SlideShare une entreprise Scribd logo
1  sur  16
B.K. BIRLA INSTITUTE OF ENGINEERING &
TECHNOLOGY
Hemant
10EBKCS021
Contents
 Introduction
 Origination
 Cyber Crime Acts
 Categories
 Methodologies
 Investigation challenges
 IT Act 2000 & IPC
 ITAA 2008
 Case Study of Cyber Crime in INDIA
 Preventions
Introduction
 ‘Cyber crime’ is crime committed over INTERNET. (Oxford
online Reference)
 ‘Cyber crime’ as any crime that is committed by means of
special knowledge or expert use of computer technology.
(Britannica Reference)
 ‘Cyber crime’ can generally defined as a criminal activity in
which information technology systems are the means used for
the commission of the crime.
 A generalized definition of cyber crime may be “unlawful acts
wherein the computer is either a tool or target or both”.
Origination of Cyber crime
 The Cyber crime originated even from the year 1820.
 Joseph-Marie Jacquard, a textile manufacturer in France,
produced the loom. This device allowed the repetition of a
series of steps in the weaving of special fabrics.
 This resulted in a fear amongst Jacquard's employees that their
traditional employment and livelihood were being threatened.
 They committed acts of sabotage to discourage Jacquard from
further use of the new technology.
 This is the first recorded cyber crime.
Cyber Crime Acts
(Govt. of INDIA)
The IT Act provides legal recognition for transactions carried
out by means of electronic data interchange, and other means
of electronic communication, involving the use of alternatives
to paper-based methods of communication and storage of info.
The IT Act facilitates E-filing of documents with the Govt.
agencies.
 Information Technology Act 2000.
 Information Technology Amendment Act 2008.
IT Act 2000
 Based on the UN Gen. Assembly resolution of January 30,1997,
the GOI passed the IT Act 2000 (Act No.21 of 2000) and
notified it on October 17, 2000.
 The IT Act, 2000, is the first step taken by the GOI towards
promoting the growth of the E-commerce and it was enacted
with a view to provide legal recognition to E-commerce and E-
transactions, to facilitate E-governance and prevent computer-
based crimes.
 It is a first historical step.
 The Information Technology Act, 2000, does not define the
term ‘cyber crime’.
ITA Act 2008
 The rapid increase in the use of Internet has led to a spate in
crime like child pornography, cyber terrorism, publishing
sexually explicit content in electronic form and video voyeurism.
 The need for comprehensive amendment was consistently felt
and after IT Amendment Act 2008 was passed.
 It got the President’s assent in February 2009 and was notified
with effect from 27.10.2009.
 It has brought a large number of cyber crimes under the ambit of
the law.
 Some of the significant points in the Amendment Act include
introduction of corporate responsibility for data protection with
the concept of ‘reasonable security practices’ (Sec.43A),
recognition of Computer Emergency Response Team–India
(CERT-In) as the national nodal agency empowered to monitor
and even block web-sites under specific circumstances.
Cyber Crimes - Three categories
 Against Property–
Financial crimes, cheating on-line, illegal funds transfer.
 Against Persons–
On-line harassment, Cyber Stalking, Obscenity.
 Against Nations–
Cyber Terrorism, Damaging critical information infrastructures.
Financial
Crimes
Offensive
Messages
Offensive
Calls
DOS Attack
Internet
violations of
copyrights
Web Page
Hacking
Spam /
Malware /
Espionage
Mobile
device
Attacks
Violations of
Privacy
Social
Engineering
Deceptive
Messages
Cyber
Terrorism
Obscenity &
Pornography
Cyber Crime
Methodologies
Investigation Challenges
 The investigation of Cyber crime is more complex.
 The evidence is often in an intangible form.
 The increased use of Internet has added to this complexity. It
is possible for a person sitting in INDIA to steal a computer
resource in AUSTRALIA using a computer situated in
SOUTH AFRICA as a launch pad for his attack.
 The challenges in such cases are not only technical, but also
jurisdictional.
 Cyber crime being technology driven evolves continuously
and ingeniously making it difficult for investigators to cope
up with changes.
Information Technology Act, 2000 &
Indian Penal Code
Sending threatening message by email Section 506 IPC
Forgery of electronic records Section 465 IPC
Bogus websites, cyber frauds, phishing Section 420 IPC
Email spoofing Sections 465, 419 IPC
Criminal breach of trust Sections 406, 409 IPC
Online sale of Narcotics NDPS Act
Pornography Section 67 of IT Act
Denial of Service Attack Section 43 of IT Act
ITA Act 2008
 66- As proposed in ITAA, 2008, this Section combines
contraventions indicated in Section 43 with penal effect .It also
introduces the pre-conditions of "Dishonesty" and "Fraud" to
the current Section 66.
 66A- Punishment for sending offensive messages through
communication service, etc.
 66B-Punishment for dishonestly receiving stolen computer
resource or communication device.
 66C-Punishment for identity theft.
 66E-Punishment for violation of privacy
 67-Punishment for publishing or transmitting obscene material
in electronic form.
 67A-Punishment for publishing or transmitting of material
containing sexually explicit act, etc., in electronic form.
 67C-Preservation and retention of information by
intermediaries.
 71-Misrepresentation to the Controller or the Certifying
Authority.
 73-Publishing Digital Signature Certificate false in certain
particulars.
 74-Creation, publication or otherwise making available a
Digital Signature Certificate for any fraudulent or unlawful
purpose.
Case Study of Cyber Crime in INDIA
Cases Registered Person Arrested
2008 2009 2010 2011 2008 2009 2010 2011
288 420 966 1791 154 178 288 1184
Preventions
 Use latest and updated anti virus software to guard against virus
attacks.
 Never send your credit card number to any site that is not secured, to
guard against frauds.
 Use of firewalls may be beneficial.
 Web servers running public sites must be physically separate protected
from internal corporate network.
 In respect of using mobile phones, the public should not be carried
away by S.M.S. messages offering attractive gifts and thereby
inducing to part with huge amounts.
 Choose strong passwords and keep them safe.
 Review bank and credit card statements regularly.
Cyber crime p pt

Contenu connexe

Tendances

Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Cybersquattingand its remedies
Cybersquattingand its remediesCybersquattingand its remedies
Cybersquattingand its remediesAltacit Global
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRALRahul Gurnani
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Karnika Seth
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issuesatuljaybhaye
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Dr. Prashant Vats
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceatuljaybhaye
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspaceRistya Anditha
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 

Tendances (20)

Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cybersquattingand its remedies
Cybersquattingand its remediesCybersquattingand its remedies
Cybersquattingand its remedies
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
 
Jurisdiction issues in cyberspace
Jurisdiction issues in cyberspaceJurisdiction issues in cyberspace
Jurisdiction issues in cyberspace
 
Intellectual property rights in cyberspace
Intellectual property rights in cyberspaceIntellectual property rights in cyberspace
Intellectual property rights in cyberspace
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
it act 2000
it act 2000it act 2000
it act 2000
 

En vedette

Custora E-Commerce Pulse Holidata 2015 Recap
Custora E-Commerce Pulse Holidata 2015 RecapCustora E-Commerce Pulse Holidata 2015 Recap
Custora E-Commerce Pulse Holidata 2015 RecapMichael Baumgarten
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedVidaB
 
Magnetic stripe on the back of credit card
Magnetic stripe on the back of credit cardMagnetic stripe on the back of credit card
Magnetic stripe on the back of credit cardSudhanshu Rathore
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
ATM Fraud - Ignite Style
ATM Fraud - Ignite StyleATM Fraud - Ignite Style
ATM Fraud - Ignite StyleShane Curtin
 
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Jyotindra Zaveri
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000Vijay Dalmia
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000Onkar Sule
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000Amlin David
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 

En vedette (19)

Custora E-Commerce Pulse Holidata 2015 Recap
Custora E-Commerce Pulse Holidata 2015 RecapCustora E-Commerce Pulse Holidata 2015 Recap
Custora E-Commerce Pulse Holidata 2015 Recap
 
E commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B AhmedE commerce fraud chapter 17 B Ahmed
E commerce fraud chapter 17 B Ahmed
 
Magnetic stripe on the back of credit card
Magnetic stripe on the back of credit cardMagnetic stripe on the back of credit card
Magnetic stripe on the back of credit card
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
ATM Fraud - Ignite Style
ATM Fraud - Ignite StyleATM Fraud - Ignite Style
ATM Fraud - Ignite Style
 
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000
 
Information Technology Act 2000
Information Technology Act 2000Information Technology Act 2000
Information Technology Act 2000
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Mobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessmentMobile Payment fraud & risk assessment
Mobile Payment fraud & risk assessment
 

Similaire à Cyber crime p pt

cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdfkratoskkd
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
cyber crime
cyber crimecyber crime
cyber crimeMukund10
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 

Similaire à Cyber crime p pt (20)

Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
cyber law its need importance.pdf
cyber law its need importance.pdfcyber law its need importance.pdf
cyber law its need importance.pdf
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
English in written
English in writtenEnglish in written
English in written
 
Business law
Business lawBusiness law
Business law
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
IT ACT-OVERVIEW
IT ACT-OVERVIEWIT ACT-OVERVIEW
IT ACT-OVERVIEW
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Dernier

BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxNiranjanYadav41
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptbibisarnayak0
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxachiever3003
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Cooling Tower SERD pH drop issue (11 April 2024) .pptx
Cooling Tower SERD pH drop issue (11 April 2024) .pptxCooling Tower SERD pH drop issue (11 April 2024) .pptx
Cooling Tower SERD pH drop issue (11 April 2024) .pptxmamansuratman0253
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 

Dernier (20)

Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptx
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.ppt
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptx
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Cooling Tower SERD pH drop issue (11 April 2024) .pptx
Cooling Tower SERD pH drop issue (11 April 2024) .pptxCooling Tower SERD pH drop issue (11 April 2024) .pptx
Cooling Tower SERD pH drop issue (11 April 2024) .pptx
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 

Cyber crime p pt

  • 1. B.K. BIRLA INSTITUTE OF ENGINEERING & TECHNOLOGY Hemant 10EBKCS021
  • 2. Contents  Introduction  Origination  Cyber Crime Acts  Categories  Methodologies  Investigation challenges  IT Act 2000 & IPC  ITAA 2008  Case Study of Cyber Crime in INDIA  Preventions
  • 3. Introduction  ‘Cyber crime’ is crime committed over INTERNET. (Oxford online Reference)  ‘Cyber crime’ as any crime that is committed by means of special knowledge or expert use of computer technology. (Britannica Reference)  ‘Cyber crime’ can generally defined as a criminal activity in which information technology systems are the means used for the commission of the crime.  A generalized definition of cyber crime may be “unlawful acts wherein the computer is either a tool or target or both”.
  • 4. Origination of Cyber crime  The Cyber crime originated even from the year 1820.  Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics.  This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened.  They committed acts of sabotage to discourage Jacquard from further use of the new technology.  This is the first recorded cyber crime.
  • 5. Cyber Crime Acts (Govt. of INDIA) The IT Act provides legal recognition for transactions carried out by means of electronic data interchange, and other means of electronic communication, involving the use of alternatives to paper-based methods of communication and storage of info. The IT Act facilitates E-filing of documents with the Govt. agencies.  Information Technology Act 2000.  Information Technology Amendment Act 2008.
  • 6. IT Act 2000  Based on the UN Gen. Assembly resolution of January 30,1997, the GOI passed the IT Act 2000 (Act No.21 of 2000) and notified it on October 17, 2000.  The IT Act, 2000, is the first step taken by the GOI towards promoting the growth of the E-commerce and it was enacted with a view to provide legal recognition to E-commerce and E- transactions, to facilitate E-governance and prevent computer- based crimes.  It is a first historical step.  The Information Technology Act, 2000, does not define the term ‘cyber crime’.
  • 7. ITA Act 2008  The rapid increase in the use of Internet has led to a spate in crime like child pornography, cyber terrorism, publishing sexually explicit content in electronic form and video voyeurism.  The need for comprehensive amendment was consistently felt and after IT Amendment Act 2008 was passed.  It got the President’s assent in February 2009 and was notified with effect from 27.10.2009.  It has brought a large number of cyber crimes under the ambit of the law.  Some of the significant points in the Amendment Act include introduction of corporate responsibility for data protection with the concept of ‘reasonable security practices’ (Sec.43A), recognition of Computer Emergency Response Team–India (CERT-In) as the national nodal agency empowered to monitor and even block web-sites under specific circumstances.
  • 8. Cyber Crimes - Three categories  Against Property– Financial crimes, cheating on-line, illegal funds transfer.  Against Persons– On-line harassment, Cyber Stalking, Obscenity.  Against Nations– Cyber Terrorism, Damaging critical information infrastructures.
  • 9. Financial Crimes Offensive Messages Offensive Calls DOS Attack Internet violations of copyrights Web Page Hacking Spam / Malware / Espionage Mobile device Attacks Violations of Privacy Social Engineering Deceptive Messages Cyber Terrorism Obscenity & Pornography Cyber Crime Methodologies
  • 10. Investigation Challenges  The investigation of Cyber crime is more complex.  The evidence is often in an intangible form.  The increased use of Internet has added to this complexity. It is possible for a person sitting in INDIA to steal a computer resource in AUSTRALIA using a computer situated in SOUTH AFRICA as a launch pad for his attack.  The challenges in such cases are not only technical, but also jurisdictional.  Cyber crime being technology driven evolves continuously and ingeniously making it difficult for investigators to cope up with changes.
  • 11. Information Technology Act, 2000 & Indian Penal Code Sending threatening message by email Section 506 IPC Forgery of electronic records Section 465 IPC Bogus websites, cyber frauds, phishing Section 420 IPC Email spoofing Sections 465, 419 IPC Criminal breach of trust Sections 406, 409 IPC Online sale of Narcotics NDPS Act Pornography Section 67 of IT Act Denial of Service Attack Section 43 of IT Act
  • 12. ITA Act 2008  66- As proposed in ITAA, 2008, this Section combines contraventions indicated in Section 43 with penal effect .It also introduces the pre-conditions of "Dishonesty" and "Fraud" to the current Section 66.  66A- Punishment for sending offensive messages through communication service, etc.  66B-Punishment for dishonestly receiving stolen computer resource or communication device.  66C-Punishment for identity theft.  66E-Punishment for violation of privacy  67-Punishment for publishing or transmitting obscene material in electronic form.
  • 13.  67A-Punishment for publishing or transmitting of material containing sexually explicit act, etc., in electronic form.  67C-Preservation and retention of information by intermediaries.  71-Misrepresentation to the Controller or the Certifying Authority.  73-Publishing Digital Signature Certificate false in certain particulars.  74-Creation, publication or otherwise making available a Digital Signature Certificate for any fraudulent or unlawful purpose.
  • 14. Case Study of Cyber Crime in INDIA Cases Registered Person Arrested 2008 2009 2010 2011 2008 2009 2010 2011 288 420 966 1791 154 178 288 1184
  • 15. Preventions  Use latest and updated anti virus software to guard against virus attacks.  Never send your credit card number to any site that is not secured, to guard against frauds.  Use of firewalls may be beneficial.  Web servers running public sites must be physically separate protected from internal corporate network.  In respect of using mobile phones, the public should not be carried away by S.M.S. messages offering attractive gifts and thereby inducing to part with huge amounts.  Choose strong passwords and keep them safe.  Review bank and credit card statements regularly.