Cyber Crimeand Cyber Laws

Suryakanta Rout
Suryakanta RoutStudent à College of Engineering and Technology
Presented by:
Jayashree Dora
Regd. No:1205106025
4th Sem, MCA
Guided by:
Mr. Manjit Ku. Nayak
Dept. of CSA
History of Cyber Crime
Introduction to Cyber
Crime
Classification of Cyber
Crime
Categories of Cyber
Crime
Types of Cyber Crime
Who are Cyber
Criminals?
Cyber Crime in India
Need of Cyber Laws
 The first recorded cyber crime took place in the year 1820!
 In1981 Ian Murphy, becomes first felon convicted of a
computer crime.
 In 1982 Elk Cloner, an Apple II boot virus, is written.
 In 1985 Online hacking magazine Phrack established.
 In 1986 Pakistani Brain, the oldest virus created under
unauthorized circumstances, infects IBM computers.
 In 1987 Computer Emergency Response Team (CERT)
created.
 In 1988 Kevin Mitnick secretly monitors the e-mail of MCI
and Digital Equipment corporation (DEC) security officials.
He is convicted and sentenced to a year in jail.
In 1989 Hackers in West Germany are arrested for
breaking into US government and corporate
computers and selling operating-system source
code to the KGB.
In 1990 The Electronic Frontier Foundation (EFF)
is formed.
Legion of Doom and Masters of Deception
engaged in online warfare - jamming phone lines,
monitoring calls, trespassing in each other's
private computers.
 Cyber Crime is a term used to broadly describe criminal activity in
which computers or computer networks are a tool, a target, or a
place of criminal activity and include everything from electronic
cracking to denial of service attacks.
 It’s an unlawful act where in the computer is either a tool or a target
or both.
 Computer crime mainly consists of unauthorized access to
computer systems data alteration, data destruction, theft of
intellectual property. Cyber crime in the context of national
security may involve hacking, traditional espionage,.
 Cybercrime includes a wide variety of crime
 Offences under cyber crime:
o Offences against the confidentiality, integrity and
availability of computer data and systems
o Copyright-related offences
Cyber crimes can be basically divided into 3 major
categories:
1. Cyber crimes against persons
2. Cyber crimes against property
3. Cyber crimes against government
Cyber Crimeand Cyber Laws
Kids (age group 9-16 etc.)
Organized hack activists
Disgruntled employees
Professional hackers (corporate espionage)
India stands 11th in the ranking for Cyber Crime in the World,
constituting 3% of the Global Cyber Crime.
121 Million Internet Users
65 Million Active Internet Users, up by 28%
from 51 million in 2010
50 Million users shop online on Ecommerce
and Online Shopping Sites
46+ Million Social Network Users
346 million mobile users had subscribed to
Data Packages.
The majority of cybercrimes are centered on forgery, fraud and
Phishing,
 India is the third-most targeted country for Phishing attacks
after the US and the UK,
 Social networks as well as ecommerce sites are major targets,
 6.9 million bot-infected systems in 2010,
 14,348 website defacements in 2010,
 6,850 .in and 4,150 .com domains were defaced during 2011,
 15,000 sites hacked in 2011,
 India is the number 1 country in the world for generating spam.
• 29.9 million people fell victim to cybercrime,
• $4 billion in direct financial losses,
• $3.6 billion in time spent resolving the crime,
• 4 in 5 online adults (80%) have been a victim of
Cybercrime,
• 17% of adults online have experienced cyber
crime on their mobiles.
Cyber Law is the law governing cyber space. Cyber
space is a very wide term and includes computers,
networks, software, data storage devices (such as
hard disks, USB disks etc), the Internet, websites,
emails and even electronic devices such as cell
phones, ATM machines etc.
 TACKLING CYBER CRIMES
 Laws are necessary in all segments of
society, and e-commerce.
 All Internet users, including minors, need to be assured of their
privacy and the safety of their personal information online.
• The primary source of cyber law in India is the Information
Technology Act, 2000 (IT Act) which came into force on 17 October
2000.
• The primary purpose of the Act is to provide legal recognition to
electronic commerce and to facilitate filing of electronic records with
the Government.
• The IT Act also penalizes various cyber crimes and provides strict
punishments (imprisonment terms up to 10 years and compensation
up to Rs 1(crore)
• email would now be a valid and legal form of
communication in our country that can be duly produced
and approved in a court of law.
• Companies shall now be able to carry out electronic
commerce using the legal infrastructure provided by the
Act.
• Digital signatures have been given legal validity and
sanction in the Act.
 HACKING WITH
COMPUTER SYSTEM
 PUBLISHING OBSCENE
MATERIAL ON INTERNET
 BREACHING OF CONFIDENTIALITY
AND PRIVACY
• INDIAN PENAL CODE,1860
• INDIAN EVIDENCE ACT,1872
• Under the IT Act, 966 cybercrime cases were
filed in 2010 420 in 2009)
• 233 persons were arrested in 2010
• 33% of the cases registered were related to
hacking
• Under the IPC, 356 cybercrime cases were
registered in 2010
• The majority of these crimes were either
forgery or fraud cases
“As internet technology advances so does the threat of
cyber crime. In times like these we must protect
ourselves from cyber crime. Anti-virus software, firewalls
and security patches are just the beginning. Never open
suspicious e-mails and only navigate to trusted sites
• CYBER LAWS_ ESSENTIAL FEATURE IN TODAYS
WORLD OF INTERNET •
• ACHIEVING GLOBAL PEACE AND HARMONY
• www.slideshares.net
• en.wikipedia.org
• please.hackmii.com
Cyber Crimeand Cyber Laws
1 sur 23

Recommandé

Cyber law par
Cyber lawCyber law
Cyber lawGNIM,Mullana (Ambala)
559 vues13 diapositives
Cyber law final par
Cyber law finalCyber law final
Cyber law finaljaskiran_sahni
1K vues17 diapositives
Cyber law par
Cyber lawCyber law
Cyber lawArnab Roy Chowdhury
108.4K vues31 diapositives
IT Act 2000 Penalties, Offences with case studies par
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies Network Intelligence India
66.1K vues24 diapositives
Cyber law final par
Cyber law finalCyber law final
Cyber law finalKanhaiya Kumar
1.1K vues18 diapositives
INDIAN CYBERLAW AND SECURITY par
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
7.4K vues39 diapositives

Contenu connexe

Tendances

Information technology act par
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
12.1K vues35 diapositives
Internet Security and Legal Compliance: Cyber Law in India par
Internet Security and Legal Compliance: Cyber Law in IndiaInternet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in IndiaRodney D. Ryder
3.1K vues46 diapositives
IT ACT, 2000 (Information Technology Act, 2000) par
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
5.4K vues75 diapositives
Indian Cyber laws par
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
1.3K vues23 diapositives
Cyber laws - Ritu Gautam par
Cyber laws - Ritu GautamCyber laws - Ritu Gautam
Cyber laws - Ritu GautamRitu Gautam
998 vues140 diapositives
Information Technology and IT act par
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
874 vues45 diapositives

Tendances(20)

Information technology act par AKSHAY KHATRI
Information technology actInformation technology act
Information technology act
AKSHAY KHATRI12.1K vues
Internet Security and Legal Compliance: Cyber Law in India par Rodney D. Ryder
Internet Security and Legal Compliance: Cyber Law in IndiaInternet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in India
Rodney D. Ryder3.1K vues
Indian Cyber laws par mulikaa
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
mulikaa1.3K vues
Cyber laws - Ritu Gautam par Ritu Gautam
Cyber laws - Ritu GautamCyber laws - Ritu Gautam
Cyber laws - Ritu Gautam
Ritu Gautam998 vues
Information Technology and IT act par Divesh Mewara
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
Divesh Mewara874 vues
cyber law IT Act 2000 par Yash Jain
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
Yash Jain1.4K vues
An Introduction to Cyber Law - I.T. Act 2000 (India) par Chetan Bharadwaj
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj58K vues
Chapter 06 Information Technology Act 2000 par Robin Kapoor
Chapter 06   Information Technology Act 2000Chapter 06   Information Technology Act 2000
Chapter 06 Information Technology Act 2000
Robin Kapoor10.8K vues
National workshop on handling cybercrime ,1st feb 2014 it act,2000 par Karnika Seth
National workshop on handling cybercrime ,1st feb 2014 it act,2000National workshop on handling cybercrime ,1st feb 2014 it act,2000
National workshop on handling cybercrime ,1st feb 2014 it act,2000
Karnika Seth1.1K vues
Cybercrime Investigations and IT Act,2000 par Karnika Seth
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
Karnika Seth11.2K vues
Cyber Law par ihah
Cyber LawCyber Law
Cyber Law
ihah3.6K vues
Introduction to Cyber law (IT Act 2000) par Ambar Deo
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
Ambar Deo1.5K vues

En vedette

Tools and methods used in cybercrime par
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
29.3K vues56 diapositives
Cyber Laws In Pakistan par
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
29K vues40 diapositives
Cyber crime ppt par
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
344.1K vues30 diapositives
The Rise of Cybercrime 1970s - 2010 par
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010- Mark - Fullbright
6.2K vues17 diapositives
Cyber Crime par
Cyber CrimeCyber Crime
Cyber Crimevivek sharma
777 vues15 diapositives

En vedette(20)

Tools and methods used in cybercrime par patelripal99
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
patelripal9929.3K vues
Cyber crime ppt par MOE515253
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253344.1K vues
Cyber crime and cyber laws par ishmecse13
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
ishmecse133.6K vues
Information technology-act 2000- an overview-sethassociatesppt par Diya Mirza
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
Diya Mirza21.6K vues
Cyber crime among students par june21harsh
Cyber crime among studentsCyber crime among students
Cyber crime among students
june21harsh34.2K vues
Cyber law In India: its need & importance par Aditya Shukla
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
Aditya Shukla83.7K vues
Cyber Governemace In Pakistan par Shakeel Ahmed
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
Shakeel Ahmed3.7K vues
Information technology act 2000 par Akash Varaiya
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya187.3K vues
Cybercrime presentation par Rajat Jain
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain146.3K vues

Similaire à Cyber Crimeand Cyber Laws

Cyberlaws report par
Cyberlaws reportCyberlaws report
Cyberlaws reportAnirudhRaju6
50 vues4 diapositives
Cyber law in India: Its need & importance par
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
3.9K vues33 diapositives
Cyber crime correct par
Cyber crime correctCyber crime correct
Cyber crime correctWaheed Rana
279 vues3 diapositives
138740042-cyber-law.pptx par
138740042-cyber-law.pptx138740042-cyber-law.pptx
138740042-cyber-law.pptxRahuljain40418
4 vues17 diapositives
Cyber crime in India PPT .pptx par
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptxTushar Bisen
3.2K vues14 diapositives
Cyber crime par
Cyber crimeCyber crime
Cyber crimeJASJIT SINGH
797 vues20 diapositives

Similaire à Cyber Crimeand Cyber Laws(20)

Cyber law in India: Its need & importance par Aditya Shukla
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
Aditya Shukla3.9K vues
Cyber crime in India PPT .pptx par Tushar Bisen
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
Tushar Bisen3.2K vues
It act and cyber crime par Dheeraj Dani
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani4.6K vues
Introduction to Cyber Crimes par atuljaybhaye
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye6.3K vues
Cyberlaw and Cybercrime par Pravir Karna
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna21.2K vues
Cyber Crime(Hacking) - IT acts par Jayati Tiwari
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
Jayati Tiwari133 vues
Cyber crime:The Transformation Of Crime In The Information Age. par Omkar Walavalkar
Cyber crime:The Transformation Of Crime In The Information Age.Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.
Omkar Walavalkar243 vues

Plus de Suryakanta Rout

Light Fidelity(Li-Fi) Technology par
Light Fidelity(Li-Fi) TechnologyLight Fidelity(Li-Fi) Technology
Light Fidelity(Li-Fi) TechnologySuryakanta Rout
4.1K vues21 diapositives
zForce Touch Screen Technology par
zForce Touch Screen TechnologyzForce Touch Screen Technology
zForce Touch Screen TechnologySuryakanta Rout
10.7K vues18 diapositives
Green Computing par
Green ComputingGreen Computing
Green ComputingSuryakanta Rout
1.7K vues17 diapositives
3D INTERNET par
3D INTERNET3D INTERNET
3D INTERNETSuryakanta Rout
2.7K vues24 diapositives
Microsoft Palladium par
Microsoft PalladiumMicrosoft Palladium
Microsoft PalladiumSuryakanta Rout
2.9K vues20 diapositives
Li-Fi Technology par
Li-Fi TechnologyLi-Fi Technology
Li-Fi TechnologySuryakanta Rout
701 vues17 diapositives

Dernier

How to think like a threat actor for Kubernetes.pptx par
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptxLibbySchulze1
7 vues33 diapositives
Affiliate Marketing par
Affiliate MarketingAffiliate Marketing
Affiliate MarketingNavin Dhanuka
20 vues30 diapositives
hamro digital logics.pptx par
hamro digital logics.pptxhamro digital logics.pptx
hamro digital logics.pptxtupeshghimire
11 vues36 diapositives
WITS Deck par
WITS DeckWITS Deck
WITS DeckW.I.T.S.
18 vues22 diapositives
ATPMOUSE_융합2조.pptx par
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptxkts120898
35 vues70 diapositives
The Dark Web : Hidden Services par
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
19 vues24 diapositives

Cyber Crimeand Cyber Laws

  • 1. Presented by: Jayashree Dora Regd. No:1205106025 4th Sem, MCA Guided by: Mr. Manjit Ku. Nayak Dept. of CSA
  • 2. History of Cyber Crime Introduction to Cyber Crime Classification of Cyber Crime Categories of Cyber Crime Types of Cyber Crime Who are Cyber Criminals? Cyber Crime in India Need of Cyber Laws
  • 3.  The first recorded cyber crime took place in the year 1820!  In1981 Ian Murphy, becomes first felon convicted of a computer crime.  In 1982 Elk Cloner, an Apple II boot virus, is written.  In 1985 Online hacking magazine Phrack established.  In 1986 Pakistani Brain, the oldest virus created under unauthorized circumstances, infects IBM computers.  In 1987 Computer Emergency Response Team (CERT) created.  In 1988 Kevin Mitnick secretly monitors the e-mail of MCI and Digital Equipment corporation (DEC) security officials. He is convicted and sentenced to a year in jail.
  • 4. In 1989 Hackers in West Germany are arrested for breaking into US government and corporate computers and selling operating-system source code to the KGB. In 1990 The Electronic Frontier Foundation (EFF) is formed. Legion of Doom and Masters of Deception engaged in online warfare - jamming phone lines, monitoring calls, trespassing in each other's private computers.
  • 5.  Cyber Crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks.  It’s an unlawful act where in the computer is either a tool or a target or both.  Computer crime mainly consists of unauthorized access to computer systems data alteration, data destruction, theft of intellectual property. Cyber crime in the context of national security may involve hacking, traditional espionage,.
  • 6.  Cybercrime includes a wide variety of crime  Offences under cyber crime: o Offences against the confidentiality, integrity and availability of computer data and systems o Copyright-related offences
  • 7. Cyber crimes can be basically divided into 3 major categories: 1. Cyber crimes against persons 2. Cyber crimes against property 3. Cyber crimes against government
  • 9. Kids (age group 9-16 etc.) Organized hack activists Disgruntled employees Professional hackers (corporate espionage)
  • 10. India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the Global Cyber Crime.
  • 11. 121 Million Internet Users 65 Million Active Internet Users, up by 28% from 51 million in 2010 50 Million users shop online on Ecommerce and Online Shopping Sites 46+ Million Social Network Users 346 million mobile users had subscribed to Data Packages.
  • 12. The majority of cybercrimes are centered on forgery, fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK,  Social networks as well as ecommerce sites are major targets,  6.9 million bot-infected systems in 2010,  14,348 website defacements in 2010,  6,850 .in and 4,150 .com domains were defaced during 2011,  15,000 sites hacked in 2011,  India is the number 1 country in the world for generating spam.
  • 13. • 29.9 million people fell victim to cybercrime, • $4 billion in direct financial losses, • $3.6 billion in time spent resolving the crime, • 4 in 5 online adults (80%) have been a victim of Cybercrime, • 17% of adults online have experienced cyber crime on their mobiles.
  • 14. Cyber Law is the law governing cyber space. Cyber space is a very wide term and includes computers, networks, software, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc.
  • 15.  TACKLING CYBER CRIMES  Laws are necessary in all segments of society, and e-commerce.  All Internet users, including minors, need to be assured of their privacy and the safety of their personal information online.
  • 16. • The primary source of cyber law in India is the Information Technology Act, 2000 (IT Act) which came into force on 17 October 2000. • The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government. • The IT Act also penalizes various cyber crimes and provides strict punishments (imprisonment terms up to 10 years and compensation up to Rs 1(crore)
  • 17. • email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. • Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. • Digital signatures have been given legal validity and sanction in the Act.
  • 18.  HACKING WITH COMPUTER SYSTEM  PUBLISHING OBSCENE MATERIAL ON INTERNET  BREACHING OF CONFIDENTIALITY AND PRIVACY
  • 19. • INDIAN PENAL CODE,1860 • INDIAN EVIDENCE ACT,1872
  • 20. • Under the IT Act, 966 cybercrime cases were filed in 2010 420 in 2009) • 233 persons were arrested in 2010 • 33% of the cases registered were related to hacking • Under the IPC, 356 cybercrime cases were registered in 2010 • The majority of these crimes were either forgery or fraud cases
  • 21. “As internet technology advances so does the threat of cyber crime. In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls and security patches are just the beginning. Never open suspicious e-mails and only navigate to trusted sites • CYBER LAWS_ ESSENTIAL FEATURE IN TODAYS WORLD OF INTERNET • • ACHIEVING GLOBAL PEACE AND HARMONY