10
CYBER CRIME Cyber crime is a genetic term refers to all criminal activities done using the medium of computers. The internet , cyber space and the worldwide web. or Cyber crime is any illegal behavior directed by means of electronic operation that targets the security of computer system and the data processed by them. CYBER CRIME LAWS The Indian Law has not given any definition to the term ’CYBER CRIME’. In fact , the indian penal code does not use a term ‘CYBER CRIME’ at any point even after its amendment by the information technology (amendment)ACT 2008, the indian cyber crime.

Cyber crime

Embed Size (px)

Citation preview

Page 1: Cyber crime

CYBER CRIME

Cyber crime is a genetic term refers to all criminal activities done using the medium of

computers. The internet , cyber space and the worldwide web.

orCyber crime is any illegal behavior directed by means of electronic operation that targets the

security of computer system and the data processed by them. CYBER CRIME

LAWSThe Indian Law has not given any definition to the term ’CYBER CRIME’. In fact , the indian penal code does not use a term ‘CYBER CRIME’ at any point even after its amendment by the information technology (amendment)ACT 2008, the indian cyber crime.

Page 2: Cyber crime

But “Cyber Security ” is defined under section (2) means protection information, computer resource, communication device and information stored there in from unauthorized access, use, disclosure, disruption, modification or destruction.

TYPES OF CYBER CRIME

•Denial of service attack•IRC crime•Credit card fraud•Phishing•Cyber stalking•Cyber defamation•Threatening•Salami attack•Hacking

•Net extortion•Piracy•Financial•Schools & home •Data thief•E-mail spoofing•Identity thief•Spreading virus and worms

Page 3: Cyber crime

The act of gaining unauthorized access to a computer system, programs, data or network resources and in some cases making unauthorized use of this access. Hacking is also the act by which other forms of cyber-crime (e.g., fraud, terrorism, etc.) are committed. Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user. (The term “hacker” originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it has negative implications.) Law & Punishment: Under Information Technology (Amendment) Act, 2008, Section 43(a) read with section 66 is applicable and Section 379 & 406 of Indian Penal Code, 1860 also are applicable . If crime is proved under IT Act, accused shall be punished for imprisonment, which may extend to years or with fine, which may extend to five lakh rupees or both.

HACKING

Page 4: Cyber crime

PIRACY

The software industry plays a leading role in creating products that have vastly improved our lives and work environment. Unfortunately, software theft, or piracy, has had a negative impact on the global marketplace and the ability to create new products. Copying in the workplace, counterfeiting and various forms of illegal distribution in coast . Furthermore, the unauthorized electronic distribution and sale of copyrighted data or software in huge prices, work over the Internet threatens to make these problems seem almost quaint by comparison. Crime Can be stooped in various ways such as end user copying, hard disk loading, Counterfeiting, Illegal downloads from the internet etc.

SALAMI ATTACK

In such crime criminal makes insignificant changes in such a manner that such changeswould go unnoticed. Criminal makes such program that deducts small amount like 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount

Page 5: Cyber crime

E-MAIL SPOOFING

E-mail spoofing is sending an e-mail to another person in such a way that it appears that the e-mail was sent by someone else. Spoofing is the act of electronically disguising one computer as another for gaining as the password system. It is becoming so common that you can no longer take for granted that the e-mail you are receiving is truly from the person identified as the sender.Email spoofing is a technique used by hackers to fraudulently send email messages in which the sender address and other parts of the email header are altered to appear as though the email originated from a source other than its actual source. There is another name of e-mail spoofing-

CYBER DEFAMATION

The Criminal sends emails containing defamatory matters to all concerned of the victim or post the defamatory matters on a website. (disgruntled employee may do this against boss, ex- divorced husband against wife etc)

Page 6: Cyber crime

SPREADING VIRUS OR WORMS In most cases, viruses can do any amount of damage, the creator intends the

to do. They can send your data to a third party and then delete your data from your computer. They can also ruin/mess up your system and render it unusable without a re-installation of the operating system. Usually the virus will files on your system and then will install change your system so that virus program is run every time you start your system. Ex-(virus, worms, Trojan Horse, Time bomb,Logic Bomb, Rabbit and Bacterium are the malicious soft wares)

SCHOOL & HOME

While the Internet can be a unique educational and recreational resource for students, it is important that they are educated about how to safely and responsibly use this powerful tool.The issue related to the presence of the young on the Internet is the potential misuse of this tool. Whether the consequences are intentional or unintentional, the Internet can open a dangerous window of accessibility for the young who are unaware of the consequences of irresponsible use.For this reason, it is essential that educators consider how to educate their students about the consequences associated with misusing the Internet.

Page 7: Cyber crime

IDENTITY THIEF Identity theft is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name. Information Technology (Amendment) Act, 2008, crime of identity theft under whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person known as identity theft. Identity theft is a term used to refer to fraud that involves stealing money or getting other benefits by pretending to someone else. There is type of identity thIef-

CREDIT CARD FRAUD

You simply have to type credit card number into www page off the vendor foronline transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.

Page 8: Cyber crime

DATA THIEF Data Theft is a growing problem, primarily perpetrated by office workers with access to technology such as desktop computers and handheld devices, capable of storing digital information such as flash drives, iPods and even digital cameras. The damage caused by data theft can be considerable with today’s ability to transmit very files via e-mail, web pages, USB devices, DVD storage and other hand-held devices. According to Information Technology (Amendment) Act, 2008, crime of data theft is stated as -If any person without permission of the owner or any other person, who is charge of a computer, computer system of computer network - downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network computer system or computer network including information or data held or stored in any removable storage medium, then it is data theft.

NET EXTORTION

Copying the company’s confidential data in order to extort said company for huge amount

Page 9: Cyber crime

PREVENTING FROM CYBER CRIME

* Preventing cyber crime is a big deal nowadays! To keep yourself and your information protected, always make sure you are on secure websites.* Do not give your computer any one else to use.* Do not give internet to your young one to misuse . who is unware of internet*Keep ativirus on your computer.* Time to time check your accout.

Page 10: Cyber crime

THANK YOU

SUBMITED TO-JITENDRA RAJAWAT

SUBMITED BY-MANISH BHADRAN & PIYUSH GURJAR