Vous êtes sur la page 1sur 35

CYBER CRIMES

GROUP MEMBERS

RAMSHA
RAMYA RAVIKUMAR
PREETHI
PANJIKA
PRATITI

CONTENTS
INTRODUCTION
TYPES OF HACKERS
TYPES OF CYBER CRIMES
VIRUS
TYPES OF VIRUS
FIREWALL
CYBER LAWS IN INDIA.

"Cyber crime" is not a rigorously defined concept. For


our purposes, consider it to embrace criminal acts
that can be accomplished while sitting at a computer
keyboard. Such acts include gaining unauthorized
access to computer files, disrupting the operation of
remote computers with viruses, worms, logic bombs,
Trojan horses, and denial of service attacks;
distributing and creating child pornography, stealing
another's identity; selling contraband, and stalking
victims. Cyber crime is cheap to commit (if one has
the know-how to do it), hard to detect (if one knows
how to erase one's tracks), and often hard to locate in
jurisdictional terms, given the geographical
indeterminacy of the net.

TYPES OF CYBER CRIMES

12) THREATENING
The criminal sends threatening email or comes in contact in chat
rooms with victim. (Any one disgruntled may do this against
boss, friend or official)
13) SALAMI ATTACK
In such crime criminal makes insignificant changes in such a
manner that such changes would go unnoticed. Criminal makes
such program that deducts small amount like Rs. 2.50 per
month from the account of all the customer of the Bank and
deposit the same in his account. In this case no account holder
will approach the bank for such small amount but criminal
gains huge amount

A computer virus is a computer program that can copy


itself and infect a computer. The term "virus" is also
commonly but erroneously used to refer to other types
of malware, adware, and spyware programs that do not
have the reproductive ability.

In order to replicate itself, a virus must be


permitted to execute code and write to memory.
For this reason, many viruses attach themselves
to executable files that may be part of legitimate
programs. If a user attempts to launch an infected
program, the virus' code may be executed
simultaneously.

Resident viruses contain a replication module that is


similar to the one that is employed by nonresident
viruses. This module, however, is not called by a
finder module. The virus loads the replication module
into memory when it is executed instead and ensures
that this module is executed each time the operating
system is called to perform a certain operation.

A firewall is hardware, software, or a combination of both that


is used to prevent unauthorized programs or Internet users
from accessing a private network and/or a single computer.

Hardware Firewalls
Protect an entire network
Usually more expensive, harder to configure
Implemented on the router level
Software Firewalls
Protect a single computer
Usually less expensive, easier to configure

Stop hackers from accessing your computer


Protects your personal information
Blocks pop up ads and certain cookies
Determines which programs can access the Internet

Cyberlaw is a term that encapsulates the


legal issues related to use of communicative,
transactional, and distributive aspects of
networked information devices and
technologies. It is less a distinct field of law
in the way that property or contract are, as it
is a domain covering many areas of law and
regulation. Some leading topics include
intellectual property, privacy, freedom of
expression, and jurisdiction.

Objectives of the law


To grant legal recognition to transaction carried out
by means of electronic data.
To give legal recognition to digital signature.
To facilitate electronic storage of data.

Offences and punishments


related to cyber laws

Tampering with computer source documents:


punishable with imprisonment up to three year, or with
fine which may extend up to two lakh rupees, or with
both.
Publishing of information which is obscene in
electronic form: punished on first conviction with
imprisonment of either description for a term which
may extend to five years and with fine which may
extend to one lakh rupees and in the event of a second
or subsequent conviction with imprisonment of either
description for a term which may extend to ten years
and also with fine which may extend to two lakh
rupees.

Penalty for breach of confidentiality and privacy:


be punished with imprisonment for a term which may
extend to two years, or with fine which may extend to
one lakh rupees, or with both.
Penalty for publishing Digital Signature
Certificate false in certain particulars: shall be
punished with imprisonment for a term which may
extend to two years, or with fine which may extend to
one lakh rupees, or with both.
Hacking with computer system: punished with
imprisonment up to three years, or with fine which
may extend up to two lakh rupees, or with both.

Vous aimerez peut-être aussi