SlideShare une entreprise Scribd logo
1  sur  16
TYPES OF CYBER CRIMES
Submitted by – Payal Nagar
What is cyber crime?
 Cyber crime or computer crime means any illegal activity which is commited
using computer or internet and that activity is prohibited under law.
 Cyber crime is defined as a crime in which a computer is the object of the crime
(hacking, phishing, spamming) or is used as a tool to commit an offence (child
pornography, hate crimes).
 After the implementation of IT Act in 2000 onwards cyber crime was prohibited.
Types of cyber crimes -:
 Cyber Stalking
 Pornography
 Hacking and Cracking
 Computer /Cyber Terrorism
Cyber Stalking
 Stalking generally means a harassing behaviour which one person exhibits
towards the others.
 Stalking may comprise of following a person, appearing at a persons home or
place of business, making harassing phone calls, leaving written messages or
objects.
Nature of cyber stalking
 Computer or cyber stalking is one of the very popular means by which the cyber
stalker exploits the internet and the windows operating system in order to
assume control over the computer of the user.
 Email account of the user may also be used as a tool for cyber stalking. Access
to an email account of an innocent user may be gained by the hacker and that
address may be used to send messages that may be threatening or offensive.
 Online stalkers may post insulting messages on electronic bulletin boards signed
with the email address of the person being harassed or statements about the
victim.
Punishment for cyber stalking
 Section 66(A) of Indian Information Technology Act, 2008 penalizes sending false and
offensive messages through communication services.
 Any person who sends, by the means of a computer resource or a communication
devices –
(A) Any information that is grossly effective or has menacing character, or
(B) Any information which he /she knows to be false, but for the purpose of causing
annoyance, inconvenience, danger, obstruction, insult, criminal intimidation, hatred or
ill will, persistently makes by making use of such computer resource or a
communication device,
(C) Any electronic mail or electronic mail messages for the purpose of causing
annoyance or inconvenience or to deceive or to mislead the addressee or recipient
about the origin of such messages,
shall be punishable with imprisonment for a term which may extend to 3 years
with fine.
Pornography
 Cyber Pornography
 Child Pornography
 Cyber pornography is the act of using cyberspace to create, display, distribute,
import or publish pornography or obscene materials, especially materials
depicting children engaged in sexual acts with adults. Cyber pornography is a
criminal offense classified as causing harm to persons.
 Child pornography means to make ,produce, posses, distribute and sale
pornographic materials that exploits minor childs (under the age of 18 ).
Increasingly child pornography laws are being utilized to punish use of
computer technology and the internet to obtain, share and distribute pornography
material involving childrens.
Punishment for cyber pornography
 Under section 67 of the Information Technology Act, 2000 makes the following
acts punishable with imprisonment upto 3 years and fine upto 5 lakhs :
Publication – it includes uploading on website, whats app group or any other
digital portal where third parties can have access to such content.
Transmission – it includes seding obscene photos or images to any person via email,
messaging ,whats app or any other form of digital media.
 Section 67 (A) of the Information Technology Act makes
publication ,transmission and causing to be transmitted and piblished in
electronic form any material containing sexually explicit act or conduct,
punishable with imprisonment upto 5 years and fine upto 10 lakhs.
Hacking and Cracking
 Hacking is the act of finding the possible entry points that exist in a computer system or a
computer network finally entering into them.
 Hacking is usually done to gain unauthorized access to a computer system or
network ,either to harm the system or to steal sensitive information available on the
computer.
 Cracking on the other hand is a kind of hacking in which the person who cracks the security
of the computer can download the information along with that it can modify the data
also.
Types of hacking
 Website Hacking-: Hacking a website means taking control over a web server
and its associated software.
 Network Hacking-: Hacking a network means gathering information about a
network by using tools like telnet, ping, tracert etc with intent to harm the
network system and hamper its operation.
 Email Hacking-: It includes getting unauthorized access on an email account
and using it without the consent ot its owner.
 Password Hacking-: This is the process of recovering secret passwords from
data that has been stored in or transmitted by a computer system.
 Computer Hacking-:This is the process of stealing computer ID and password
by applying hacking methods and getting unauthorized access to computer
system.
 Ethical Hacking-:Ethical hacking involves finding weaknesses in a computer or
network system for testing purpose anf finally getting them fixed. Ethical
hacking is legal in india.
Punishment for Hacking
 Chapter Xl Section 66 of IT ACT, 2000 particularly deals with the act of hacking.
 Section 66(1) defines a hack as any person, dishonestly or fraudulently does any
act referred to in section 43 is called hacking and, section 66(2) prescribes the
punishment for it. Hacking is punishable offense in India with imprisonment
upto 3 years, or with fine upto 2 lakh rupees or both.
 Chapter Xl Section 43 of IT ACT, 2000 prescribes a penalty for the damage to
computer or computer system.
 Chapter Xl Section 65 of the said act makes tampering with computer source
documents an offence.
Cyber Terrorism
Cyber terrorism means doing unlawful things, through internet for political purposes to
create hate in minds of people. It is any act which is done through cyberspace to create
a threat in the minds of people or to breach the sovereignty, unity, or integrity of a
country, or to provoke people or group of the people against the government.
Punishment for cyber terrorism
 Section 66 (f) provides punishment for cyber terrorism . Whoever -
(A) With intent to threaten the unity, integrity, security or sovereignty of India or to strike terror
in people or any section of the people by-
(i) Denying or cause the denial of access to any person authorized to access computer
resource or,
(B) Knowingly or intentionally gaining access to any computer resource and revealing the
restricted information which may be used to cause injury to the intrests of the integrity of India,
security of the state, friendly relations with foreign states, public order and decency or morality
of the country.
Whoever commits or conspires to commit cyber terrorism or above mentioned acts shall be
punishable with imprisonment which may extend to imprisonment for life.
Some more computer crimes are-:
 Spoofing
A Spoofing attack is a situation in which a person or program successfully
masquerades (mask) as another by falsifying data, to gain Iligitimate advantage.
• Email address spoofing
• IP address spoofing
 Phishing
Phishing is the fraudulent attempt to obtain sensitive information such as
username, passwords or credit card details, often for malicious reasons.
Phishing is typically carried out by email spoofing or instant messaging and it often
directs users to enter personal information at a fake website, which looks like the
ligitimate site, the only difference being the URL of the website in concern.
 Email bombing
No. of mails (around 1000) at a time are send continuously at someones computers
system or server, so that traffic can be created. Due to this the authorized person
not be able to reach the real information. It is also a kind of Denial of Service attack
(DOS).

Contenu connexe

Tendances (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Hacking
HackingHacking
Hacking
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 

Similaire à Types of Cyber Crimes

cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws Aman Bhargava
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptxRahul Bharati
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 

Similaire à Types of Cyber Crimes (20)

cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Law in India.pptx
Cyber Law in India.pptxCyber Law in India.pptx
Cyber Law in India.pptx
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 

Plus de DINESH KAMBLE

Plus de DINESH KAMBLE (11)

Cyber investigation Protocol
Cyber investigation ProtocolCyber investigation Protocol
Cyber investigation Protocol
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Fundamental of computer hardware
Fundamental of computer hardwareFundamental of computer hardware
Fundamental of computer hardware
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Memory
MemoryMemory
Memory
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
CHA & LBA Addressing
CHA & LBA Addressing  CHA & LBA Addressing
CHA & LBA Addressing
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 

Dernier

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 

Dernier (20)

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 

Types of Cyber Crimes

  • 1. TYPES OF CYBER CRIMES Submitted by – Payal Nagar
  • 2. What is cyber crime?  Cyber crime or computer crime means any illegal activity which is commited using computer or internet and that activity is prohibited under law.  Cyber crime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offence (child pornography, hate crimes).  After the implementation of IT Act in 2000 onwards cyber crime was prohibited.
  • 3. Types of cyber crimes -:  Cyber Stalking  Pornography  Hacking and Cracking  Computer /Cyber Terrorism
  • 4. Cyber Stalking  Stalking generally means a harassing behaviour which one person exhibits towards the others.  Stalking may comprise of following a person, appearing at a persons home or place of business, making harassing phone calls, leaving written messages or objects.
  • 5. Nature of cyber stalking  Computer or cyber stalking is one of the very popular means by which the cyber stalker exploits the internet and the windows operating system in order to assume control over the computer of the user.  Email account of the user may also be used as a tool for cyber stalking. Access to an email account of an innocent user may be gained by the hacker and that address may be used to send messages that may be threatening or offensive.  Online stalkers may post insulting messages on electronic bulletin boards signed with the email address of the person being harassed or statements about the victim.
  • 6. Punishment for cyber stalking  Section 66(A) of Indian Information Technology Act, 2008 penalizes sending false and offensive messages through communication services.  Any person who sends, by the means of a computer resource or a communication devices – (A) Any information that is grossly effective or has menacing character, or (B) Any information which he /she knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, criminal intimidation, hatred or ill will, persistently makes by making use of such computer resource or a communication device, (C) Any electronic mail or electronic mail messages for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages, shall be punishable with imprisonment for a term which may extend to 3 years with fine.
  • 8.  Cyber pornography is the act of using cyberspace to create, display, distribute, import or publish pornography or obscene materials, especially materials depicting children engaged in sexual acts with adults. Cyber pornography is a criminal offense classified as causing harm to persons.  Child pornography means to make ,produce, posses, distribute and sale pornographic materials that exploits minor childs (under the age of 18 ). Increasingly child pornography laws are being utilized to punish use of computer technology and the internet to obtain, share and distribute pornography material involving childrens.
  • 9. Punishment for cyber pornography  Under section 67 of the Information Technology Act, 2000 makes the following acts punishable with imprisonment upto 3 years and fine upto 5 lakhs : Publication – it includes uploading on website, whats app group or any other digital portal where third parties can have access to such content. Transmission – it includes seding obscene photos or images to any person via email, messaging ,whats app or any other form of digital media.  Section 67 (A) of the Information Technology Act makes publication ,transmission and causing to be transmitted and piblished in electronic form any material containing sexually explicit act or conduct, punishable with imprisonment upto 5 years and fine upto 10 lakhs.
  • 10. Hacking and Cracking  Hacking is the act of finding the possible entry points that exist in a computer system or a computer network finally entering into them.  Hacking is usually done to gain unauthorized access to a computer system or network ,either to harm the system or to steal sensitive information available on the computer.  Cracking on the other hand is a kind of hacking in which the person who cracks the security of the computer can download the information along with that it can modify the data also.
  • 11. Types of hacking  Website Hacking-: Hacking a website means taking control over a web server and its associated software.  Network Hacking-: Hacking a network means gathering information about a network by using tools like telnet, ping, tracert etc with intent to harm the network system and hamper its operation.  Email Hacking-: It includes getting unauthorized access on an email account and using it without the consent ot its owner.  Password Hacking-: This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.  Computer Hacking-:This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to computer system.  Ethical Hacking-:Ethical hacking involves finding weaknesses in a computer or network system for testing purpose anf finally getting them fixed. Ethical hacking is legal in india.
  • 12. Punishment for Hacking  Chapter Xl Section 66 of IT ACT, 2000 particularly deals with the act of hacking.  Section 66(1) defines a hack as any person, dishonestly or fraudulently does any act referred to in section 43 is called hacking and, section 66(2) prescribes the punishment for it. Hacking is punishable offense in India with imprisonment upto 3 years, or with fine upto 2 lakh rupees or both.  Chapter Xl Section 43 of IT ACT, 2000 prescribes a penalty for the damage to computer or computer system.  Chapter Xl Section 65 of the said act makes tampering with computer source documents an offence.
  • 13. Cyber Terrorism Cyber terrorism means doing unlawful things, through internet for political purposes to create hate in minds of people. It is any act which is done through cyberspace to create a threat in the minds of people or to breach the sovereignty, unity, or integrity of a country, or to provoke people or group of the people against the government.
  • 14. Punishment for cyber terrorism  Section 66 (f) provides punishment for cyber terrorism . Whoever - (A) With intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in people or any section of the people by- (i) Denying or cause the denial of access to any person authorized to access computer resource or, (B) Knowingly or intentionally gaining access to any computer resource and revealing the restricted information which may be used to cause injury to the intrests of the integrity of India, security of the state, friendly relations with foreign states, public order and decency or morality of the country. Whoever commits or conspires to commit cyber terrorism or above mentioned acts shall be punishable with imprisonment which may extend to imprisonment for life.
  • 15. Some more computer crimes are-:  Spoofing A Spoofing attack is a situation in which a person or program successfully masquerades (mask) as another by falsifying data, to gain Iligitimate advantage. • Email address spoofing • IP address spoofing  Phishing Phishing is the fraudulent attempt to obtain sensitive information such as username, passwords or credit card details, often for malicious reasons. Phishing is typically carried out by email spoofing or instant messaging and it often directs users to enter personal information at a fake website, which looks like the ligitimate site, the only difference being the URL of the website in concern.
  • 16.  Email bombing No. of mails (around 1000) at a time are send continuously at someones computers system or server, so that traffic can be created. Due to this the authorized person not be able to reach the real information. It is also a kind of Denial of Service attack (DOS).