise of following a person, appearing at a persons home or
place of business, making harassing phone calls, leaving written messages or
objects.
Nature of cyber stalking
 Computer or cyber stalking is one of the very popular means by which the cyber
stalker exploits the internet and the windows operating system in order to
assume control over the computer of the user.
 Email account of the user may also be used as a tool for cyber stalking. Access
to an email account of an innocent user may be gained by the hacker and that
address may be used to send messages that may be threatening or offensive.
 Online stalkers may post insulting messages on electronic bulletin boards signed
with the email address of the person being harassed or statements about the
victim.
Punishment for cyber stalking
 Section 66(A) of Indian Information Technology Act, 2008 penalizes sending false and
offensive messages through communication services.
 Any person who sends, by the means of a computer resource or a communication
devices –
(A) Any information that is grossly effective or has menacing character, or
(B) Any information which he /she knows to be false, but for the purpose of causing
annoyance, inconvenience, danger, obstruction, insult, criminal intimidation, hatred or
ill will, persistently makes by making use of such computer resource or a
communication device,
(C) Any electronic mail or electronic mail messages for the purpose of causing
annoyance or inconvenience or to deceive or to mislead the addressee or recipient
about the origin of such messages,
shall be punishable with imprisonment for a term which may extend to 3 years
with fine.
Pornography
 Cyber Pornography
 Child Pornography
 Cyber pornography is the act of using cyberspace to create, display, distribute,
import or publish pornography or obscene materials, especially materials
depicting children engaged in sexual acts with adults. Cyber pornography is a
criminal offense classified as causing harm to persons.
 Child pornography means to make ,produce, posses, distribute and sale
pornographic materials that exploits minor childs (under the age of 18 ).
Increasingly child pornography laws are being utilized to punish use of
computer technology and the internet to obtain, share and distribute pornography
material involving childrens.
Punishment for cyber pornography
 Under section 67 of the Information Technology Act, 2000 makes the following
acts punishable with imprisonment upto 3 years and fine upto 5 lakhs :
Publication – it includes uploading on website, whats app group or any other
digital portal where third parties can have access to such content.
Transmission – it includes seding obscene photos or images to any person via email,
messaging ,whats app or any other form of digital media.
 Section 67 (A) of the Information Technology Act makes
publication ,transmission and causing to be transmitted and piblished in
electronic form any material containing sexually explicit act or conduct,
punishable with imprisonment upto 5 years and fine upto 10 lakhs.
Hacking and Cracking
 Hacking is the act of finding the possible entry points that exist in a computer system or a
computer network finally entering into them.
 Hacking is usually done to gain unauthorized access to a computer system or
network ,either to harm the system or to steal sensitive information available on the
computer.
 Cracking on the other hand is a kind of hacking in which the person who cracks the security
of the computer can download the information along with that it can modify the data
also.
Types of hacking
 Website Hacking-: Hacking a website means taking control over a web server
and its associated software.
 Network Hacking-: Hacking a network means gathering information about a
network by using tools like telnet, ping, tracert etc with intent to harm the
network system and hamper its operation.
 Email Hacking-: It includes getting unauthorized access on an email account
and using it without the consent ot its owner.
 Password Hacking-: This is the process of recovering secret passwords from
data that has been stored in or transmitted by a computer system.
 Computer Hacking-:This is the process of stealing computer ID and password
by applying hacking methods and getting unauthorized access to computer
system.
 Ethical Hacking-:Ethical hacking involves finding weaknesses in a computer or
network system for testing purpose anf finally getting them fixed. Ethical
hacking is legal in india.
Punishment for Hacking
 Chapter Xl Section 66 of IT ACT, 2000 particularly deals with the act of hacking.
 Section 66(1) defines a hack as any person, dishonestly or fraudulently does any
act referred to in section 43 is called hacking and, section 66(2) prescribes the
punishment for it. Hacking is punishable offense in India with imprisonment
upto 3 years, or with fine upto 2 lakh rupees or both.
 Chapter Xl Section 43 of IT ACT, 2000 prescribes a penalty for the damage to
computer or computer system.
 Chapter Xl Section 65 of the said act makes tampering with computer source
documents an offence.
Cyber Terrorism
Cyber terrorism means doing unlawful things, through internet for political purposes to
create hate in minds of people. It is any act which is done through cyberspace to create
a threat in the minds of people or to breach the sovereignty, unity, or integrity of a
country, or to provoke people or group of the people against the government.
Punishment for cyber terrorism
 Section 66 (f) provides punishment for cyber terrorism . Whoever -
(A) With intent to threaten the unity, integrity, security or sovereignty of India or to strike terror
in people or any section of the people by-
(i) Denying or cause the denial of access to any person authorized to access computer
resource or,
(B) Knowingly or intentionally gaining access to any computer resource and revealing the
restricted information which may be used to cause injury to the intrests of the integrity of India,
security of the state, friendly relations with foreign states, public order and decency or morality
of the country.
Whoever commits or conspires to commit cyber terrorism or above mentioned acts shall be
punishable with imprisonment which may extend to imprisonment for life.
Some more computer crimes are-:
 Spoofing
A Spoofing attack is a situation in which a person or program successfully
masquerades (mask) as another by falsifying data, to gain Iligitimate advantage.
• Email address spoofing
• IP address spoofing
 Phishing
Phishing is the fraudulent attempt to obtain sensitive information such as
username, passwords or credit card details, often for malicious reasons.
Phishing is typically carried out by email spoofing or instant messaging and it often
directs users to enter personal information at a fake website, which looks like the
ligitimate site, the only difference being the URL of the website in concern.
 Email bombing
No. of mails (around 1000) at a time are send continuously at someones computers
system or server, so that traffic can be created. Due to this the authorized person
not be able to reach the real information. It is also a kind of Denial of Service attack
(DOS).

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 

Ähnlich wie Types of Cyber Crimes

cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 

Ähnlich wie Types of Cyber Crimes (20)

cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 

Mehr von DINESH KAMBLE

Mehr von DINESH KAMBLE (10)

Cyber investigation Protocol
Cyber investigation ProtocolCyber investigation Protocol
Cyber investigation Protocol
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Fundamental of computer hardware
Fundamental of computer hardwareFundamental of computer hardware
Fundamental of computer hardware
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Memory
MemoryMemory
Memory
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
CHA & LBA Addressing
CHA & LBA Addressing  CHA & LBA Addressing
CHA & LBA Addressing
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 

Kürzlich hochgeladen

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 

Kürzlich hochgeladen (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

Types of Cyber Crimes

  • 1. TYPES OF CYBER CRIMES Submitted by – Payal Nagar
  • 2. What is cyber crime?  Cyber crime or computer crime means any illegal activity which is commited using computer or internet and that activity is prohibited under law.  Cyber crime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offence (child pornography, hate crimes).  After the implementation of IT Act in 2000 onwards cyber crime was prohibited.
  • 3. Types of cyber crimes -:  Cyber Stalking  Pornography  Hacking and Cracking  Computer /Cyber Terrorism
  • 4. Cyber Stalking  Stalking generally means a harassing behaviour which one person exhibits towards the others.  Stalking may comprise of following a person, appearing at a persons home or place of business, making harassing phone calls, leaving written messages or objects.
  • 5. Nature of cyber stalking  Computer or cyber stalking is one of the very popular means by which the cyber stalker exploits the internet and the windows operating system in order to assume control over the computer of the user.  Email account of the user may also be used as a tool for cyber stalking. Access to an email account of an innocent user may be gained by the hacker and that address may be used to send messages that may be threatening or offensive.  Online stalkers may post insulting messages on electronic bulletin boards signed with the email address of the person being harassed or statements about the victim.
  • 6. Punishment for cyber stalking  Section 66(A) of Indian Information Technology Act, 2008 penalizes sending false and offensive messages through communication services.  Any person who sends, by the means of a computer resource or a communication devices – (A) Any information that is grossly effective or has menacing character, or (B) Any information which he /she knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, criminal intimidation, hatred or ill will, persistently makes by making use of such computer resource or a communication device, (C) Any electronic mail or electronic mail messages for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages, shall be punishable with imprisonment for a term which may extend to 3 years with fine.
  • 8.  Cyber pornography is the act of using cyberspace to create, display, distribute, import or publish pornography or obscene materials, especially materials depicting children engaged in sexual acts with adults. Cyber pornography is a criminal offense classified as causing harm to persons.  Child pornography means to make ,produce, posses, distribute and sale pornographic materials that exploits minor childs (under the age of 18 ). Increasingly child pornography laws are being utilized to punish use of computer technology and the internet to obtain, share and distribute pornography material involving childrens.
  • 9. Punishment for cyber pornography  Under section 67 of the Information Technology Act, 2000 makes the following acts punishable with imprisonment upto 3 years and fine upto 5 lakhs : Publication – it includes uploading on website, whats app group or any other digital portal where third parties can have access to such content. Transmission – it includes seding obscene photos or images to any person via email, messaging ,whats app or any other form of digital media.  Section 67 (A) of the Information Technology Act makes publication ,transmission and causing to be transmitted and piblished in electronic form any material containing sexually explicit act or conduct, punishable with imprisonment upto 5 years and fine upto 10 lakhs.
  • 10. Hacking and Cracking  Hacking is the act of finding the possible entry points that exist in a computer system or a computer network finally entering into them.  Hacking is usually done to gain unauthorized access to a computer system or network ,either to harm the system or to steal sensitive information available on the computer.  Cracking on the other hand is a kind of hacking in which the person who cracks the security of the computer can download the information along with that it can modify the data also.
  • 11. Types of hacking  Website Hacking-: Hacking a website means taking control over a web server and its associated software.  Network Hacking-: Hacking a network means gathering information about a network by using tools like telnet, ping, tracert etc with intent to harm the network system and hamper its operation.  Email Hacking-: It includes getting unauthorized access on an email account and using it without the consent ot its owner.  Password Hacking-: This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.  Computer Hacking-:This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to computer system.  Ethical Hacking-:Ethical hacking involves finding weaknesses in a computer or network system for testing purpose anf finally getting them fixed. Ethical hacking is legal in india.
  • 12. Punishment for Hacking  Chapter Xl Section 66 of IT ACT, 2000 particularly deals with the act of hacking.  Section 66(1) defines a hack as any person, dishonestly or fraudulently does any act referred to in section 43 is called hacking and, section 66(2) prescribes the punishment for it. Hacking is punishable offense in India with imprisonment upto 3 years, or with fine upto 2 lakh rupees or both.  Chapter Xl Section 43 of IT ACT, 2000 prescribes a penalty for the damage to computer or computer system.  Chapter Xl Section 65 of the said act makes tampering with computer source documents an offence.
  • 13. Cyber Terrorism Cyber terrorism means doing unlawful things, through internet for political purposes to create hate in minds of people. It is any act which is done through cyberspace to create a threat in the minds of people or to breach the sovereignty, unity, or integrity of a country, or to provoke people or group of the people against the government.
  • 14. Punishment for cyber terrorism  Section 66 (f) provides punishment for cyber terrorism . Whoever - (A) With intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in people or any section of the people by- (i) Denying or cause the denial of access to any person authorized to access computer resource or, (B) Knowingly or intentionally gaining access to any computer resource and revealing the restricted information which may be used to cause injury to the intrests of the integrity of India, security of the state, friendly relations with foreign states, public order and decency or morality of the country. Whoever commits or conspires to commit cyber terrorism or above mentioned acts shall be punishable with imprisonment which may extend to imprisonment for life.
  • 15. Some more computer crimes are-:  Spoofing A Spoofing attack is a situation in which a person or program successfully masquerades (mask) as another by falsifying data, to gain Iligitimate advantage. • Email address spoofing • IP address spoofing  Phishing Phishing is the fraudulent attempt to obtain sensitive information such as username, passwords or credit card details, often for malicious reasons. Phishing is typically carried out by email spoofing or instant messaging and it often directs users to enter personal information at a fake website, which looks like the ligitimate site, the only difference being the URL of the website in concern.
  • 16.  Email bombing No. of mails (around 1000) at a time are send continuously at someones computers system or server, so that traffic can be created. Due to this the authorized person not be able to reach the real information. It is also a kind of Denial of Service attack (DOS).