SlideShare une entreprise Scribd logo
1  sur  22
What is Crime??? ?
An action or omission that constitutes an offense
that may be prosecuted by the state and is
punishable by law.
The greatest crimes do not arise from a want of
feeling for others but from an over sensibility for
ourselves and an over indulgence in our own
desires.
What is Cyber Crime??? ?
Crime committed using a computer and the internet to steal a
person's identity or sell contraband or stalk victims or disrupt
operations with malevolent programs..
Cyber Crime is emerging as a serious threat.
Threatening Email, Assuming someone's Identity, Sexual Harassment,
Defamation, Spam and Phishing are some examples where
computers are used to commit crime.
Viruses, Worms and Industrial Espionage, Software Piracy and
Hacking are examples where computers become target of crime.
Cyber Crime Variants
 Hacking
 "Hacking" is a crime, which entails cracking systems and gaining
unauthorized access to the data stored in them. Hacking had
witnessed a 37 percent increase this year.
 Hacker
 Hacker (programmer subculture), who combines excellence, playfulness, cleverness
and exploration in performed activities.
 Kevin David Mitnick is first hacker.
Cyber Squatting :-
 Cyber Squatting is the act of registering a famous Domain Name and then
selling it for a fortune.
 Phishing :-
 Phishing is just one of the many frauds on the Internet, trying to fool people into
parting with their money.
 Phishing refers to the receipt of unsolicited emails by customers of Financial
Institutions, requesting them to enter their Username, Password or other personal
information to access their Account for some reason.
 The fraudster then has access to the customer's online bank account
and to the funds contained in that account.
How it Works ??? ?
Cyber Stalking :-
 Cyber Stalking is use of the Internet or other electronic means to stalk
someone.
 This term is used interchangeably with online harassment and online
abuse.
 Stalking generally involves harassing or threatening behaviour that an
individual engages in repeatedly, such as following a person, appearing
at a person's home or place of business, making harassing phone calls,
leaving written messages or objects, or vandalizing a person's property.
Vishing :-
 Vishing is the criminal practice of using social engineering and Voice over IP
(VoIP) to gain access to private personal and financial information from the
public for the purpose of financial reward.
 The term is a combination of “Voice" and phishing.
 Vishing exploits the public's trust via landline telephone services.
 Vishing is typically used to steal credit card numbers or other information
used in identity theft schemes from individuals.
Indian Crime Scene
 The major Cyber Crimes reported, in India, are Denial of Services,
Defacement of Websites, Spam, Computer Virus and Worms,
Pornography, Cyber Squatting, Cyber Stalking and Phishing.
 Given the fact that nearly $ 120 million worth of Mobiles are being
lost or stolen in the country every year.
 Nearly 69 per cent of information theft is carried out by current
and ex-employees and 31 per cent by hackers.
Top Countries in Cyber Crime :-
India stands 11th in the ranking for Cyber Crime in the
World, constituting 3% of the Global Cyber Crime.
Why India??? ?
 121 Million Internet Users
 65 Million Active Internet Users, up by 28% from 51 million in 2010
 50 Million users shop online on Ecommerce and Online Shopping
Sites
 46+ Million Social Network Users
 346 million mobile users had subscribed to Data Packages.
A rapidly growing online user base
The majority of cybercrimes are centered on forgery, fraud and Phishing,
India is the third-most targeted country for Phishing attacks after the US and the UK,
Social networks as well as ecommerce sites are major targets,
6.9 million bot-infected systems in 2010,
14,348 website defacements in 2010.
6,850 .in and 4,150 .com domains were defaced during 2011,
15,000 sites hacked in 2011,
India is the number 1 country in the world for generating spam.
The police have recorded 3,038 cases but made only 2,700 arrests in 3 years
(between 2007 and 2010).
India registered only 1,350 cases under the IT Act and IPC in 2010
50% of cybercrimes are not even reported.
Cyber Laws in India
The Information Technology Act, 2000
CHAPTER XI – OFFENCES – 66. Hacking with computer system
 Whoever with the Intent to cause Wrongful Loss or Damage to the public or any person
Destroys or Deletes or Alters any Information Residing in Computer Resource or diminishes
its value or utility or affects it injuriously by any means, commits hack
 Whoever commits hacking shall be punished with imprisonment up to three years, or with fine
which may extend up to two lakh rupees, or with both.
 Whoever without permission of the owner of the computer :-
• Secures Access, Downloads, Copies or extract any data, computer
database or any information;
• Introduce or causes to be introduce any Virus Contaminant
Shall be liable to pay damages by way of compensation not exceeding one crore rupees to the
person so affected.
Information Technology Amendment Act, 2008
 Section – 43,
 Destroys, Deletes or Alters any Information residing in a computer
resource or diminishes its value or utility or affects it injuriously by any
means.
 Steals, conceals, destroys or alters any computer source
code with an intention to cause damage;
 Punishment for sending offensive messages through
communication service, etc.
 Punishment for identity theft
 Punishment for cheating by personation by using computer
resource
 Punishment for violation of privacy.
Arrest And Reports For Cyber Crime in India
o Under the IPC, 356 cybercrime cases were registered in 2010 (276
cases in 2009)
o Geographic breakdown of cases reported
o 104 from Maharashtra
o 66 Andhra Pradesh
o 46 Chhattisgarh
o The majority of these crimes were either forgery or fraud cases.
 Under the ITAct, 966 cybercrime cases were filed in 2010
420 in 2009).
 233 persons were arrested in 2010.
 33% of the cases registered were related to hacking
How to Tackle Such activity??? ?
An important question arises that how can these crimes be prevented. A number of
techniques and solutions have been presented but the problems still exists and are
increasing day by day.
Antivirus And Anti Spyware Software:
Аntivirus software consists of computer programs that attempt to identify,
thwart and eliminate computer viruses and other malicious software.
Anti spywares are used to restrict backdoor program, trojans and
other spywares to be installed on the computer.
Firewalls:
protects a computer network from unauthorized access.
may be hardware devices, software programs, or a combination of the two.
typically guards an internal computer network against malicious access
from outside the network.
Cryptography:
Cryptography is the science of encrypting and decrypting information.
Encryption is like sending a postal mail to another party with a lock code on
the envelope which is known only to the sender and the recipient. A number
of cryptographic methods have been developed and some of them are still
not cracked.
Cyber Ethics and Laws:
Cyber ethics and cyber laws are also being formulated to stop cyber crimes.
Security Software like Anti Viruses and Anti SpyWares should be installed on
all computers.
Internet Service Providers should also provide high level of security at their
servers.
The Future of Cyber-Crimes in India
Continued Website Hacks and Defacements
Data and Information theft
Increasing phishing attacks on Ecommerce and Financial
Websites
Cybercriminals targeting Social and Professional
Networks
Threats directed at the Mobile Platform: Smartphones and
Tablets
Conclusion:-
Indian Laws are well drafted and are capable of handling all
kinds of challenges as posed by cyber criminals. However,
the enforcement agencies are required to be well versed
with the changing technologies and Laws.”
As internet technology advances so does the threat of
cyber crime. In times like these we must protect ourselves
from cyber crime. Anti-virus software, firewalls and security
patches are just the beginning. Never open suspicious e-
mails and only navigate to trusted sites.”
Cyber Crime and Laws

Contenu connexe

Dernier

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Dernier (20)

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

En vedette

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Cyber Crime and Laws

  • 1.
  • 2. What is Crime??? ? An action or omission that constitutes an offense that may be prosecuted by the state and is punishable by law. The greatest crimes do not arise from a want of feeling for others but from an over sensibility for ourselves and an over indulgence in our own desires.
  • 3. What is Cyber Crime??? ? Crime committed using a computer and the internet to steal a person's identity or sell contraband or stalk victims or disrupt operations with malevolent programs.. Cyber Crime is emerging as a serious threat. Threatening Email, Assuming someone's Identity, Sexual Harassment, Defamation, Spam and Phishing are some examples where computers are used to commit crime. Viruses, Worms and Industrial Espionage, Software Piracy and Hacking are examples where computers become target of crime.
  • 4. Cyber Crime Variants  Hacking  "Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 percent increase this year.  Hacker  Hacker (programmer subculture), who combines excellence, playfulness, cleverness and exploration in performed activities.  Kevin David Mitnick is first hacker.
  • 5. Cyber Squatting :-  Cyber Squatting is the act of registering a famous Domain Name and then selling it for a fortune.  Phishing :-  Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money.  Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason.
  • 6.  The fraudster then has access to the customer's online bank account and to the funds contained in that account.
  • 7. How it Works ??? ?
  • 8. Cyber Stalking :-  Cyber Stalking is use of the Internet or other electronic means to stalk someone.  This term is used interchangeably with online harassment and online abuse.  Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property.
  • 9. Vishing :-  Vishing is the criminal practice of using social engineering and Voice over IP (VoIP) to gain access to private personal and financial information from the public for the purpose of financial reward.  The term is a combination of “Voice" and phishing.  Vishing exploits the public's trust via landline telephone services.  Vishing is typically used to steal credit card numbers or other information used in identity theft schemes from individuals.
  • 10. Indian Crime Scene  The major Cyber Crimes reported, in India, are Denial of Services, Defacement of Websites, Spam, Computer Virus and Worms, Pornography, Cyber Squatting, Cyber Stalking and Phishing.  Given the fact that nearly $ 120 million worth of Mobiles are being lost or stolen in the country every year.  Nearly 69 per cent of information theft is carried out by current and ex-employees and 31 per cent by hackers.
  • 11. Top Countries in Cyber Crime :- India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the Global Cyber Crime.
  • 12. Why India??? ?  121 Million Internet Users  65 Million Active Internet Users, up by 28% from 51 million in 2010  50 Million users shop online on Ecommerce and Online Shopping Sites  46+ Million Social Network Users  346 million mobile users had subscribed to Data Packages. A rapidly growing online user base
  • 13. The majority of cybercrimes are centered on forgery, fraud and Phishing, India is the third-most targeted country for Phishing attacks after the US and the UK, Social networks as well as ecommerce sites are major targets, 6.9 million bot-infected systems in 2010, 14,348 website defacements in 2010. 6,850 .in and 4,150 .com domains were defaced during 2011, 15,000 sites hacked in 2011, India is the number 1 country in the world for generating spam.
  • 14. The police have recorded 3,038 cases but made only 2,700 arrests in 3 years (between 2007 and 2010). India registered only 1,350 cases under the IT Act and IPC in 2010 50% of cybercrimes are not even reported.
  • 15. Cyber Laws in India The Information Technology Act, 2000 CHAPTER XI – OFFENCES – 66. Hacking with computer system  Whoever with the Intent to cause Wrongful Loss or Damage to the public or any person Destroys or Deletes or Alters any Information Residing in Computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack  Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.  Whoever without permission of the owner of the computer :- • Secures Access, Downloads, Copies or extract any data, computer database or any information; • Introduce or causes to be introduce any Virus Contaminant Shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected.
  • 16. Information Technology Amendment Act, 2008  Section – 43,  Destroys, Deletes or Alters any Information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means.  Steals, conceals, destroys or alters any computer source code with an intention to cause damage;  Punishment for sending offensive messages through communication service, etc.  Punishment for identity theft  Punishment for cheating by personation by using computer resource  Punishment for violation of privacy.
  • 17. Arrest And Reports For Cyber Crime in India o Under the IPC, 356 cybercrime cases were registered in 2010 (276 cases in 2009) o Geographic breakdown of cases reported o 104 from Maharashtra o 66 Andhra Pradesh o 46 Chhattisgarh o The majority of these crimes were either forgery or fraud cases.  Under the ITAct, 966 cybercrime cases were filed in 2010 420 in 2009).  233 persons were arrested in 2010.  33% of the cases registered were related to hacking
  • 18. How to Tackle Such activity??? ? An important question arises that how can these crimes be prevented. A number of techniques and solutions have been presented but the problems still exists and are increasing day by day. Antivirus And Anti Spyware Software: Аntivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software. Anti spywares are used to restrict backdoor program, trojans and other spywares to be installed on the computer. Firewalls: protects a computer network from unauthorized access. may be hardware devices, software programs, or a combination of the two. typically guards an internal computer network against malicious access from outside the network.
  • 19. Cryptography: Cryptography is the science of encrypting and decrypting information. Encryption is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender and the recipient. A number of cryptographic methods have been developed and some of them are still not cracked. Cyber Ethics and Laws: Cyber ethics and cyber laws are also being formulated to stop cyber crimes. Security Software like Anti Viruses and Anti SpyWares should be installed on all computers. Internet Service Providers should also provide high level of security at their servers.
  • 20. The Future of Cyber-Crimes in India Continued Website Hacks and Defacements Data and Information theft Increasing phishing attacks on Ecommerce and Financial Websites Cybercriminals targeting Social and Professional Networks Threats directed at the Mobile Platform: Smartphones and Tablets
  • 21. Conclusion:- Indian Laws are well drafted and are capable of handling all kinds of challenges as posed by cyber criminals. However, the enforcement agencies are required to be well versed with the changing technologies and Laws.” As internet technology advances so does the threat of cyber crime. In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls and security patches are just the beginning. Never open suspicious e- mails and only navigate to trusted sites.”