3. What is cyber crime ??
Cyber crime is a generic term that
refers to all criminal activities done
using the medium of computers, the
Internet, cyber space and the
worldwide web.
4. Cyber law
• Cyber law is a term used to describe the
legal issues related to use of
communications technology, particularly
“cyberspace”, i.e. the Internet.
• Cyber law is an attempt to apply laws
designed for the physical world, to
human activity on the Internet.
7. • e.g. Hacking, Virus/Worm attacks,
DOS attack etc.
1. The Computer
as a Target :-using
a computer to
attack other
computers.
• e.g. Cyber Terrorism, IPR violations,
Credit card frauds, EFT frauds,
Pornography etc.
2. The computer
as a weapon :-
using a computer
to commit real
world crimes.
We can categorize Cyber crimes in two ways
14. 1. Hacking
• Hacking is the unauthorized access to a
computer system, programs, data and
network resources.
15. Law & Punishment
• Under Information Technology (Amendment)
Act, 2008, Section 43(a) read with section 66
is applicable and Section 379 & 406 of Indian
Penal Code, 1860 also are applicable.
• If crime is proved under IT Act, accused shall
be punished for imprisonment, which may
extend to three years or with fine, which may
extend to five lacs rupees or both.
16. 2. Data theft
If any person without permission of the
owner or any other person, who is in charge
of a computer, computer system of computer
network - downloads, copies or extracts any
data, computer data base or information
from such computer, computer system or
computer network including information or
data held or stored in any removable storage
medium, then it is data theft.
17. Law & Punishment
Under Information Technology (Amendment)
Act, 2008, Section 43(b) read with Section 66
is applicable and under Section 379, 405 &
420 of Indian Penal Code, 1860 also
applicable.
18. 3. Spreading Virus or Worms
• Viruses can do any amount of damage, the creator
intends them to do.
• They can send your data to a third party and then
delete your data from your computer.
• They can also ruin/mess up your system and render it
unusable without a re-installation of the operating
system.
• Usually the virus will install files on your system and
then will change your system so that virus program is
run every time you start your system.
• It will then attempt to replicate itself by sending itself
to other potential victims.
19. Law & Punishment
Under Information Technology (Amendment)
Act, 2008, Section 43(c) & 43(e) read with
Section 66 is applicable and under Section
268 of Indian Penal Code, 1860 also
applicable.
20. 4. Identity Theft
Identity theft is a form of fraud or cheating of
another person’s identity in which someone
pretends to be someone else by assuming
that person’s identity, typically in order to
access resources or obtain credit and other
benefits in that person’s name.
21. Law & Punishment
• Under Information Technology (Amendment)
Act, 2008, Section 66-C and Section 419 of
Indian Penal Code, 1860 also applicable.
22. 5. E-Mail Spoofing
• A spoof email is one that appears to originate
from one source but actually has been sent
from another source.
• Hackers use this method to disguise the actual
email address from which phishing and spam
messages are sent and often use email
spoofing in conjunction with Web page
spoofing to trick users into providing personal
and confidential information.
23. Law & Punishment
• Under Information Technology (Amendment)
Act, 2008, Section 66-C and Section 419 of
Indian Penal Code, 1860 also applicable.
24. 6. Trojan Attack
• The program that act like something useful
but do the things that are quiet damping. The
programs of this kind are called as Trojans.
• The name Trojan Horse is popular.
25. 7. E-mail related crimes
1. Email spoofing
Email spoofing refers to email that appears to have been originated
from one source when it was actually sent from another source.
Please Read
2. Email Spamming
Email "spamming" refers to sending email to thousands and
thousands of users - similar to a chain letter.
3 Sending malicious codes through email
E-mails are used to send viruses, Trojans etc through emails as an
attachment or by sending a link of website which on visiting
downloads malicious code.
4. Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an
identical email message to a particular address.
26. 8. IPR Violations
IPR stands for intellectual proprietary rights.
These include software piracy, copyright
infringement, trademarks violations, theft of
computer source code, patent violations. etc.
27. 9.Data diddling
• Data diddling involves changing data prior or
during input into a computer.
• In other words, information is changed from
the way it should be entered by a person
typing in the data, a virus that changes data,
the programmer of the database or
application, or anyone else involved in the
process of having information stored in a
computer file.
32. Documented cases
• June 2012 LinkedIn and eHarmony had been attacked, compromising 65 million passwords, 30,000
passwords were cracked and 1.5 million EHarmony passwords were posted online.[17]
• December 2012 Wells Fargo website experienced a denial of service attack. Potentially
compromising 70 million customers and 8.5 million active viewers. Other banks thought to be
compromised: Bank of America, J. P. Morgan U.S. Bank, and PNC Financial Services[18]
• In January 2012 Zappos.com experienced a security breach after as many as 24 million customers'
credit card numbers, personal information, billing and shipping addresses had been
compromised.[19] On 2 March 2010, Spanish investigators arrested 3[clarification needed] in infection of
over 13 million computers around the world. The "botnet" of infected computers included PCs
inside more than half of the Fortune 1000 companies and more than 40 major banks, according to
investigators.
• In August 2010 the international investigation Operation Delego, operating under the aegis of
the Department of Homeland Security, shut down the international pedophile ring Dreamboard.
The website had approximately 600 members, and may have distributed up to 123 terabytes of
child pornography (roughly equivalent to 16,000 DVDs). To date this is the single largest U.S.
prosecution of an international child pornography ring; 52 arrests were made worldwide.[23]
• April 23, 2013 saw the Associated Press' Twitter account's hacking to release a hoax tweet about
fictional attacks in the White House that left President Obama injured.[24] This erroneous tweet
resulted in a brief plunge of 130 points from the Dow Jones Industrial Average, removal of $136
billion from S&P 500 index,[25] and the temporary suspension of their Twitter account. The Dow
Jones later restored its session gains.
33. Cyber Security
“Cyber Security” is defined as
protecting information, equipment,
devices computer, computer resource,
communication device and information
stored therein from unauthorized
access, use, disclosure, disruption,
modification or destruction.
34. Safety tips
• Use antivirus software
• Internet firewalls
• Uninstall unnecessary software
• Maintain backup
• Check security settings
• Use good passwords
• Individual awareness