Académique Documents
Professionnel Documents
Culture Documents
It is any crime that Involves the use of a computer/network. Computers can be used in the commission of the crime or maybe the target. Examples-Bank fraud, identity theft, extortion, espionage.
CYBER CRIME
The FBI estimates that cyber crime cost US companies $ 559.7 million in 2009. Annual cyber crime survey carried out in cities across the country reveals that the cost of cyber crime suffered by Indians is around Rs. 34,110 crores annually.
Everybody is using COMPUTERS. From children to teenagers to adults, white collar executives, criminals to terrorist organizations. Conventional crimes like forgery, extortion, kidnapping etc. are being committed with the help of computers. Monetary transactions are being done via the INTERNET.
Involves the use of malicious software. It attaches itself to other software. Examples- Trojans, Viruses, Worms, etc.
Distribution of illegal and unauthorized pirated copies of software. Involves theft of software intended to pass for the original. Retail revenue losses worldwide are ever increasing due to this crime.
Acts of terrorism committed through the use of cyberspace or computers. Hacking directed towards individuals, families, organized by groups within networks, tending to cause fear among people. A Cyber terrorist intimidates a government or organization to advance his/her political or social objectives by launching computer-based attack against computers, network, and the information stored on them.
It is a term for theft and fraud committed using a credit card as a fraudulent source of funds in a transaction. Credit card numbers can be stolen by hackers who can misuse this card by impersonating the credit card owner.
Is the unsolicited sending of bulk email for commercial purposes. It is unlawful to varying degrees. Anti-spam laws are relatively new. However limits on unsolicited electronic communications have existed in some forms for some time.
CYBER LAW
Is the law governing computers, networks, software, data storage devices (such as hard disks, USB drives etc), the Internet, websites, emails even electronic devices such as cell phones, ATM machines etc. Deals with unlawful acts where the computer is used either as a tool or a target or both. Is needed as Cyberspace tends to show complete disrespect for jurisdictional boundaries. Is necessary as Cyberspace offers enormous potential for anonymity.
It defends us from cyber attacks. It helps us browse websites safely. Encourages purchase transactions over the Internet through credit cards without fear of misuse. Provides compensations to the victims of Cyber Crimes.
BAAZEE.COM CASE
(DECEMBER 2004) Police arrested the CEO of auction website Baazee.com Avnish Bajaj. He was arrested under Section 67 of the Information Technology Act 2000. A CD containing a lewd MMS of a student of a public school was being sold on the website.
PARLIAMENT ATTACK CASE (DECEMBER 2001) Bureau of Police Research and Development at Hyderabad retrieved information from a laptop recovered from a terrorist who attacked Parliament. The laptop contained the sticker of the Ministry of Home that they had made on the laptop and pasted on their ambassador car to gain entry into Parliament House. It also contained the fake ID card that one of the two terrorists was carrying with a Government of India emblem and seal.
Many case studies indicate that all walks of life are getting exposed to cyber crime. The Internet offers a number of opportunities for cyber criminals either to cause harm to innocent people, or to make a fast buck at the expense of unsuspecting citizens. Cyber crime in India, as all over the world, is on the rise and to curb its scope and complexity is the need of today.
- PRESENTED BY Amanda Almeida- 1002 Patricia Pereira- 1003 Varun Brahmwar- 1008 Lukvisha Carvalho- 1009 Valenie Fernandes- 1031 Zubin Fernandes- 1037 Annette Pinto- 1072