SlideShare une entreprise Scribd logo
1  sur  30
Tuesday, 26 May 2015
Tuesday, 26 May 2015
GROUP
1
Crimes are not to be measured by the issue of events, but
by the bad intensions of men.
The greatest crimes do not arise from a want of feeling for
others but from an over sensibility for ourselves and an over
indulgence in our own desires.
Tuesday, 26 May 2015
CYBER CRIME !!
Theexpression‘Crime’is definedas an act,whichsubjectsthedoerto legalpunishmentor any
offenceagainstmorality,socialorderor anyunjustor shamefulact.The“Offence"is definedin
theCodeof CriminalProcedureto meanas an actor omissionmadepunishablebyanylawfor
thetimebeinginforce.
CyberCrimeis emergingas a seriousthreat.Worldwidegovernments,policedepartmentsand
intelligenceunitshavestartedto react.
Tuesday, 26 May 2015
Cyber Crime is a term used to broadly describe criminal activity in which computers
or computer networks are a tool, a target, or a place of criminal activity and include
everything from electronic cracking to denial of service attacks. It is also used to
include traditional crimes in which computers or networks are used to enable the
illicit activity.
Computer crime mainly consists of unauthorized access to computer systems data
alteration, data destruction, theft of intellectual property. Cyber crime in the context
of national security may involve hacking, traditional espionage, or information
warfare and related activities.
Pornography, Threatening Email, Assuming someone's Identity, Sexual Harassment,
Defamation, Spam and Phishing are some examples where computers are used to
commit crime, whereas Viruses, Worms and Industrial Espionage, Software Piracy
and Hacking are examples where computers become target of crime.
Tuesday, 26 May 2015
Indian Crime Scene
The major Cyber Crimes reported,
in India, are Denial of
Services, Defacement of Websites, Spam,
Computer Virus and Worms, Pornography,
Cyber Squatting, Cyber Stalking and Phishing.
Given the fact that nearly $ 120 million
worth of Mobiles are being lost or stolen in the
country every year, the users have to protect
Information, Contact details and Telephone
numbers as these could be misused. Nearly 69
per cent of information theft is carried out by
current and ex-employees and 31 per cent by
hackers. India has to go a long way in
protecting the vital information.
[3 The Hindu, Saturday, Oct 27, 2007].
Tuesday, 26 May 2015
Cyber Crime Variants
Hacking
"Hacking" is a crime, which entails cracking
systems and gaining unauthorized access to the
data stored in them. Hacking had witnessed a 37
per cent increase this year.
Cyber Squatting
Cyber Squatting is the act of registering a famous
Domain Name and then selling it for a fortune.
This is an issue that has not been tackled in
IT ACT 2000.
Tuesday, 26 May 2015
Phishing is just one of the many frauds on
the Internet, trying to fool people into
parting with their money. Phishing refers to
the receipt of unsolicited emails by
customers of Financial Institutions,
requesting them to enter their Username,
Password or other personal information to
access their Account for some reason.
The fraudster then has access to the
customer's online bank account and to the
funds contained in that account.
Tuesday, 26 May 2015
Cyber Stalking is use of the Internet or other
electronic means to stalk someone. This
term is used interchangeably with online
harassment and online abuse. Stalking
generally involves harassing or threatening
behaviour that an individual engages in
repeatedly, such as following a person,
appearing at a person's home or place of
business, making harassing phone calls,
leaving written messages or objects, or
vandalizing a person's property.
Tuesday, 26 May 2015
Vishingis thecriminalpracticeof usingsocial
engineeringandVoiceoverIP (VoIP)to gainaccessto
privatepersonalandfinancialinformationfromthe
publicfor thepurposeof financialreward.Thetermis a
combinationof“Voice"andphishing.Vishingexploits
thepublic'strustinlandlinetelephoneservices.
Vishingis typicallyusedto stealcreditcardnumbersor
otherinformationusedinidentitytheftschemesfrom
individuals.
VISHING
Tuesday, 26 May 2015
Indiastands11th intherankingforCyberCrimeintheWorld,
constituting3%of theGlobalCyberCrime.
Tuesday, 26 May 2015
Why India?
A rapidly growing online user
base
 121 Million Internet Users
 65 Million Active Internet Users,
up by 28% from 51 million in
2010
 50 Million users shop online on
Ecommerce and Online
Shopping Sites
 46+ Million Social Network
Users
 346 million mobile users had
subscribed to Data Packages.
Source: IAMAI; Juxt; wearesocial 2011Tuesday, 26 May 2015
 The majority of cybercrimes are centered on forgery, fraud and
Phishing,
 India is the third-most targeted country for Phishing attacks
after the US and the UK,
 Social networks as well as ecommerce sites are major targets,
 6.9 million bot-infected systems in 2010,
 14,348 website defacements in 2010,
 6,850 .in and 4,150 .com domains were defaced during 2011,
 15,000 sites hacked in 2011,
 India is the number 1 country in the world for generating spam.
CyberCrime InIndia
Tuesday, 26 May 2015
CostOf Cyber Crime In India(2010)
 29.9 million people fell victim to cybercrime,
 $4 billion in direct financial losses,
 $3.6 billion in time spent resolving the crime,
 4 in 5 online adults (80%) have been a victim of
Cybercrime,
 17% of adults online have experienced cybercrime
on their mobile phone.
Source: Norton Cybercrime Report 2011
Tuesday, 26 May 2015
We have covered about three instances where high-profile
government websites were hacked and defaced. However, the
actual number of Government Websites that were hacked are
quite huge.
A total number of 90, 119, 252 and 219 Government websites
tracked by the Indian Computer Emergency Response Team
(CERT-In) were hacked / defaced by various hacker groups inTuesday, 26 May 2015
 The police have recorded 3,038 cases but made only 2,700
arrests in 3 years (between 2007 and 2010)
 India registered only 1,350 cases under the IT Act and IPC in
2010
 50% of cybercrimes are not even reported.
 Again, this is
growing trend and
it is surprising that
authorities have
not taken stern
actions to curb the
growth of these
cyber-crimes.
Tuesday, 26 May 2015
CyberLawsinIndia
UnderTheInformation
TechnologyAct,2000
CHAPTER XI – OFFENCES – 66. Hacking with
computer system.
(1) Whoever with the Intent to cause or knowing
that he is likely to cause Wrongful Loss or
Damage to the public or any person Destroys or
Deletes or Alters any Information Residing in a
Computer Resource or diminishes its value or
utility or affects it injuriously by any means,
commits hack.
(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with
fine which may extend up to two lakh rupees, or with both.
Tuesday, 26 May 2015
Whoever without permission of
the owner of the computer :
 Secures Access;
 Downloads, Copies or extracts
any data, computer database or
any information;
 Introduce or causes to be introduce
any Virus or Contaminant;
 Disrupts or causes disruption;
 Denies or causes denial of access to any person;
 Provides any assistance to any person to
facilitate access
 Charges the services availed of by a person to
the account of another person by Tampering with
or Manipulating any Computer, Computer
System, or Computer Network;
Shall be liable to pay damages by way of
compensation not exceeding one crore rupees to
Tuesday, 26 May 2015
Information Technology
Amendment Act, 2008
Section – 43,
Destroys, Deletes or Alters any Information residing in a computer resource or
diminishes its value or utility or affects it injuriously by any means;
Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy
or alter any computer source code used for a computer resource with an intention
to cause damage;
“If any person, dishonestly, or fraudulently, does any act referred to in section 43,
he shall be punishable with imprisonment for a term which may extend to two
three years or with fine which may extend to five lakh rupees or with both.” [S.66]
Tuesday, 26 May 2015
S.66A - Punishment for sending offensive messages through
communication service, etc
 Any person who sends, by means of a computer resource or a
communication device;
 Any information that is grossly offensive or has menacing
character; or
 Any information which he knows to be false, but for the
purpose of causing annoyance, inconvenience, danger, obstruction,
insult, injury, criminal intimidation, enmity, hatred, or ill will,
persistently makes by making use of such computer resource or a
communication device;
 Any electronic mail or electronic mail message for the purpose of
causing annoyance or inconvenience or to deceive or to mislead
the addressee or recipient about the origin of such messages;
Shall be punishable with imprisonment for a term which may extend
to three years and with fine.
Tuesday, 26 May 2015
S. 66C - Punishment for identity theft
“Whoever, fraudulently or dishonestly make use of the
electronic signature, password or any other unique identification
feature of any other person, shall be punished with imprisonment
of either description for a term which may extend to three years
and shall also be liable to fine which may extend to rupees one
lakh”
S. 66D - Punishment for cheating by personation by using
computer resource
“Whoever, by means of any communication device or
computer resource cheats by personation, shall be punished with
imprisonment of either description for a term which may extend
to three years and shall also be liable to fine which may extend to
one lakh rupees. “Tuesday, 26 May 2015
S. 66E - Punishment for violation of privacy.
“Whoever, intentionally or knowingly captures, publishes or
transmits the image of a private area of any person without his or
her consent, under circumstances violating the privacy of that
person, shall be punished with imprisonment which may extend to
three years or with fine not exceeding two lakh rupees, or with
both”
S. 67 A - Punishment for publishing or transmitting
of material containing sexually explicit act, etc. in
electronic form
“Whoever publishes or transmits or causes to be published or
transmitted in the electronic form any material which contains
sexually explicit act or conduct shall be punished on first conviction
with imprisonment of either description for a term which may
extend to five years and with fine which may extend to ten lakh
rupees”Tuesday, 26 May 2015
S. 67 C - Preservation and Retention of information
by intermediaries.
“(1) Intermediary shall preserve and retain such
information as may be specified for such duration and
in such manner and format as the Central Government
may prescribe.
(2) Any intermediary who intentionally or knowingly
contravenes the provisions of sub section (1) shall be
punished with an imprisonment for a term which may
extend to three years and shall also be liable to fine.”
Tuesday, 26 May 2015
Arrests& ReportsUnder ITAct
 Under the IT Act, 966 cybercrime
cases were filed in 2010
420 in 2009)
 Geographic breakdown of cases
reported:
o 153 from Karnataka,
o 148 from Kerala
o 142 from Maharashtra
o 105 Andhra Pradesh
o 52 Rajasthan
o 52 Punjab
 233 persons were arrested in 2010
 33% of the cases registered were
related to hacking
Source: National Crime Records Bureau
Tuesday, 26 May 2015
Arrests& ReportsUnderIPC
 Under the IPC, 356 cybercrime cases were registered in
2010 (276 cases in 2009)
 Geographic breakdown of cases reported --
o 104 from Maharashtra
o 66 Andhra Pradesh
o 46 Chhattisgarh
 The majority of these crimes were
either forgery or fraud cases.
Source: National Crime Records Bureau
Tuesday, 26 May 2015
How to Tackle Such Activities?
An important question arises that how can these crimes be prevented. A
number of techniques and solutions have been presented but the problems still
exists and are increasing day by day.
Antivirus And Anti Spyware Software:
Аntivirus software consists of computer programs that attempt to identify,
thwart and eliminate computer viruses and other malicious software. Anti spy
wares are used to restrict backdoor program, trojans and other spy wares to be
installed on the computer.
Firewalls:
A firewall protects a computer network from unauthorized access. Network
firewalls may be hardware devices, software programs, or a combination of the
two. A network firewall typically guards an internal computer network against
malicious access from outside the network.
Tuesday, 26 May 2015
Cryptography:
Cryptography is the science of encrypting and decrypting
information. Encryption is like sending a postal mail to another
party with a lock code on the envelope which is known only to
the sender and the recipient. A number of cryptographic
methods have been developed and some of them are still not
cracked.
Cyber Ethics and Laws:
Cyber ethics and cyber laws are also being formulated to stop
cyber crimes. It is a responsibility of every individual to follow
cyber ethics and cyber laws so that the increasing cyber crimes
shall reduce. Security Software like Anti Viruses and Anti Spy
Wares should be installed on all computers, in order to remain
secure from Cyber Crimes. Internet Service Providers should also
provide high level of security at their servers in order to keep
their clients secure from all types of viruses and malicious
programs.
Tuesday, 26 May 2015
The Futureof Cyber-Crimesin India
• Continued Website Hacks and
Defacements
• Data and Information theft
• Increasing phishing attacks on
Ecommerce and Financial Websites
• Cybercriminals targeting Social and
Professional Networks
• Threats directed at the Mobile Platform:
Smartphones and Tablets
Tuesday, 26 May 2015
Conclusion…
“IndianLawsarewelldraftedandarecapableof handlingallkindsof
challengesas posedbycybercriminals.However,theenforcement
agenciesarerequiredto bewellversedwiththechangingtechnologies
andLaws.”
"Asinternet technologyadvancesso doesthethreatof cybercrime.In
timeslikethesewe mustprotectourselvesfromcybercrime.Anti-
virussoftware,firewallsandsecuritypatchesarejust thebeginning.
Neveropensuspiciouse-mailsandonlynavigateto trustedsites.”
Tuesday, 26 May 2015
THANKYOU!!
F.Y.B.M.S. – B
-- Namita Ludbe(140)
-- Kavish Pandya(149)
-- Mohammed Lakdawala(117)
-- Ruchit Mehta(114)
-- Kalpesh Solanki (70)
-- Yash Dodia(93)
-- Pratik Jain(72)Tuesday, 26 May 2015

Contenu connexe

Tendances

Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
Unit v: Cyber Safety Mechanism
Unit v: Cyber Safety MechanismUnit v: Cyber Safety Mechanism
Unit v: Cyber Safety MechanismArnav Chowdhury
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crimeDarshan Aswani
 

Tendances (20)

Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Unit v: Cyber Safety Mechanism
Unit v: Cyber Safety MechanismUnit v: Cyber Safety Mechanism
Unit v: Cyber Safety Mechanism
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber law
Cyber lawCyber law
Cyber law
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
cybersecurity and cyber crime
cybersecurity and cyber crimecybersecurity and cyber crime
cybersecurity and cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Imran batada
Imran batadaImran batada
Imran batada
 

Similaire à Cybercrimeppt

Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurVaibhav's Group
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...Rahul Bharati
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDAnkush saini
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
 
Cybercrime in government
Cybercrime in governmentCybercrime in government
Cybercrime in governmentJacqueline Fick
 
Law ppt final
Law ppt   finalLaw ppt   final
Law ppt final79850
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 

Similaire à Cybercrimeppt (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
Cybercrime and Laws.pptx
Cybercrime and Laws.pptxCybercrime and Laws.pptx
Cybercrime and Laws.pptx
 
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...PPt on  IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
PPt on IT Act 2000 including Offences and Relevant Penal Sections [IT Act & ...
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime in government
Cybercrime in governmentCybercrime in government
Cybercrime in government
 
Law ppt final
Law ppt   finalLaw ppt   final
Law ppt final
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 

Dernier

CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxRRR Chambers
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULEsreeramsaipranitha
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfKelechi48
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfPoojaGadiya1
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxPSSPRO12
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxca2or2tx
 

Dernier (20)

CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULELITERAL RULE OF INTERPRETATION - PRIMARY RULE
LITERAL RULE OF INTERPRETATION - PRIMARY RULE
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 

Cybercrimeppt

  • 2. Tuesday, 26 May 2015 GROUP 1
  • 3. Crimes are not to be measured by the issue of events, but by the bad intensions of men. The greatest crimes do not arise from a want of feeling for others but from an over sensibility for ourselves and an over indulgence in our own desires. Tuesday, 26 May 2015
  • 4. CYBER CRIME !! Theexpression‘Crime’is definedas an act,whichsubjectsthedoerto legalpunishmentor any offenceagainstmorality,socialorderor anyunjustor shamefulact.The“Offence"is definedin theCodeof CriminalProcedureto meanas an actor omissionmadepunishablebyanylawfor thetimebeinginforce. CyberCrimeis emergingas a seriousthreat.Worldwidegovernments,policedepartmentsand intelligenceunitshavestartedto react. Tuesday, 26 May 2015
  • 5. Cyber Crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to enable the illicit activity. Computer crime mainly consists of unauthorized access to computer systems data alteration, data destruction, theft of intellectual property. Cyber crime in the context of national security may involve hacking, traditional espionage, or information warfare and related activities. Pornography, Threatening Email, Assuming someone's Identity, Sexual Harassment, Defamation, Spam and Phishing are some examples where computers are used to commit crime, whereas Viruses, Worms and Industrial Espionage, Software Piracy and Hacking are examples where computers become target of crime. Tuesday, 26 May 2015
  • 6. Indian Crime Scene The major Cyber Crimes reported, in India, are Denial of Services, Defacement of Websites, Spam, Computer Virus and Worms, Pornography, Cyber Squatting, Cyber Stalking and Phishing. Given the fact that nearly $ 120 million worth of Mobiles are being lost or stolen in the country every year, the users have to protect Information, Contact details and Telephone numbers as these could be misused. Nearly 69 per cent of information theft is carried out by current and ex-employees and 31 per cent by hackers. India has to go a long way in protecting the vital information. [3 The Hindu, Saturday, Oct 27, 2007]. Tuesday, 26 May 2015
  • 7. Cyber Crime Variants Hacking "Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 per cent increase this year. Cyber Squatting Cyber Squatting is the act of registering a famous Domain Name and then selling it for a fortune. This is an issue that has not been tackled in IT ACT 2000. Tuesday, 26 May 2015
  • 8. Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason. The fraudster then has access to the customer's online bank account and to the funds contained in that account. Tuesday, 26 May 2015
  • 9. Cyber Stalking is use of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse. Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. Tuesday, 26 May 2015
  • 10. Vishingis thecriminalpracticeof usingsocial engineeringandVoiceoverIP (VoIP)to gainaccessto privatepersonalandfinancialinformationfromthe publicfor thepurposeof financialreward.Thetermis a combinationof“Voice"andphishing.Vishingexploits thepublic'strustinlandlinetelephoneservices. Vishingis typicallyusedto stealcreditcardnumbersor otherinformationusedinidentitytheftschemesfrom individuals. VISHING Tuesday, 26 May 2015
  • 12. Why India? A rapidly growing online user base  121 Million Internet Users  65 Million Active Internet Users, up by 28% from 51 million in 2010  50 Million users shop online on Ecommerce and Online Shopping Sites  46+ Million Social Network Users  346 million mobile users had subscribed to Data Packages. Source: IAMAI; Juxt; wearesocial 2011Tuesday, 26 May 2015
  • 13.  The majority of cybercrimes are centered on forgery, fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK,  Social networks as well as ecommerce sites are major targets,  6.9 million bot-infected systems in 2010,  14,348 website defacements in 2010,  6,850 .in and 4,150 .com domains were defaced during 2011,  15,000 sites hacked in 2011,  India is the number 1 country in the world for generating spam. CyberCrime InIndia Tuesday, 26 May 2015
  • 14. CostOf Cyber Crime In India(2010)  29.9 million people fell victim to cybercrime,  $4 billion in direct financial losses,  $3.6 billion in time spent resolving the crime,  4 in 5 online adults (80%) have been a victim of Cybercrime,  17% of adults online have experienced cybercrime on their mobile phone. Source: Norton Cybercrime Report 2011 Tuesday, 26 May 2015
  • 15. We have covered about three instances where high-profile government websites were hacked and defaced. However, the actual number of Government Websites that were hacked are quite huge. A total number of 90, 119, 252 and 219 Government websites tracked by the Indian Computer Emergency Response Team (CERT-In) were hacked / defaced by various hacker groups inTuesday, 26 May 2015
  • 16.  The police have recorded 3,038 cases but made only 2,700 arrests in 3 years (between 2007 and 2010)  India registered only 1,350 cases under the IT Act and IPC in 2010  50% of cybercrimes are not even reported.  Again, this is growing trend and it is surprising that authorities have not taken stern actions to curb the growth of these cyber-crimes. Tuesday, 26 May 2015
  • 17. CyberLawsinIndia UnderTheInformation TechnologyAct,2000 CHAPTER XI – OFFENCES – 66. Hacking with computer system. (1) Whoever with the Intent to cause or knowing that he is likely to cause Wrongful Loss or Damage to the public or any person Destroys or Deletes or Alters any Information Residing in a Computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack. (2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both. Tuesday, 26 May 2015
  • 18. Whoever without permission of the owner of the computer :  Secures Access;  Downloads, Copies or extracts any data, computer database or any information;  Introduce or causes to be introduce any Virus or Contaminant;  Disrupts or causes disruption;  Denies or causes denial of access to any person;  Provides any assistance to any person to facilitate access  Charges the services availed of by a person to the account of another person by Tampering with or Manipulating any Computer, Computer System, or Computer Network; Shall be liable to pay damages by way of compensation not exceeding one crore rupees to Tuesday, 26 May 2015
  • 19. Information Technology Amendment Act, 2008 Section – 43, Destroys, Deletes or Alters any Information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means; Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage; “If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both.” [S.66] Tuesday, 26 May 2015
  • 20. S.66A - Punishment for sending offensive messages through communication service, etc  Any person who sends, by means of a computer resource or a communication device;  Any information that is grossly offensive or has menacing character; or  Any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device;  Any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages; Shall be punishable with imprisonment for a term which may extend to three years and with fine. Tuesday, 26 May 2015
  • 21. S. 66C - Punishment for identity theft “Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh” S. 66D - Punishment for cheating by personation by using computer resource “Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees. “Tuesday, 26 May 2015
  • 22. S. 66E - Punishment for violation of privacy. “Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both” S. 67 A - Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form “Whoever publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees”Tuesday, 26 May 2015
  • 23. S. 67 C - Preservation and Retention of information by intermediaries. “(1) Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe. (2) Any intermediary who intentionally or knowingly contravenes the provisions of sub section (1) shall be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.” Tuesday, 26 May 2015
  • 24. Arrests& ReportsUnder ITAct  Under the IT Act, 966 cybercrime cases were filed in 2010 420 in 2009)  Geographic breakdown of cases reported: o 153 from Karnataka, o 148 from Kerala o 142 from Maharashtra o 105 Andhra Pradesh o 52 Rajasthan o 52 Punjab  233 persons were arrested in 2010  33% of the cases registered were related to hacking Source: National Crime Records Bureau Tuesday, 26 May 2015
  • 25. Arrests& ReportsUnderIPC  Under the IPC, 356 cybercrime cases were registered in 2010 (276 cases in 2009)  Geographic breakdown of cases reported -- o 104 from Maharashtra o 66 Andhra Pradesh o 46 Chhattisgarh  The majority of these crimes were either forgery or fraud cases. Source: National Crime Records Bureau Tuesday, 26 May 2015
  • 26. How to Tackle Such Activities? An important question arises that how can these crimes be prevented. A number of techniques and solutions have been presented but the problems still exists and are increasing day by day. Antivirus And Anti Spyware Software: Аntivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software. Anti spy wares are used to restrict backdoor program, trojans and other spy wares to be installed on the computer. Firewalls: A firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two. A network firewall typically guards an internal computer network against malicious access from outside the network. Tuesday, 26 May 2015
  • 27. Cryptography: Cryptography is the science of encrypting and decrypting information. Encryption is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender and the recipient. A number of cryptographic methods have been developed and some of them are still not cracked. Cyber Ethics and Laws: Cyber ethics and cyber laws are also being formulated to stop cyber crimes. It is a responsibility of every individual to follow cyber ethics and cyber laws so that the increasing cyber crimes shall reduce. Security Software like Anti Viruses and Anti Spy Wares should be installed on all computers, in order to remain secure from Cyber Crimes. Internet Service Providers should also provide high level of security at their servers in order to keep their clients secure from all types of viruses and malicious programs. Tuesday, 26 May 2015
  • 28. The Futureof Cyber-Crimesin India • Continued Website Hacks and Defacements • Data and Information theft • Increasing phishing attacks on Ecommerce and Financial Websites • Cybercriminals targeting Social and Professional Networks • Threats directed at the Mobile Platform: Smartphones and Tablets Tuesday, 26 May 2015
  • 29. Conclusion… “IndianLawsarewelldraftedandarecapableof handlingallkindsof challengesas posedbycybercriminals.However,theenforcement agenciesarerequiredto bewellversedwiththechangingtechnologies andLaws.” "Asinternet technologyadvancesso doesthethreatof cybercrime.In timeslikethesewe mustprotectourselvesfromcybercrime.Anti- virussoftware,firewallsandsecuritypatchesarejust thebeginning. Neveropensuspiciouse-mailsandonlynavigateto trustedsites.” Tuesday, 26 May 2015
  • 30. THANKYOU!! F.Y.B.M.S. – B -- Namita Ludbe(140) -- Kavish Pandya(149) -- Mohammed Lakdawala(117) -- Ruchit Mehta(114) -- Kalpesh Solanki (70) -- Yash Dodia(93) -- Pratik Jain(72)Tuesday, 26 May 2015