SlideShare a Scribd company logo
1 of 23
Download to read offline
IT ACT AND CYBER CRIME

Made by:
Introduction
IT Act 2000 neither defines Cyber Crime nor uses this
expression only provide definition and punishment for
certain offences.

                        Definitions
1)Narrowly defined ‘cyber crime ‘ consist of only those offences
provided in the Information Technology Act 2000.
2)Broadly stated ,’cybercrime’ can be set to be an act of
commission or omission ,committed on or through or with the
help of or connected with the internet ,whether directly or
indirectly ,which is prohibited by any law and for which
punishment, monetary and /or corporal is provided.
Classification of Cyber Crimes

• 1) Old Crimes , committed on or through the
  new medium of the Internet.
• 2) New Crimes created with Internet Itself.
• 3) New Crimes used for commission of old
  Crimes.
Classification by Nature of Usage of
                  Computer
• 1)Hacking – Computer & Network are
  essential
• 2)Cyber Pornography – medium of net is used
• 3)Cyber fraud – Only Computer is identical for
  commission
Information Technology Act 2000
• It shall extend to the whole of India and save
  as otherwise provided in this act , It applies
  also to any offence or contravention here
  under committed outside India by any person.
• It shall come into force on such date as the
  Central Government may , by notification
  , appoint and different dates may be
  appointed for different provision of the act.
Definition of IT Act
•   Access
•   Addressee
•   Data
•   Digital Signature
•   Electronic form
•   Electronic Gazette
•   Electronic Record
•   Function
•   Information
•   License
•   Private key
•   Public key
•   Secure System
HACKING
INTRODUCTION
Programmable system
Simple to execute
Vulnerability of websites
Biggest threats to internet & e-commerce
DEFINITION
It refers to hobby or
profession of working with
computer
Destroys or deletes or
alters
TYPES
•Code hackers
•Phreakers
•Cyber-punks
•Crackers
TAMPERING WITH COMPUTER
         SOURCE DOCUMENTS
MEANING
• According to section 65 of the IT Act
• Whoever knowingly or intentionally
• conceals, destroys or alters or intentionally
• or knowingly causes another to conceal,
• destroy or alter any computer source code
• used for a computer, computer programme,
    computer system or computer network,
• when the computer source code is required
  • to be kept or maintained by law for the
                      time
               • being in force
Tampering with Computer Source
                Code
• Actions covered:- Knowingly or intentionally
  concealing, altering or destroying computer
  source code (or causing someone else to do
  so)
• Penalty:- Imprisonment up to 3 years and /
  or fine up to Rs 2 lakh
• Relevant authority :- Judicial    Magistrate
  First Class
• Appeal lies to:- Court of Session
Cyber Fraud & Cheating
• Fraud on internet constitutes about one-third of all cyber
  crimes
• It has increased by a substantial 29% over the past year.
• It is the most profitable business on the Internet
• Some of the major areas of fraud and cheating on the Internet
  include misuse of credit cards by obtaining passwords by
  hacking , bogus investment/get rich schemes , deceptive
  investment newsletters containing false information about
  companies , non delivery of goods purchased from online
  auctions and websites , misappropriation & transfer of funds ,
  etc
IT Laws relating to Cyber
Fraud & Cheating
Section in IPC   Offence                     Punishment
       403       Dishonest                   Imprisonment which
                 misappropriation of         may extend to two years
                 property.                   , or with fine , or both.
     405 , 406   Criminal breach of trust    Imprisonment which
                                             may extend to three
                                             years , or with fine , or
                                             both.
       468       Forgery for the purpose     Imprisonment which
                 of cheating.                may extend to seven
                                             years and fine.
      477 A      Falsification of accounts   Imprisonment which
                                             may extend to seven
                                             years , or with fine , or
                                             both.
       482       Using a false property      Imprisonment which
                 mark.                       may extend to one year ,
                                             or with fine , or both.
CYBER TERRORISM
Government officials and Information Technology security specialists have
documented a significant increase in Internet problems and server scans
since early 2001. But there is a growing concern among federal officials that
such intrusions are part of an organized effort by cyber terrorists, foreign
intelligence services, or other groups to map potential security holes in
critical systems. A cyber terrorist is someone who intimidates or coerces a
government or organization to advance his or her political or social
objectives by launching computer-based attack against computers,
network, and the information stored on them.
Cyber terrorism in general, can be defined as an act of terrorism committed
through the use of cyberspace or computer resources (Parker 1983). As
such, a simple propaganda in the Internet, that there will be bomb attacks
during the holidays can be considered cyber terrorism. As well there are
also hacking activities directed towards individuals, families, organized by
groups within networks, tending to cause fear among people, demonstrate
power, collecting information relevant for ruining peoples' lives, robberies,
blackmailing etc.
Cyber Pornography
•   There is no settled definition of pornography or obscenity. What is
•   considered simply sexually explicit but not obscene in USA may well be
•   considered obscene in India. There have been many attempts to limit the
•   availability of pornographic content on the Internet by governments and
•   law enforcement bodies all around the world but with little effect.
•   Pornography on the Internet is available in different formats. These range
•   from pictures and short animated movies, to sound files and stories. The
•   Internet also makes it possible to discuss sex, see live sex acts, and
•   arrange sexual activities from computer screens. Although the Indian
•   Constitution guarantees the fundamental right of freedom of speech and
•   expression, it has been held that a law against obscenity is constitutional.
•   The Supreme Court has defined obscene as “offensive to modesty or
•   decency; lewd, filthy, repulsive.
Section 67 of the IT Act is
the most serious Indian
law penalizing cybercrime
•According to Section 67 of the IT Act
•Whoever publishes or transmits or causes
•to be published in the electronic form, any
•material which is lascivious or appeals to
•the prurient interest or if its effect is such as
•to tend to deprave and corrupt persons who
•are likely, having regard to all relevant
•circumstances, to read, see or hear the
•matter contained or embodied in it, shall be
•punished on first conviction with
•imprisonment of either description for a
•term which may extend to five years and
•with fine which may extend to one lakh
•rupees and in the event of a second or
•subsequent conviction with imprisonment of
•either description for a term which may
•extend to ten years and also with fine which
•may extend to two lakh rupees.
How to stop cyber crime


Anti Virus


Firewall
ON INDIVIDUAL LEVEL
• Use hard to get password

• Disconnect from internet when not in use

• Don’t give your password to anyone.

• Don’t give your personal information on
  “SOCIAL NETWORKING SITES”
On Organizational Level

   Regular backup


 Use comprehensive security software and keep your system updated


 Secure your wireless network


 Be suspicious
Thank You
  

More Related Content

What's hot (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 

Viewers also liked

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
Chapter 3 servlet & jsp
Chapter 3 servlet & jspChapter 3 servlet & jsp
Chapter 3 servlet & jspJafar Nesargi
 
Servlets - filter, listeners, wrapper, internationalization
Servlets -  filter, listeners, wrapper, internationalizationServlets -  filter, listeners, wrapper, internationalization
Servlets - filter, listeners, wrapper, internationalizationsusant sahu
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 
Java Servlets
Java ServletsJava Servlets
Java ServletsEmprovise
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000Robin Kapoor
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 
1 java servlets and jsp
1   java servlets and jsp1   java servlets and jsp
1 java servlets and jspAnkit Minocha
 

Viewers also liked (20)

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Chapter 3 servlet & jsp
Chapter 3 servlet & jspChapter 3 servlet & jsp
Chapter 3 servlet & jsp
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Servlets - filter, listeners, wrapper, internationalization
Servlets -  filter, listeners, wrapper, internationalizationServlets -  filter, listeners, wrapper, internationalization
Servlets - filter, listeners, wrapper, internationalization
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Class it act
Class it actClass it act
Class it act
 
Java Servlets
Java ServletsJava Servlets
Java Servlets
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
It act 2000
It act 2000It act 2000
It act 2000
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Chapter 06 Information Technology Act 2000
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
1 java servlets and jsp
1   java servlets and jsp1   java servlets and jsp
1 java servlets and jsp
 

Similar to Cyber fraud

Similar to Cyber fraud (20)

Cyber law comp
Cyber law compCyber law comp
Cyber law comp
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Shilpa
ShilpaShilpa
Shilpa
 
Vipul pdf
Vipul pdfVipul pdf
Vipul pdf
 
Cyber laws
Cyber laws Cyber laws
Cyber laws
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber law
Cyber law Cyber law
Cyber law
 
Cyber law01
Cyber law01Cyber law01
Cyber law01
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Prashant and team cyber law
Prashant and team cyber lawPrashant and team cyber law
Prashant and team cyber law
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Cyber Law.pptx
Cyber Law.pptxCyber Law.pptx
Cyber Law.pptx
 
CYBERLAW & IT ACT
CYBERLAW & IT ACTCYBERLAW & IT ACT
CYBERLAW & IT ACT
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 

Recently uploaded

Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Osopher
 
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...DrVipulVKapoor
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...Nguyen Thanh Tu Collection
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...Nguyen Thanh Tu Collection
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...Nguyen Thanh Tu Collection
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 
Unit :1 Basics of Professional Intelligence
Unit :1 Basics of Professional IntelligenceUnit :1 Basics of Professional Intelligence
Unit :1 Basics of Professional IntelligenceDr Vijay Vishwakarma
 
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 8 - CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC ...
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 8 - CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC ...BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 8 - CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC ...
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 8 - CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC ...Nguyen Thanh Tu Collection
 
Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxryandux83rd
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptxmary850239
 
physiotherapy in Acne condition.....pptx
physiotherapy in Acne condition.....pptxphysiotherapy in Acne condition.....pptx
physiotherapy in Acne condition.....pptxAneriPatwari
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
 
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
Geoffrey Chaucer Works II UGC NET JRF TGT PGT MA PHD Entrance Exam II History...
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
 
Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
Unit :1 Basics of Professional Intelligence
Unit :1 Basics of Professional IntelligenceUnit :1 Basics of Professional Intelligence
Unit :1 Basics of Professional Intelligence
 
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 8 - CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC ...
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 8 - CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC ...BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 8 - CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC ...
BÀI TẬP BỔ TRỢ 4 KĨ NĂNG TIẾNG ANH LỚP 8 - CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC ...
 
Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptx
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx
 
physiotherapy in Acne condition.....pptx
physiotherapy in Acne condition.....pptxphysiotherapy in Acne condition.....pptx
physiotherapy in Acne condition.....pptx
 
CARNAVAL COM MAGIA E EUFORIA _
CARNAVAL COM MAGIA E EUFORIA            _CARNAVAL COM MAGIA E EUFORIA            _
CARNAVAL COM MAGIA E EUFORIA _
 
Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 

Cyber fraud

  • 1. IT ACT AND CYBER CRIME Made by:
  • 2. Introduction IT Act 2000 neither defines Cyber Crime nor uses this expression only provide definition and punishment for certain offences. Definitions 1)Narrowly defined ‘cyber crime ‘ consist of only those offences provided in the Information Technology Act 2000. 2)Broadly stated ,’cybercrime’ can be set to be an act of commission or omission ,committed on or through or with the help of or connected with the internet ,whether directly or indirectly ,which is prohibited by any law and for which punishment, monetary and /or corporal is provided.
  • 3. Classification of Cyber Crimes • 1) Old Crimes , committed on or through the new medium of the Internet. • 2) New Crimes created with Internet Itself. • 3) New Crimes used for commission of old Crimes.
  • 4. Classification by Nature of Usage of Computer • 1)Hacking – Computer & Network are essential • 2)Cyber Pornography – medium of net is used • 3)Cyber fraud – Only Computer is identical for commission
  • 5. Information Technology Act 2000 • It shall extend to the whole of India and save as otherwise provided in this act , It applies also to any offence or contravention here under committed outside India by any person. • It shall come into force on such date as the Central Government may , by notification , appoint and different dates may be appointed for different provision of the act.
  • 6. Definition of IT Act • Access • Addressee • Data • Digital Signature • Electronic form • Electronic Gazette • Electronic Record • Function • Information • License • Private key • Public key • Secure System
  • 7. HACKING INTRODUCTION Programmable system Simple to execute Vulnerability of websites Biggest threats to internet & e-commerce
  • 8. DEFINITION It refers to hobby or profession of working with computer Destroys or deletes or alters
  • 10. TAMPERING WITH COMPUTER SOURCE DOCUMENTS MEANING • According to section 65 of the IT Act • Whoever knowingly or intentionally • conceals, destroys or alters or intentionally • or knowingly causes another to conceal, • destroy or alter any computer source code • used for a computer, computer programme, computer system or computer network, • when the computer source code is required • to be kept or maintained by law for the time • being in force
  • 11. Tampering with Computer Source Code • Actions covered:- Knowingly or intentionally concealing, altering or destroying computer source code (or causing someone else to do so) • Penalty:- Imprisonment up to 3 years and / or fine up to Rs 2 lakh • Relevant authority :- Judicial Magistrate First Class • Appeal lies to:- Court of Session
  • 12.
  • 13. Cyber Fraud & Cheating • Fraud on internet constitutes about one-third of all cyber crimes • It has increased by a substantial 29% over the past year. • It is the most profitable business on the Internet • Some of the major areas of fraud and cheating on the Internet include misuse of credit cards by obtaining passwords by hacking , bogus investment/get rich schemes , deceptive investment newsletters containing false information about companies , non delivery of goods purchased from online auctions and websites , misappropriation & transfer of funds , etc
  • 14. IT Laws relating to Cyber Fraud & Cheating
  • 15. Section in IPC Offence Punishment 403 Dishonest Imprisonment which misappropriation of may extend to two years property. , or with fine , or both. 405 , 406 Criminal breach of trust Imprisonment which may extend to three years , or with fine , or both. 468 Forgery for the purpose Imprisonment which of cheating. may extend to seven years and fine. 477 A Falsification of accounts Imprisonment which may extend to seven years , or with fine , or both. 482 Using a false property Imprisonment which mark. may extend to one year , or with fine , or both.
  • 16. CYBER TERRORISM Government officials and Information Technology security specialists have documented a significant increase in Internet problems and server scans since early 2001. But there is a growing concern among federal officials that such intrusions are part of an organized effort by cyber terrorists, foreign intelligence services, or other groups to map potential security holes in critical systems. A cyber terrorist is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attack against computers, network, and the information stored on them. Cyber terrorism in general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources (Parker 1983). As such, a simple propaganda in the Internet, that there will be bomb attacks during the holidays can be considered cyber terrorism. As well there are also hacking activities directed towards individuals, families, organized by groups within networks, tending to cause fear among people, demonstrate power, collecting information relevant for ruining peoples' lives, robberies, blackmailing etc.
  • 17. Cyber Pornography • There is no settled definition of pornography or obscenity. What is • considered simply sexually explicit but not obscene in USA may well be • considered obscene in India. There have been many attempts to limit the • availability of pornographic content on the Internet by governments and • law enforcement bodies all around the world but with little effect. • Pornography on the Internet is available in different formats. These range • from pictures and short animated movies, to sound files and stories. The • Internet also makes it possible to discuss sex, see live sex acts, and • arrange sexual activities from computer screens. Although the Indian • Constitution guarantees the fundamental right of freedom of speech and • expression, it has been held that a law against obscenity is constitutional. • The Supreme Court has defined obscene as “offensive to modesty or • decency; lewd, filthy, repulsive.
  • 18. Section 67 of the IT Act is the most serious Indian law penalizing cybercrime
  • 19. •According to Section 67 of the IT Act •Whoever publishes or transmits or causes •to be published in the electronic form, any •material which is lascivious or appeals to •the prurient interest or if its effect is such as •to tend to deprave and corrupt persons who •are likely, having regard to all relevant •circumstances, to read, see or hear the •matter contained or embodied in it, shall be •punished on first conviction with •imprisonment of either description for a •term which may extend to five years and •with fine which may extend to one lakh •rupees and in the event of a second or •subsequent conviction with imprisonment of •either description for a term which may •extend to ten years and also with fine which •may extend to two lakh rupees.
  • 20. How to stop cyber crime Anti Virus Firewall
  • 21. ON INDIVIDUAL LEVEL • Use hard to get password • Disconnect from internet when not in use • Don’t give your password to anyone. • Don’t give your personal information on “SOCIAL NETWORKING SITES”
  • 22. On Organizational Level  Regular backup  Use comprehensive security software and keep your system updated  Secure your wireless network  Be suspicious
  • 23. Thank You 