Vous êtes sur la page 1sur 20

INTRODUCTION CYBER CRIME

It is any crime that Involves the use of a computer/network. Computers can be used in the commission of the crime or maybe the target. Examples-Bank fraud, identity theft, extortion, espionage.

CYBER CRIME
The FBI estimates that cyber crime cost US companies $ 559.7 million in 2009. Annual cyber crime survey carried out in cities across the country reveals that the cost of cyber crime suffered by Indians is around Rs. 34,110 crores annually.

Everybody is using COMPUTERS. From children to teenagers to adults, white collar executives, criminals to terrorist organizations. Conventional crimes like forgery, extortion, kidnapping etc. are being committed with the help of computers. Monetary transactions are being done via the INTERNET.

TYPES OF CYBER CRIMES


Illegal intrusion into a computer system/network. Government websites- HOT targets for hackers. Hackers enjoy media coverage.

Involves the use of malicious software. It attaches itself to other software. Examples- Trojans, Viruses, Worms, etc.

Distribution of illegal and unauthorized pirated copies of software. Involves theft of software intended to pass for the original. Retail revenue losses worldwide are ever increasing due to this crime.

Acts of terrorism committed through the use of cyberspace or computers. Hacking directed towards individuals, families, organized by groups within networks, tending to cause fear among people. A Cyber terrorist intimidates a government or organization to advance his/her political or social objectives by launching computer-based attack against computers, network, and the information stored on them.

It is a term for theft and fraud committed using a credit card as a fraudulent source of funds in a transaction. Credit card numbers can be stolen by hackers who can misuse this card by impersonating the credit card owner.

Is the unsolicited sending of bulk email for commercial purposes. It is unlawful to varying degrees. Anti-spam laws are relatively new. However limits on unsolicited electronic communications have existed in some forms for some time.

What can we do to protect ourselves?


Turn ON your spam blocker. Most Internet providers provide a spam blocking feature to prevent unwanted messages, such as fraudulent emails and phishing emails, from getting to your inbox. Adequate anti-virus software for your computer- McAfee, Norton Anti-Virus, Stopzilla or other similar programs. Use your computer's firewall protection feature, which is a digitally created barrier that prevents hackers from getting into your computer system.

What can we do to protect ourselves?


Encrypt important data you don't want compromised. Utilize encryption software, which makes it unavailable to anyone who tries to hack into your computer system. Be wary of providing personal information via a website-name, mailing address, bank account number. Shopping at insecure websites-run the risk of submitting credit card information and other personal information to a site that may be a fraud. Monitor the online activities of children.

CYBER LAW
Is the law governing computers, networks, software, data storage devices (such as hard disks, USB drives etc), the Internet, websites, emails even electronic devices such as cell phones, ATM machines etc. Deals with unlawful acts where the computer is used either as a tool or a target or both. Is needed as Cyberspace tends to show complete disrespect for jurisdictional boundaries. Is necessary as Cyberspace offers enormous potential for anonymity.

CYBER LAW IN INDIA


India has enacted the first Information Technology Act (I.T. Act) in the year 2000 based on the UNCITRAL (United Nations Commission on International Trade Law) model. Chapter XI of this Act deals with offence/crimes along with certain other provisions scattered in this Act.

It defends us from cyber attacks. It helps us browse websites safely. Encourages purchase transactions over the Internet through credit cards without fear of misuse. Provides compensations to the victims of Cyber Crimes.

BAAZEE.COM CASE
(DECEMBER 2004) Police arrested the CEO of auction website Baazee.com Avnish Bajaj. He was arrested under Section 67 of the Information Technology Act 2000. A CD containing a lewd MMS of a student of a public school was being sold on the website.

Pune Citibank MphasiSCall Center Fraud


US $ 3,50,000 from accounts of four US customers were dishonestly transferred to bogus accounts. Employees gained the confidence of the customer and obtained their PIN numbers to commit fraud. All accounts were opened in Pune and the customers complained that the money from their accounts was transferred to Pune accounts and thats how the criminals were traced.

PARLIAMENT ATTACK CASE (DECEMBER 2001) Bureau of Police Research and Development at Hyderabad retrieved information from a laptop recovered from a terrorist who attacked Parliament. The laptop contained the sticker of the Ministry of Home that they had made on the laptop and pasted on their ambassador car to gain entry into Parliament House. It also contained the fake ID card that one of the two terrorists was carrying with a Government of India emblem and seal.

Many case studies indicate that all walks of life are getting exposed to cyber crime. The Internet offers a number of opportunities for cyber criminals either to cause harm to innocent people, or to make a fast buck at the expense of unsuspecting citizens. Cyber crime in India, as all over the world, is on the rise and to curb its scope and complexity is the need of today.

- PRESENTED BY Amanda Almeida- 1002 Patricia Pereira- 1003 Varun Brahmwar- 1008 Lukvisha Carvalho- 1009 Valenie Fernandes- 1031 Zubin Fernandes- 1037 Annette Pinto- 1072

Vous aimerez peut-être aussi