Top Banner
CYBER CRIME Science and crime
25
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber crime

CYBER CRIMEScience and crime

Page 2: Cyber crime

WHAT IS CRIME?

Crime is a social and economic phenomenon

“a legal wrong that can be followed by criminal proceedings which may result into punishment.”

Legal definition : Crime is an intentional act of commission or omission in contravention to the law of the land and accordingly punishable when proved in judicial proceeding

Page 3: Cyber crime

TYPES OF CRIME

Conventional and new forms of crime White collar crime Organized crime Victimless crime

Page 4: Cyber crime

CYBER CRIME

The term “cyber crime” was first coined by Barry Collins in 1980’s

“Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”

A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both”

Page 5: Cyber crime

REASONS FOR CYBER CRIME:

Capacity to store data in comparatively small space

Easy to access Complex Negligence Loss of evidence

Page 6: Cyber crime

CYBER CRIMINALS:

The cyber criminals constitute of various groups/ category. The following are the category of cyber criminals:

• Children and adolescents between the age group of 6 – 18 years

• Organised hackers• Professional hackers / crackers• Discontented employees

Page 7: Cyber crime

 MODE AND MANNER OF COMMITING CYBER CRIME:

Hacking Theft of information contained in

electronic form Email bombing Data diddling Salami attacks Denial of Service attack Virus / worm attacks Logic bombs

Page 8: Cyber crime

Contd.

  Trojan attacks  Internet time thefts Web jacking

Page 9: Cyber crime

CATEGORIES OF CYBER CRIMES

Internal Computer crimes

Virus worms Trojan horses

Telecommunicati-on crimes

Phone breaking

Phone tapping Hacking

Computer Manipulation Crimes

Embezzlements

Frauds

Support of Criminal Enterprises

Data bases to support drug Distribution

Data bases to keep records of client transaction

Money laundering

Hardware and softwareTheft

Software piracy

Theft of computer and microchips

Theft of trade secrets

Page 10: Cyber crime

TYPES OF CYBER CRIME

Classification of cyber crime

1. Against Individuals 

a. their person &b. their

property of an individual

 

2. Against Organization

a. Governmentc. Firm, Company,

Group of Individuals 

3. Against Society at large 

Page 11: Cyber crime

AGAINST INDIVIDUALS

Harassment via e-mails. Cyber-stalking. Dissemination of obscene material. Defamation. Unauthorized control/access over computers Indecent exposure Email spoofing Cheating & Fraud

Page 12: Cyber crime

AGAINST INIDVIDUAL PROPERTY:

Computer vandalism. Transmitting virus. Net trespass Unauthorized control/access over

computers Intellectual Property crimes Internet time thefts

Page 13: Cyber crime

AGAINST ORGANISATION

Cyber terrorism against the government organization.

Distribution of pirated software etc.

Page 14: Cyber crime

CYBER TERRORISM

Scientific war against Governments

Page 15: Cyber crime

CYBER TERRORISM

Cyber terrorism is the convergence of terrorism and cyberspace. It is generally understood to

mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.

Page 16: Cyber crime

WITH INCLUSION OF COMPUTER

LTTE AUM

Perpetrator Group/Individual Group/Individual

Place Sri Lanka/London/Australia

Japan/US/WorldwideWorldwide

Tool Threats/Violence/Recruitment/Education/Strategies

Violence/Recruitment/Education/Strategies

Target Government Officials/Recruits

Governments

Motivation Social/Political Change

World Domination

Page 17: Cyber crime

DEFENDING AGAINST CYBER TERRORISM

DETERRENCE CRIMINAL JUSTICE ENHANCED DEFENSE NEGOTIATIONS

Page 18: Cyber crime

AGAINST SOCIETY AT LARGE

  Pornography (basically child pornography)

Polluting the youth through indecent exposure

  Trafficking Financial crimes Sale of illegal articles Online gambling Forgery

Page 19: Cyber crime

TOP 20 :

Page 20: Cyber crime

CYBER CRIMES IN INDIA

Page 21: Cyber crime

   STATUTORY PROVISONS:

The Indian parliament considered it necessary to give effect to the resolution by which the General Assembly adopted Model Law on Electronic Commerce adopted by the United Nations

As a consequence of which the Information Technology Act 2000 was passed and enforced on 17th May 2000.

The Information Technology Act deals with the various cyber crimes in chapters IX & XI. The important sections are Ss. 43,65,66,67

Page 22: Cyber crime

VARIOUS SECTIONS

Section 43

deals with the unauthorised access, unauthorised downloading, virus attacks or any contaminant, causes damage, disruption, denial of access, interference with the service availed by a person

Section 65 deals with ‘tampering with computer source documents’ and provides for imprisonment up to 3 years or fine

Section 66 deals with ‘hacking with computer system’ and provides for imprisonment up to 3 years or fine

section 67 deals with publication of obscene material and provides for imprisonment up to a term of 10 years

Page 23: Cyber crime

PREVENTION OF CYBER CRIME To prevent cyber stalking avoid disclosing any

information pertaining to oneself. This is as good as disclosing your identity to strangers in public place.

Always avoid sending any photograph online particularly to strangers and chat friends as there have been incidents of misuse of the photographs.

Always use latest and up date anti virus software to guard against virus attacks.

Always keep back up volumes so that one may not suffer data loss in case of virus contamination

Never send your credit card number to any site that is not secured, to guard against frauds.

Page 24: Cyber crime

CONTD.

Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children.

Web site owners should watch traffic and check any irregularity on the site. Putting host-based intrusion detection devices on servers may do this

Web servers running public sites must be physically separate protected from internal corporate network.

Page 25: Cyber crime

CONCLUSION

History is the witness that no legislation has succeeded in totally eliminating crime from the globe.

The only possible step is to make people aware of

their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime.

Undoubtedly the IT Act is a historical step in the cyber world. Further I all together do not deny that there is a need to bring changes in the Information Technology Act to make it more effective to combat cyber crime.