SlideShare une entreprise Scribd logo
1  sur  25
CYBER CRIME
Science and crime
   Crime is a social and economic phenomenon
   “a legal wrong that can be followed by criminal
    proceedings which may result into
    punishment.”
   Legal definition : Crime is an intentional act
    of commission or omission in contravention
    to the law of the land and accordingly
    punishable when proved in judicial
    proceeding
   Conventional and new forms of crime
   White collar crime
   Organized crime
   Victimless crime
   The term “cyber crime” was first coined by
    Barry Collins in 1980’s
   “Any criminal activity that uses a computer
    either as an instrumentality, target or a means
    for perpetuating further crimes comes within
    the ambit of cyber crime”
   A generalized definition of cyber crime may
    be “ unlawful acts wherein the computer is
    either a tool or target or both”
   Capacity to store data in comparatively small
    space
   Easy to access
   Complex
   Negligence
   Loss of evidence
   The cyber criminals constitute of various
    groups/ category. The following are the
    category of cyber criminals:
•   Children and adolescents between the age
    group of 6 – 18 years
•   Organised hackers
•   Professional hackers / crackers
•   Discontented employees
   Hacking
   Theft of information contained in electronic
    form
   Email bombing
   Data diddling
   Salami attacks
   Denial of Service attack
   Virus / worm attacks
   Logic bombs
   Trojan attacks
   Internet time thefts
   Web jacking
Internal           Virus             worms              Trojan horses
Computer
crimes
Telecommunicati-   Phone breaking    Phone tapping      Hacking
on crimes

Computer           Embezzlements     Frauds
Manipulation
Crimes
Support of         Data bases to     Data bases to      Money laundering
Criminal           support drug      keep records of
Enterprises        Distribution      client
                                     transaction
Hardware and       Software piracy   Theft of computer Theft of trade
software                             and microchips    secrets
Theft
Classification of cyber crime
   1. Against            2. Against
  Individuals           Organization
a. their person &       a. Government      3. Against Society at
                               c.                  large
b. their property   Firm, Company, Group
 of an individual        of Individuals
    Harassment via e-mails.
   Cyber-stalking.
   Dissemination of obscene material.
   Defamation.
   Unauthorized control/access over computers
   Indecent exposure
   Email spoofing
    Cheating & Fraud
    Computer vandalism.
   Transmitting virus.
    Net trespass
    Unauthorized control/access over computers
   Intellectual Property crimes
    Internet time thefts
   Cyber terrorism against the government
    organization.
   Distribution of pirated software etc.
CYBER TERRORISM
Scientific war against
Governments
   Cyber terrorism is the convergence of terrorism
    and cyberspace. It is generally understood to
    mean unlawful attacks and threats of attack
    against computers, networks, and the
    information stored therein when done to
    intimidate or coerce a government or its people
    in furtherance of political or social objectives.
LTTE                     AUM

Perpetrator   Group/Individual          Group/Individual

Place         Sri                       Japan/US/Worldwide
              Lanka/London/Australia    Worldwide
Tool          Threats/Violence/Recruitm Violence/Recruitment/
              ent/Education/Strategies  Education/Strategies

Target        Government                Governments
              Officials/Recruits
Motivation    Social/Political Change   World Domination
   DETERRENCE
   CRIMINAL JUSTICE
   ENHANCED DEFENSE
   NEGOTIATIONS
    Pornography (basically child pornography)
    Polluting the youth through indecent
    exposure
    Trafficking
   Financial crimes
   Sale of illegal articles
   Online gambling
   Forgery
   The Indian parliament considered it necessary to give effect
    to the resolution by which the General Assembly adopted
    Model Law on Electronic Commerce adopted by the United
    Nations
   As a consequence of which the Information Technology Act
    2000 was passed and enforced on 17th May 2000.
   The Information Technology Act deals with the various cyber
    crimes in chapters IX & XI. The important sections are Ss.
    43,65,66,67
deals with the unauthorised access, unauthorised
Section 43   downloading, virus attacks or any contaminant, causes
             damage, disruption, denial of access, interference with
             the service availed by a person
             deals with ‘tampering with computer source documents’
Section 65   and provides for imprisonment up to 3 years or fine


             deals with ‘hacking with computer system’ and provides
Section 66   for imprisonment up to 3 years or fine


             deals with publication of obscene material and provides
section 67   for imprisonment up to a term of 10 years
   To prevent cyber stalking avoid disclosing any
    information pertaining to oneself. This is as good as
    disclosing your identity to strangers in public place.
   Always avoid sending any photograph online
    particularly to strangers and chat friends as there
    have been incidents of misuse of the photographs.
   Always use latest and up date anti virus software to
    guard against virus attacks.
   Always keep back up volumes so that one may not
    suffer data loss in case of virus contamination
   Never send your credit card number to any site that is
    not secured, to guard against frauds.
   Always keep a watch on the sites that your
    children are accessing to prevent any kind of
    harassment or depravation in children.
   Web site owners should watch traffic and check
    any irregularity on the site. Putting host-based
    intrusion detection devices on servers may do
    this
   Web servers running public sites must be
    physically separate protected from internal
    corporate network.
   History is the witness that no legislation has
    succeeded in totally eliminating crime from the globe.

   The only possible step is to make people aware of
    their rights and duties (to report crime as a collective
    duty towards the society) and further making the
    application of the laws more stringent to check crime.

   Undoubtedly the IT Act is a historical step in the cyber
    world. Further I all together do not deny that there is a
    need to bring changes in the Information Technology
    Act to make it more effective to combat cyber crime.

Contenu connexe

Tendances (20)

Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

En vedette

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among studentsjune21harsh
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentationsarahj6
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Jacqueline Fick
 
Secure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSecure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSkybox Security
 
Crime Detection And Prevention Method By Using HCI
Crime Detection And  Prevention Method By Using HCICrime Detection And  Prevention Method By Using HCI
Crime Detection And Prevention Method By Using HCIPAF KIET
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crimeELDO RAJU
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti SajibeKanti
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 

En vedette (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentation
 
Cybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber SpiesCybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber Spies
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...
 
Secure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSecure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual Intelligence
 
Crime Detection And Prevention Method By Using HCI
Crime Detection And  Prevention Method By Using HCICrime Detection And  Prevention Method By Using HCI
Crime Detection And Prevention Method By Using HCI
 
CRIME DETECTION
CRIME DETECTIONCRIME DETECTION
CRIME DETECTION
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crime
 
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti Understanding Cyber Crime and Cyber Security by Sajibe Kanti
Understanding Cyber Crime and Cyber Security by Sajibe Kanti
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 

Similaire à CYBER CRIME AND SCIENCE

Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 

Similaire à CYBER CRIME AND SCIENCE (20)

Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 

Plus de Paul Senthil

Plus de Paul Senthil (7)

CRPF
CRPFCRPF
CRPF
 
police force ppt.pptx
police force ppt.pptxpolice force ppt.pptx
police force ppt.pptx
 
Environmental administration
Environmental administrationEnvironmental administration
Environmental administration
 
Hr and un
Hr and unHr and un
Hr and un
 
Japan constitution
Japan constitutionJapan constitution
Japan constitution
 
Motivation
MotivationMotivation
Motivation
 
Ne gp
Ne gpNe gp
Ne gp
 

Dernier

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 

Dernier (20)

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 

CYBER CRIME AND SCIENCE

  • 2. Crime is a social and economic phenomenon  “a legal wrong that can be followed by criminal proceedings which may result into punishment.”  Legal definition : Crime is an intentional act of commission or omission in contravention to the law of the land and accordingly punishable when proved in judicial proceeding
  • 3. Conventional and new forms of crime  White collar crime  Organized crime  Victimless crime
  • 4. The term “cyber crime” was first coined by Barry Collins in 1980’s  “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”  A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both”
  • 5. Capacity to store data in comparatively small space  Easy to access  Complex  Negligence  Loss of evidence
  • 6. The cyber criminals constitute of various groups/ category. The following are the category of cyber criminals: • Children and adolescents between the age group of 6 – 18 years • Organised hackers • Professional hackers / crackers • Discontented employees
  • 7. Hacking  Theft of information contained in electronic form  Email bombing  Data diddling  Salami attacks  Denial of Service attack  Virus / worm attacks  Logic bombs
  • 8. Trojan attacks  Internet time thefts  Web jacking
  • 9. Internal Virus worms Trojan horses Computer crimes Telecommunicati- Phone breaking Phone tapping Hacking on crimes Computer Embezzlements Frauds Manipulation Crimes Support of Data bases to Data bases to Money laundering Criminal support drug keep records of Enterprises Distribution client transaction Hardware and Software piracy Theft of computer Theft of trade software and microchips secrets Theft
  • 10. Classification of cyber crime 1. Against 2. Against Individuals Organization a. their person & a. Government 3. Against Society at c. large b. their property Firm, Company, Group of an individual of Individuals
  • 11. Harassment via e-mails.  Cyber-stalking.  Dissemination of obscene material.  Defamation.  Unauthorized control/access over computers  Indecent exposure  Email spoofing  Cheating & Fraud
  • 12. Computer vandalism.  Transmitting virus.  Net trespass  Unauthorized control/access over computers  Intellectual Property crimes  Internet time thefts
  • 13. Cyber terrorism against the government organization.  Distribution of pirated software etc.
  • 14. CYBER TERRORISM Scientific war against Governments
  • 15. Cyber terrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
  • 16. LTTE AUM Perpetrator Group/Individual Group/Individual Place Sri Japan/US/Worldwide Lanka/London/Australia Worldwide Tool Threats/Violence/Recruitm Violence/Recruitment/ ent/Education/Strategies Education/Strategies Target Government Governments Officials/Recruits Motivation Social/Political Change World Domination
  • 17. DETERRENCE  CRIMINAL JUSTICE  ENHANCED DEFENSE  NEGOTIATIONS
  • 18. Pornography (basically child pornography)  Polluting the youth through indecent exposure  Trafficking  Financial crimes  Sale of illegal articles  Online gambling  Forgery
  • 19.
  • 20.
  • 21. The Indian parliament considered it necessary to give effect to the resolution by which the General Assembly adopted Model Law on Electronic Commerce adopted by the United Nations  As a consequence of which the Information Technology Act 2000 was passed and enforced on 17th May 2000.  The Information Technology Act deals with the various cyber crimes in chapters IX & XI. The important sections are Ss. 43,65,66,67
  • 22. deals with the unauthorised access, unauthorised Section 43 downloading, virus attacks or any contaminant, causes damage, disruption, denial of access, interference with the service availed by a person deals with ‘tampering with computer source documents’ Section 65 and provides for imprisonment up to 3 years or fine deals with ‘hacking with computer system’ and provides Section 66 for imprisonment up to 3 years or fine deals with publication of obscene material and provides section 67 for imprisonment up to a term of 10 years
  • 23. To prevent cyber stalking avoid disclosing any information pertaining to oneself. This is as good as disclosing your identity to strangers in public place.  Always avoid sending any photograph online particularly to strangers and chat friends as there have been incidents of misuse of the photographs.  Always use latest and up date anti virus software to guard against virus attacks.  Always keep back up volumes so that one may not suffer data loss in case of virus contamination  Never send your credit card number to any site that is not secured, to guard against frauds.
  • 24. Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children.  Web site owners should watch traffic and check any irregularity on the site. Putting host-based intrusion detection devices on servers may do this  Web servers running public sites must be physically separate protected from internal corporate network.
  • 25. History is the witness that no legislation has succeeded in totally eliminating crime from the globe.  The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime.  Undoubtedly the IT Act is a historical step in the cyber world. Further I all together do not deny that there is a need to bring changes in the Information Technology Act to make it more effective to combat cyber crime.