AWS Community Day CPH - Three problems of Terraform
Â
Cyber crime
1. CYBER
CRIME
B Y - M D . A N E E S R A Z A
(D E L H I
U N I V E R S I T Y )
2. Cyber Crime or Computer
Crime refers to any crime that
involves computer and a network.
(a). The computer may have been
used in the commission of a crime
, it may be the target. NETCRIME
refers to criminal exploitation of
the internet.
3. Debarati Halder & Dr.
K.Jaishankar (2011) defines
cybercrimes as: âOffences that are
committed against individuals or groups
of individuals with a criminal motive to
intentionally harm the reputation of the
victim or cause physical or mental harm
to the victim directly or indirectly ,using
modern telecommunication networks
such as internet.
4. Issues surrounding these types of
crimes have become high-profile
,particularly those surrounding
cracking, copyright, infringement, chi
ld pornography and child grooming.
There are also problems of privacy
when confidential information is lost
or intercepted, lawfully or otherwise.
5. CLASSIFICATION:
Computer crime encompasses a broad range of
activities .
Generally, however, it may be divided into two
categories:
(1). Crimes that target computers directly.
(2). Crimes facilitated by computer networks or
devices, the primary target of which is
independent of the computer network or device.
Crimes that primarily target computer networks or
devices include:
âą Computer viruses
âą Denial-of-service attacks
âą Malware (malicious code)
6. Crimes that use computer networks
or devices to advance other ends
include:
* Cyber stalking
* Fraud and Identity theft
* Information Warfare
*Phishing scams
7. (1). SPAM:
Spam, or the unsolicited sending of the bulk email for
commercial purposes, is unlawful in some jurisdictions.
While anti-spam laws are relatively new, limits on
unsolicited electronics communications have existed for
some time.
(2). FRAUD:
Computer fraud is any dishonest misrepresentation
of the fact intended to let another to do or refrain from
doing something which causes loss.
Including Bank fraud, Identity theft, extortion, and
theft of classified information
8. A variety of internet scams target direct to
consumers.
(1) Obscene and offensive content:
The content of websites and the other
electronics communications may be
distasteful, obscene or offensive for a variety of
reasons. In some instances these
communication may be illegal.
One area of Internet pornography that has
been the target of the strongest efforts at
curtailment is child pornography.
9. (2). Harassment:
Whereas content may be offensive in a non-
specific way, harassment directs obscenities and
derogatory comments at specific individuals
focusing for example on
gender, race, religion, nationality, sexual
orientation.
This often occurs in the chat rooms, through
newsgroups, and by sending hate email to
interested parties.(E.g. Cyber bullying, Cyber
stalking, Hate Crime, and Stalking)
10. (3). Drug Trafficking:
Drug traffickers are increasingly taking
advantage of the Internet to sell their illegal
substances through encrypted e-mail and other
internet technology.
(4). Cyber terrorism:
Cyber terrorism Is the use of internet based
attacks in terrorists activities, including acts of
deliberate, large- scale disruption of computer
networks, especially of personal computers
attached to the Internet, by the means of tools
such as computer viruses.
11. CYBER LAW:
Cyber law is a term use
to describe the legal
issues related to use of
communication
technology, particularly
cyber space, i.e. Internet.
Cyber law is an
attempt to apply laws
designed for the physical
world to human activities
on the internet.
12. IT ACT:
An act to provide legal recognition for the
transaction carried out by means of
electronics data interchange and other means
of electronics communication, commonly
referred to as âelectronics commerceâ.
14. Rs. 24 crore cyber theft
(a). Theft of Rs.24 crore from the YES
Bank account of RPG Group.
(b). Cops recovered more than half of
the stolen amount.
(c). Police arrested 13 persons from
Chennai and Delhi.
15. TRAILS
(a). Hackers operating from two Wi-Fi
connections in Delhi allegedly stole the
amount on may 11,2013.
(b). The money was deposited in 12 bank
accounts across the country.
(c). In June, Police located the address where
the IP address originated , but it turned out
false.
16. IT ACT APPLICABLE &
PUNISHMENT
(a). Section 66D Punishment for cheating by
personation by using computer resource are
applicable.
(b). Section 415 & 420 of IPC are applicable for
cheating and theft.
(c). Punished with imprisonment of either
description for a term which may extended to
three years and also be liable to fine which
may be extended to 1 lakh rupees.