SlideShare une entreprise Scribd logo
1  sur  14
Cyber Crime
By Dr Mohammad Zunnun Khan
Cyber Crime
• Cyber Crime is the use of computers and other electronic devices and
Internet by criminals to execute fraud and other crimes against
companies, consumers and other individuals.
• It is a broad term which is used to describe criminal activity
committed on computers or on the internet.
Definition And Nature of Cyber Crime
• A General definition of cyber-crime may be ―unlawful act wherein the consumer is used, either
as a tool or a target or both.
• Any criminal activity that uses a computer either as an instrumentality, target or a means for
enabling further crimes comes within the ambit of cyber-crimes.
The Internet is fast changing the lifestyle of every individuals whether be it students, teachers,
businessmen, doctors, lawyers, engineers, etc.
• It is becoming a way of life for millions of people. With this, the criminals are also not lagging
behind.
• Their area of operation has also widened with such technological progress.
• There are difficulties in providing a description of cybercrimes, as there is no uniform or
universally accepted definition of cybercrime.
• It is used as an umbrella term for a set of activities that have yet to be incorporated fully into the
national legal regimes around the world and is used interchangeably with ―computer crimes
―computer misuse, or ―IT crimes
• Despite the frequent use of the term, there is no commonly accepted definition.
• Cybercrimes is related to computers, however, there is no consensus on whether
those computers have to be interconnected or not.
a. The UN Manual on the Prevention and Control of Computer- Related Crimes:
―Computer crime can involve activities that are traditional in nature, such as
theft, fraud, forgery and mischief, all of which are generally subject everywhere
to criminal sanctions. The computer has also created a host of potentially new
misuses or abuses that may, or should be criminal as well‖
b. UK National Criminal Intelligence Service:
―An offence in which a computer is directly and significantly instrumental in the
commission of the crime
c. Pavan Duggal
Cyber Crime refers to all the activities done with criminal intent in cyberspace or
using the medium of internet. These could either the criminal activities in the
conventional sense or activities, newly evolved with the growth of the new
medium. Any activity, which basically offends human sensibilities, can be included
in the ambit of cybercrimes.
• Difference Between Cyber Crime And Conventional Crime
1. Cyber Crimes always involve use of computers and technology.
2. Cyber Crimes can be committed in the jurisdiction without the
criminal being physically present in it, i.e. it knows no geographical
limitations, boundaries or distances.
3. Cyber Crimes is not always clearly illegal as compared to
conventional crimes. This is because of lack of law punishing them.
4. It requires only small resources as compared to the resultant
damage caused by the commission of the crime.
• Punishments And Offences
The main aim of the act is to legalize the digital language so that
people can easily and without fear use the electronic devices for their
own purposes like doing business or for entertainment. It prescribes
certain offences and penalties to keep a check on the cyber crime, the
main of them are:
· Section 65: Tampering with Computer Source Documents
· Section 66: Hacking with Computer System
· Section 67: Publishing of obscene information which is obscene in
electronic form.
· Section 70: breach of confidentially and privacy.
• In addition to above, Section 77 of the Act states that “No penalty
imposed or confiscation made under this Act shall prevent the
imposition of any other punishment to which the person affected
thereby is liable under any other law for the time being in force.”
which means the civil crimes can also be made as Criminal Act, as
· Computer Network Breaking and Hacking: - S. 66(2) of I.T. Act and S.
441 of IPC
· Child Pornography: - S. 67 of I.T. Act and S. 294 of IPC
· Email- bombing: - S. 43(e) of I.T. Act and S. 425-441 read with S447
of IPC
· Password Sniffing: - S. 43(a), (g) of I.T. Act and S. 419 of IPC
· Credit Card Fraud: - I.T. Act and S. 443 (a) and (g) read with 426, 427
and 447 of IPC.
• Thank You… wait for next lecture.
• Cyber Jurisdiction
The internet can be seen as a multi jurisdictional because of the ease which a
user can access of website anywhere in the world.
• It can be even viewed as a jurisdictional in the sense that from the user‘s
perspective that the state and national borders are essentially transparent.
• For courts determining jurisdiction situation is more problematic.
• The developing law of jurisdiction must addressed whether a particular event in
cyber space is controlled by the law of state or country where the website is
located, by the law of the state or the country where the internet service
provider is located.
• A number of commentators have voiced their opinion that cyber space should be
treated as separate jurisdiction. In practice this view has not been supported or
addressed by the law makers
Cyber jurisdictional cases have been dealt with primarily in civil courts. Since the
advent of US v. Thomas, infra and Minnesota v. Granite gate resort,
Evolution of Electronic Evidence
• 1984, the FBI began to use computer evidence
• In 1991, a new term; "Computer Forensics" was coined
• In India IT Act 2000.
• On 17th October 2000, ITA 2000 was notified and along with it the Indian
Evidence Act 1872 got amended with several new sections being added to
address the issue of Electronic Evidence`
Characteristics of Electronic Evidence
• Is invisible
• Is easily altered or destroyed
• Requires precautions to prevent alteration
• Requires special tools and equipment
• Requires specialized training
• Requires expert testimony```
Indian Evidence Act, 1872
• Amendments related to the evidence Act were contained in Sec.92
and the Second Schedule of the IT Act, 2000.
• Pursuant to the enactment of the Information Technology
(amendment) Act, 2008, Sec.92 was deleted
and the provisions with regard to the Indian Evidence Act were
mentioned in Part IV of the amendment Act.
• 1) Amendment of Sec.3
• 2) Insertion of new Sec.45A – Opinion of Examiner of Electronic
evidence – 45A
• 1) Amendment of Sec.3 –
In section 3 relating to interpretation clause, in the paragraph appearing at the end, for
the words "digital signature" and "Digital Signature Certificate", the words "Electronic
signature" and "Electronic Signature Certificate" shall be respectively substituted.
2) Insertion of new Sec.45A – Opinion of Examiner of Electronic evidence – 45A:
When in a proceeding, the Court has to form an opinion on any matter relating to any
information transmitted or stored in any computer resource or any other electronic or
digital form, the opinion of the Examiner of Electronic Evidence referred to in section 79A
of the Information Technology Act, 2000,is a relevant fact. Explanation: For the purposes
of this section, an Examiner of Electronic Evidence shall be an expert
3) Amendment of Sec.47A –
In section 47A,- (i) for the words "digital signature", the words "electronic signature"
shall be substituted; (ii) for the words "Digital Signature Certificate", the words
"Electronic Signature Certificate" shall be substituted.
4) Amendment of Sec.67A –
In section 67 A, - for the words "digital signature", the words "electronic signature" shall
be substituted.
• 5) Amendment of Sec.85A –
In section 85A, for the words "digital signature", wherever they occur,
the words "electronic signature" shall be substituted.
6) Amendment of Sec.85B –
In section 85B, - for the words "digital signature", wherever they
occur, the words "electronic signature" shall be substituted.
7) Amendment of Sec.85C –
In section 85C, for the words "Digital Signature Certificate", the words
"Electronic Signature Certificate" shall be substituted.
8) Amendment of Sec.90A –
In section 90A, the words "digital signature", at both places where
they occur, the words "electronic signature" shall be substituted.

Contenu connexe

Tendances

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
 
Information technology act
Information technology actInformation technology act
Information technology actMeghana Bhogle
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Cyber law - Security aspects and Intellectual Property rights
Cyber law - Security aspects and Intellectual Property rights Cyber law - Security aspects and Intellectual Property rights
Cyber law - Security aspects and Intellectual Property rights premarhea
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patentsravijain90
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000Yash Jain
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)Ms. Parasmani Jangid
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanShahid Jamal Tubrazy
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...n|u - The Open Security Community
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAHardik Solanki
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 

Tendances (20)

Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Information technology act
Information technology actInformation technology act
Information technology act
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law - Security aspects and Intellectual Property rights
Cyber law - Security aspects and Intellectual Property rights Cyber law - Security aspects and Intellectual Property rights
Cyber law - Security aspects and Intellectual Property rights
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
It act 2000
It act 2000It act 2000
It act 2000
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)IT ACT, 2000 (Information Technology Act, 2000)
IT ACT, 2000 (Information Technology Act, 2000)
 
Online Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in PakistanOnline Crime and New Cyber Laws in Pakistan
Online Crime and New Cyber Laws in Pakistan
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 

Similaire à Cyber crime

Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxSanjith261
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000priya rana
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxdrsrivanicshod
 
Information technology act
Information technology actInformation technology act
Information technology actAKSHAY KHATRI
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTJahid Khan Rahat
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 

Similaire à Cyber crime (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Unit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptxUnit-5.3 Information Technology Act, 2000-MLP.pptx
Unit-5.3 Information Technology Act, 2000-MLP.pptx
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Workshop on Cyber Laws
Workshop on Cyber LawsWorkshop on Cyber Laws
Workshop on Cyber Laws
 
Business Law - Unit 3
Business Law - Unit 3Business Law - Unit 3
Business Law - Unit 3
 
Information technology act 2000
Information technology act  2000Information technology act  2000
Information technology act 2000
 
Cyber law comp
Cyber law compCyber law comp
Cyber law comp
 
law.pptx
law.pptxlaw.pptx
law.pptx
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Section 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptxSection 65 – Tampering with computer Source Documents.pptx
Section 65 – Tampering with computer Source Documents.pptx
 
Information technology act
Information technology actInformation technology act
Information technology act
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
cyber .pptx
cyber .pptxcyber .pptx
cyber .pptx
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 

Plus de Integral university, India (17)

Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
Cloud resilience, provisioning
Cloud resilience, provisioning Cloud resilience, provisioning
Cloud resilience, provisioning
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 
Unit4 next
Unit4 nextUnit4 next
Unit4 next
 
U nit 4
U nit 4U nit 4
U nit 4
 
Unit4 cry
Unit4 cryUnit4 cry
Unit4 cry
 
Unit4
Unit4Unit4
Unit4
 
Unit5
Unit5Unit5
Unit5
 
Unit5 Cloud Federation,
Unit5 Cloud Federation,Unit5 Cloud Federation,
Unit5 Cloud Federation,
 
Unit3 MapReduce
Unit3 MapReduceUnit3 MapReduce
Unit3 MapReduce
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cloud Resilience
cloud Resilience cloud Resilience
cloud Resilience
 
Software Security
Software SecuritySoftware Security
Software Security
 
Block Level and File Level
Block Level and File LevelBlock Level and File Level
Block Level and File Level
 
Software Security
Software SecuritySoftware Security
Software Security
 
Security threats
Security threatsSecurity threats
Security threats
 
Virtualization concepts in cloud computing
Virtualization concepts in cloud computingVirtualization concepts in cloud computing
Virtualization concepts in cloud computing
 

Dernier

The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 

Dernier (20)

The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 

Cyber crime

  • 1. Cyber Crime By Dr Mohammad Zunnun Khan
  • 2. Cyber Crime • Cyber Crime is the use of computers and other electronic devices and Internet by criminals to execute fraud and other crimes against companies, consumers and other individuals. • It is a broad term which is used to describe criminal activity committed on computers or on the internet.
  • 3. Definition And Nature of Cyber Crime • A General definition of cyber-crime may be ―unlawful act wherein the consumer is used, either as a tool or a target or both. • Any criminal activity that uses a computer either as an instrumentality, target or a means for enabling further crimes comes within the ambit of cyber-crimes. The Internet is fast changing the lifestyle of every individuals whether be it students, teachers, businessmen, doctors, lawyers, engineers, etc. • It is becoming a way of life for millions of people. With this, the criminals are also not lagging behind. • Their area of operation has also widened with such technological progress. • There are difficulties in providing a description of cybercrimes, as there is no uniform or universally accepted definition of cybercrime. • It is used as an umbrella term for a set of activities that have yet to be incorporated fully into the national legal regimes around the world and is used interchangeably with ―computer crimes ―computer misuse, or ―IT crimes
  • 4. • Despite the frequent use of the term, there is no commonly accepted definition. • Cybercrimes is related to computers, however, there is no consensus on whether those computers have to be interconnected or not. a. The UN Manual on the Prevention and Control of Computer- Related Crimes: ―Computer crime can involve activities that are traditional in nature, such as theft, fraud, forgery and mischief, all of which are generally subject everywhere to criminal sanctions. The computer has also created a host of potentially new misuses or abuses that may, or should be criminal as well‖ b. UK National Criminal Intelligence Service: ―An offence in which a computer is directly and significantly instrumental in the commission of the crime c. Pavan Duggal Cyber Crime refers to all the activities done with criminal intent in cyberspace or using the medium of internet. These could either the criminal activities in the conventional sense or activities, newly evolved with the growth of the new medium. Any activity, which basically offends human sensibilities, can be included in the ambit of cybercrimes.
  • 5. • Difference Between Cyber Crime And Conventional Crime 1. Cyber Crimes always involve use of computers and technology. 2. Cyber Crimes can be committed in the jurisdiction without the criminal being physically present in it, i.e. it knows no geographical limitations, boundaries or distances. 3. Cyber Crimes is not always clearly illegal as compared to conventional crimes. This is because of lack of law punishing them. 4. It requires only small resources as compared to the resultant damage caused by the commission of the crime.
  • 6. • Punishments And Offences The main aim of the act is to legalize the digital language so that people can easily and without fear use the electronic devices for their own purposes like doing business or for entertainment. It prescribes certain offences and penalties to keep a check on the cyber crime, the main of them are: · Section 65: Tampering with Computer Source Documents · Section 66: Hacking with Computer System · Section 67: Publishing of obscene information which is obscene in electronic form. · Section 70: breach of confidentially and privacy.
  • 7. • In addition to above, Section 77 of the Act states that “No penalty imposed or confiscation made under this Act shall prevent the imposition of any other punishment to which the person affected thereby is liable under any other law for the time being in force.” which means the civil crimes can also be made as Criminal Act, as · Computer Network Breaking and Hacking: - S. 66(2) of I.T. Act and S. 441 of IPC · Child Pornography: - S. 67 of I.T. Act and S. 294 of IPC · Email- bombing: - S. 43(e) of I.T. Act and S. 425-441 read with S447 of IPC · Password Sniffing: - S. 43(a), (g) of I.T. Act and S. 419 of IPC · Credit Card Fraud: - I.T. Act and S. 443 (a) and (g) read with 426, 427 and 447 of IPC.
  • 8. • Thank You… wait for next lecture.
  • 9. • Cyber Jurisdiction The internet can be seen as a multi jurisdictional because of the ease which a user can access of website anywhere in the world. • It can be even viewed as a jurisdictional in the sense that from the user‘s perspective that the state and national borders are essentially transparent. • For courts determining jurisdiction situation is more problematic. • The developing law of jurisdiction must addressed whether a particular event in cyber space is controlled by the law of state or country where the website is located, by the law of the state or the country where the internet service provider is located. • A number of commentators have voiced their opinion that cyber space should be treated as separate jurisdiction. In practice this view has not been supported or addressed by the law makers Cyber jurisdictional cases have been dealt with primarily in civil courts. Since the advent of US v. Thomas, infra and Minnesota v. Granite gate resort,
  • 10. Evolution of Electronic Evidence • 1984, the FBI began to use computer evidence • In 1991, a new term; "Computer Forensics" was coined • In India IT Act 2000. • On 17th October 2000, ITA 2000 was notified and along with it the Indian Evidence Act 1872 got amended with several new sections being added to address the issue of Electronic Evidence`
  • 11. Characteristics of Electronic Evidence • Is invisible • Is easily altered or destroyed • Requires precautions to prevent alteration • Requires special tools and equipment • Requires specialized training • Requires expert testimony```
  • 12. Indian Evidence Act, 1872 • Amendments related to the evidence Act were contained in Sec.92 and the Second Schedule of the IT Act, 2000. • Pursuant to the enactment of the Information Technology (amendment) Act, 2008, Sec.92 was deleted and the provisions with regard to the Indian Evidence Act were mentioned in Part IV of the amendment Act. • 1) Amendment of Sec.3 • 2) Insertion of new Sec.45A – Opinion of Examiner of Electronic evidence – 45A
  • 13. • 1) Amendment of Sec.3 – In section 3 relating to interpretation clause, in the paragraph appearing at the end, for the words "digital signature" and "Digital Signature Certificate", the words "Electronic signature" and "Electronic Signature Certificate" shall be respectively substituted. 2) Insertion of new Sec.45A – Opinion of Examiner of Electronic evidence – 45A: When in a proceeding, the Court has to form an opinion on any matter relating to any information transmitted or stored in any computer resource or any other electronic or digital form, the opinion of the Examiner of Electronic Evidence referred to in section 79A of the Information Technology Act, 2000,is a relevant fact. Explanation: For the purposes of this section, an Examiner of Electronic Evidence shall be an expert 3) Amendment of Sec.47A – In section 47A,- (i) for the words "digital signature", the words "electronic signature" shall be substituted; (ii) for the words "Digital Signature Certificate", the words "Electronic Signature Certificate" shall be substituted. 4) Amendment of Sec.67A – In section 67 A, - for the words "digital signature", the words "electronic signature" shall be substituted.
  • 14. • 5) Amendment of Sec.85A – In section 85A, for the words "digital signature", wherever they occur, the words "electronic signature" shall be substituted. 6) Amendment of Sec.85B – In section 85B, - for the words "digital signature", wherever they occur, the words "electronic signature" shall be substituted. 7) Amendment of Sec.85C – In section 85C, for the words "Digital Signature Certificate", the words "Electronic Signature Certificate" shall be substituted. 8) Amendment of Sec.90A – In section 90A, the words "digital signature", at both places where they occur, the words "electronic signature" shall be substituted.