Vous êtes sur la page 1sur 25

CYBER CRIME

4/19/12

Click icon to addcrime Science and picture

WHAT IS CRIME?

Crime is a social and economic phenomenon legal wrong that can be followed by criminal proceedings which may result into punishment.

definition : Crime is an intentional act of commission or omission in contravention to the law of the land and accordingly 4/19/12 punishable when proved in judicial

Legal

TYPES OF CRIME
Conventional

and new forms of

crime
White

collar crime crime crime

Organized Victimless

4/19/12

CYBER CRIME
The

term cyber crime was first coined by Barry Collins in 1980s criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime

Any

generalized definition of cyber 4/19/12 crime may be unlawful acts

REASONS FOR CYBER CRIME:


Capacity Easy

to store data in comparatively small space to access

Complex Negligence Loss

of evidence

4/19/12

CYBER CRIMINALS:
The

cyber criminals constitute of various groups/ category. The following are the category of cyber criminals: Children and adolescents between the age group of 6 18 years Organised hackers Professional hackers / crackers Discontented employees

4/19/12

MODE AND MANNER OF COMMITING CYBER CRIME:


Hacking Theft

of information contained in electronic form bombing attacks of Service attack diddling

Email Data

Salami Denial
4/19/12

Virus

/ worm attacks

Contd.
Trojan Internet Web

attacks time thefts

jacking

4/19/12

CATEGORIES OF CYBER CRIMES


Internal Computer crimes Virus worms Trojan horses Telecommunicat Phone breaking Phone tapping i-on crimes Computer Manipulation Crimes Support of Criminal Enterprises Hardware and software Theft
4/19/12

Hacking

Embezzlements Frauds

Data bases to support drug Distribution

Data bases to Money keep records of laundering client transaction Theft of trade secrets

Software piracy Theft of computer and microchips

TYPES OF CYBER CRIME

4/19/12

AGAINST INDIVIDUALS

Harassment via e-mails. Cyber-stalking. Dissemination of obscene material. Defamation. Unauthorized control/access over computers

4/19/12

AGAINST INIDVIDUAL PROPERTY:


Computer vandalism. Transmitting virus. Net trespass Unauthorized control/access over computers Intellectual Property crimes Internet time thefts

4/19/12

AGAINST ORGANISATION
Cyber

terrorism against the government organization. Distribution of pirated software etc.

4/19/12

4/19/12

CYBER TERRORISM
Click icon to add picture

Scientific war against Governments

CYBER TERRORISM
Cyber

terrorism is the convergence of terrorism and cyberspace. It is generally understood to

mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. 4/19/12

WITH INCLUSION OF COMPUTER


LTTE
Perpetrator Place Group/Individual

AUM
Group/Individual

Sri Japan/US/Worldwide Lanka/London/Australia Worldwide Threats/Violence/Recrui Violence/Recruitment/ tment/Education/Strate Education/Strategies gies Government Officials/Recruits

Tool

Target Motivation

Governments

Social/Political Change World Domination

4/19/12

DEFENDING AGAINST CYBER TERRORISM


DETERRENCE CRIMINAL

JUSTICE DEFENSE

ENHANCED

NEGOTIATIONS

4/19/12

AGAINST SOCIETY AT LARGE


Pornography

(basically child

pornography)

Polluting the youth through indecent exposure Trafficking of illegal articles gambling Financial crimes

Sale
4/19/12

Online

TOP 20 :

4/19/12

CYBER CRIMES IN INDIA

4/19/12

STATUTORY PROVISONS:

The Indian parliament considered it necessary to give effect to the resolution by which the General Assembly adopted Model Law on Electronic Commerce adopted by the United Nations As a consequence of which the Information Technology Act 2000 was passed and enforced on 17th May 2000. The Information Technology Act deals with the various cyber crimes in chapters IX & XI. The important sections are Ss. 43,65,66,67

4/19/12

VARIOUS SECTIONS
unauthorised access, Section 43 deals with thedownloading, virus attacks or unauthorised any contaminant, causes damage, disruption, denial of access, interference with the service availed by a person

Section 65 Section 66 section 67


4/19/12

deals with tampering with computer source documents and provides for imprisonment up to 3 years or fine deals with hacking with computer system and provides for imprisonment up to 3 years or fine deals with publication of obscene material and provides for imprisonment up to a term of 10 years

PREVENTION OF CYBER CRIME


To

prevent cyber stalking avoid disclosing any information pertaining to oneself. This is as good as disclosing your identity to strangers in public place.

avoid sending any photograph online particularly to strangers and chat friends as there have been incidents of misuse of the photographs. 4/19/12

Always

CONTD.
Always

keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children.

site owners should watch traffic and check any irregularity on the site. Putting host-based intrusion detection devices on servers may do 4/19/12 this

Web

CONCLUSION
History

is the witness that no legislation has succeeded in totally eliminating crime from the globe.

only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application 4/19/12 the laws more stringent to check of

The

Vous aimerez peut-être aussi