8/8/2019 Cyber Crime Soft Copy
1/19
PRESENTED BY
Cali Jeffreena and Swetha
II BSc.ComputerTechnology
Sri Krishna Arts and
Science College
8/8/2019 Cyber Crime Soft Copy
2/19
www.company.com
Criminal activity involving
Information technology infrastructure
Illegal access
Data interference
Misuse of devices
Forgery and
Electronic fraud.
8/8/2019 Cyber Crime Soft Copy
3/19
8/8/2019 Cyber Crime Soft Copy
4/19
Children and adolescents between the
age group of 6 18 years
Organised hackers Professional hackers / crackers
Discontented employees
8/8/2019 Cyber Crime Soft Copy
5/19
Unauthorized access to computer systems ornetworks / Hacking
Theft of information contained in electronic form Email bombing Data diddling Salami attacks Denial of Service attack
Virus / worm attacks Logic bombs Trojan attacks Internet time thefts Web jacking
8/8/2019 Cyber Crime Soft Copy
6/19
CLASSIFICATION
Against Individuals
Against Individual Property
Against OrganizationAgainst Society at large
8/8/2019 Cyber Crime Soft Copy
7/19
www.company.com
Harassment via e-mails.
Cyber-stalking.
Dissemination of obscene material.
Defamation. Unauthorized control/access overcomputer system.
Indecent exposure
Email spoofing
Cheating & Fraud
8/8/2019 Cyber Crime Soft Copy
8/19
Computer vandalism.
Transmitting virus.
Unauthorized control/access over computer system.
Intellectual Property crimes Internet time thefts
8/8/2019 Cyber Crime Soft Copy
9/19
8/8/2019 Cyber Crime Soft Copy
10/19
Unauthorized control/accessover computer
system
Possessionofunauthorizedinformation.
Cyberterrorismagainstthegovernment
organization.
Distributionofpiratedsoftwareetc.
8/8/2019 Cyber Crime Soft Copy
11/19
Pornography (basically child pornography).
Polluting the youth through indecent
exposure.
Trafficking
Financial crimes
Sale of illegal articles
Online gambling
Forgery
8/8/2019 Cyber Crime Soft Copy
12/19
8/8/2019 Cyber Crime Soft Copy
13/19
8/8/2019 Cyber Crime Soft Copy
14/19
8/8/2019 Cyber Crime Soft Copy
15/19
The hurry in which the legislation was passed, withoutsufficient public debate, did not really serve the desiredpurpose
Cyber laws, in their very preamble and aim, state that they aretargeted at aiding e-commerce, and are not meant to regulatecybercrime
Cyber torts
Cyber crime in the Act is neither comprehensive nor exhaustive
Ambiguity in the definitions
Uniform law Lack of awareness
Jurisdiction issues
Extra territorial application
Raising a cyber army
Hesitation to report offences
8/8/2019 Cyber Crime Soft Copy
16/19
HOW TO DEAL WITH THIS PROBLEM
y International Agreements and Cooperation Essential due to
the Worldwide Nature of the Internet
y Software and Hardware defenses
(e.g., antispam, antivirus software, firewalls)y Other practical steps.
8/8/2019 Cyber Crime Soft Copy
17/19
Avoiddisclosinganyinformationpertainingtooneself.
Avoidsendinganyphotographonlineparticularly
tostrangers.Uselatestandupdateantivirussoftware.
Keepback upvolumes.
Never
send
your
credit
card
number
to
any
site
thatisnotsecured.
Useoffirewallsmaybebeneficial.
8/8/2019 Cyber Crime Soft Copy
18/19
CONCLUSION
The only possible step is to make people aware
of their rights and duties (to report crime as a
collective duty towards the society) and further
making the application of the laws morestringent to check crime.
8/8/2019 Cyber Crime Soft Copy
19/19