Vous êtes sur la page 1sur 27

Poornima Institute of Engineering & Technology, Jaipur

Seminar Presentation On

Cyber Crime in India


SESSION(2012-2013)

Guided By: Ms. Sneha Sharma

Submitted By: Rishabh Agarwal Reg No : CE/09/80

DEPARTMENT OF COMPUTER SCIENCE POORNIMA INSTITUTE OF ENGINEERING. & TECHNOLOGY, JAIPUR


2/5/2013 Designed By:-Rishabh Agarwal

Contents:
What is Cyber Crime? History of Cyber Crime. Types of Cyber Crime. Mode and Manner of Committing Cyber Crime: What is IT Law & Cyber Law?

Acts made to deal with Cyber Crime in


India Case Study in India

Recommendations

2/5/2013

Designed By:-Rishabh Agarwal

What is Cyber crime???

Cyber crime is simply defined as crimes that are directly related to computers and using computers. An increasing number of domestic and international criminal activities are using the Internet. Computers and other electronic devices can be tools to commit crime or are targeted by criminals. A personal computer connected to the Internet without protection may be infected with malicious software in under a minute.

2/5/2013

Designed By:-Rishabh Agarwal

Cybercrime is one of the fastest-growing criminal activities on the planet. It covers a huge range of illegal activity including financial scams, computer hacking, virus attacks, stalking by e-mail and creating websites that promote racial hatred. Cybercrime has been used to describe a wide range of offences, including offences against computer data and systems (such as hacking), computer- related forgery and fraud (such as phishing), content offences and copyright offences (such as the dissemination of pirated content).
2/5/2013 Designed By:-Rishabh Agarwal

History of Cyber Crime


In the early decades of modern information technology (IT), computer crimes were largely committed by individual disgruntled and dishonest employees. Physical damage to computer systems was a prominent threat until the 1980s.

Criminals often used unauthorized access to subvert security systems as they modified data for financial gain or destroyed data for revenge.
As telecommunications technology spread throughout the IT world, programmers began writing malicious software, including selfreplicating programs, to interfere with personal computers.

2/5/2013

Designed By:-Rishabh Agarwal

As the 1990s progressed, financial crime using penetration and subversion of computer systems increased. The types of malware shifted during the 1990s, taking advantage of new vulnerabilities and dying out as operating systems were strengthened.

Illegitimate applications of e-mail grew rapidly from the mid-1990s onward, generating torrents of unsolicited commercial and fraudulent email. The most common cyber crimes during this time were phishing scams, cyber stalking, computer viruses, and identity theft.

2/5/2013

Designed By:-Rishabh Agarwal

Types of cyber crime


Target group of computer devices Target personal computer devices

Denial of service Malware Against Person Transmission of indecent material Harassment (sexual, racial, religious etc.)
2/5/2013 Designed By:-Rishabh Agarwal

Against Property Computer Vandalism Transmission of harmful programs

Against Govt. Terrorize international Govt. Cracking into military maintained website

Computer Viruses

Modes and manner of committing crimes


Unauthorized access Unauthorized access means any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. Hacking Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. Trojan Attack The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans.

Virus and Worm attack:A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. Programs that multiply like viruses but spread from computer to computer are called as worms.
2/5/2013 Designed By:-Rishabh Agarwal

Script-kiddies Crackers do more than just spoiling websites. Novices, who are called "script-kiddies" in their circles, gain "root" access to a computer system, giving them the same power over a system as an administrator such as the power to modify features. They cause damage by planting viruses. Email spoofing Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source. Phishing scams and fraud A phisher may use spoof emails to direct a computer user to fraudulent websites to elicit a transfer of money, or sensitive information such as passwords or credit card details, from the user.

2/5/2013

Designed By:-Rishabh Agarwal

What is IT Law and Cyber Law


IT Law is a set of legal enactments, currently in existence in several countries, which governs the digital dissemination of both (digitalized) information and software.

Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet. It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include internet access and usage, privacy, freedom of expression.

2/5/2013

Designed By:-Rishabh Agarwal

Case study
e-bay.in is the most popular online shopping mall providing free online auctions for products like mobiles/cell phones, cameras, computers, etc.

. Bhubaneswar: Rourkela police busted a racket involving an online fraud worth


Rs 12.5 lakh.

Two persons, including alleged mastermind Debasis Pandit, a BCA student,


were arrested and forwarded to the court of the subdivisional judicial magistrate, Rourkela the other arrested person is Rabi Narayan Sahu. A case has been registered against the accused under Sections 420 and 34 of the Indian Penal Code and Section 66 of the IT Act and further investigation is on, he said.
2/5/2013 Designed By:-Rishabh Agarwal

Pandit allegedly hacked into the eBay India site and gathered the details of
around 700 credit cardholders. He then made purchases by using their passwords. The fraud came to the notice of eBay officials when it was detected that several purchases were made from Rourkela while the customers were based in cities such as Bangalore, Baroda and Jaipur and even London The company brought the matter to the notice of Rourkela police after some customers lodged complaints Pandit used the address of Sahu for delivery of the purchased goods The gang was involved in train, flight and hotel reservations.

2/5/2013

Designed By:-Rishabh Agarwal

Why India?
A rapidly growing online user base
121 Million Internet Users 65 Million Active Internet Users, up by 28% from 51 million in 2010 50 Million users shop online on Ecommerce and Online Shopping Sites 46+ Million Social Network Users 346 million mobile users had subscribed to Data Packages.

2/5/2013

Designed By:-Rishabh Agarwal

Cyber Crime

In India

The majority of cybercrimes are centered on fraud and Phishing, India is the third-most targeted country for Phishing attacks after the US and the UK, Social networks as well as ecommerce sites are major targets, 6.9 million bot-infected systems in 2010, 14,348 website defacements in 2010, 6,850 .in and 4,150 .com domains were defaced during 2011, 15,000 sites hacked in 2011, India is the number 1 country in the world for generating spam.

2/5/2013

Designed By:-Rishabh Agarwal

Cost Of Cyber Crime In India (2010)

29.9 million people fell victim to cybercrime, $4 billion in direct financial losses, $3.6 billion in time spent resolving the crime, 4 in 5 online adults (80%) have been a victim of Cybercrime, 17% of adults online have experienced cybercrime on their mobile phone.

Source: Norton Cybercrime Report 2011

2/5/2013

Designed By:-Rishabh Agarwal

We have covered about three instances where high-profile government websites were hacked and defaced. However, the actual number of Government Websites that were hacked are quite huge. A total number of 90, 119, 252 and 219 Government websites tracked by the Indian Computer Emergency Response Team (CERT-In) were hacked / defaced by various hacker groups in the year 2008, 2009, 2010 and Jan Oct 2011 respectively. By:-Rishabh Agarwal 2/5/2013 Designed

Again, this is growing trend and it is surprising that authorities have not taken stern actions to curb the growth of these cyber-crimes.

The police have recorded 3,038 cases but made only 2,700 arrests in 3 years (between 2007 and 2010)

India registered only 1,350 cases under the IT Act and IPC in 2010
50% of cybercrimes are not even reported.

2/5/2013

Designed By:-Rishabh Agarwal

Cyber Laws in India


Under The Information Technology Act, 2000

CHAPTER XI OFFENCES 66. Hacking with computer system.


(1) Whoever with the Intent to cause or knowing that he is likely to cause Wrongful Loss or Damage to the public or any person Destroys or Deletes or Alters any Information Residing in a Computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack.

(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.

2/5/2013

Designed By:-Rishabh Agarwal

Information Technology Amendment Act, 2008


Section 43, Destroys, Deletes or Alters any Information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means; Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage; If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both. [S.66]

2/5/2013

Designed By:-Rishabh Agarwal

S.66A - Punishment for sending offensive messages through communication service, etc
Any person who sends, by means of a computer resource or a communication device;

Any information that is grossly offensive or has menacing character; or


Any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device; Any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages;

Shall be punishable with imprisonment for a term which may extend to three years and with fine.

2/5/2013

Designed By:-Rishabh Agarwal

S. 66C - Punishment for identity theft


Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh S. 66D - Punishment for cheating by personation by using computer resource

Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.

2/5/2013

Designed By:-Rishabh Agarwal

S. 66E - Punishment for violation of privacy. Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both S. 67 A - Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form Whoever publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees

2/5/2013

Designed By:-Rishabh Agarwal

S. 67 C - Preservation and Retention of information by intermediaries.

(1) Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe.
(2) Any intermediary who intentionally or knowingly contravenes the provisions of sub section (1) shall be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.

2/5/2013

Designed By:-Rishabh Agarwal

Recommendations
More Public awareness campaigns

Training of police officers to effectively combat cyber crimes


More Cyber crime police cells set up across the country

Effective E-surveillance
Websites aid in creating awareness and encouraging reporting of cyber crime cases Specialised Training of forensic investigators and experts Active coordination between police and other law enforcement agencies and authorities is required.
2/5/2013 Designed By:-Rishabh Agarwal

Conclusions
Cybercrime greatly affects individuals, businesses, and national security

due to the pervasiveness of the Internet .


Different countries should work together and use legal, organizational, and technological approaches to combat cybercrime To reduce the damage to critical infrastructures

To protect the Internet from being abused

"The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb".

2/5/2013

Designed By:-Rishabh Agarwal

2/5/2013

Designed By:-Rishabh Agarwal

2/5/2013

Designed By:-Rishabh Agarwal

Vous aimerez peut-être aussi