Top Banner
Presented by: Suresh Jogesh Cyber Crimes & Cyber Laws
27
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber crime types & laws

Presented by: Suresh Jogesh

Cyber Crimes

& Cyber Laws

Page 2: Cyber crime types & laws

Introduction

Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs

Cybercrime is nothing but where the computer used as an object or subject of crime.

Page 3: Cyber crime types & laws

Cont…

The first spam email took place in 1978 when it was sent out over the Arpanet (Advanced Research Projects Agency Network),.

The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk cloner.

Page 4: Cyber crime types & laws

Cyber Crime

Definition : Cybercrime is a term for any illegal

activity that uses a computer as its primary means of commission. The U.S. Department of Justice expands the definition of cybercrime to include any illegal activity that uses a computer for the storage of evidence.

Page 5: Cyber crime types & laws

CYBER CRIMES ARE MAINLY CLASSIFIED AS:-

Those against a person.

Against Properties.

Crime targetting the government.

Page 6: Cyber crime types & laws

Against a Person

i. Harassment via e-mails: Harassment through e-mails is not a new concept. It is very similar to harassing through letters.

ii. Cyber-stalking : Cyber stalking involves following a person movements across the Internet by posting messages.

iii. Email spoofing: A mail which misrepresents its origin. It shows it's origin to be different from which actually it originates.

Page 7: Cyber crime types & laws

Against Properties

i.Computer Vandalism: Damaging or destroying data rather than stealing or misusing them is called cyber vandalism.

ii.Transmitting virus: These are programs that attach themselves to a file and then circulate .They usually affect the data on a computer, either by altering or deleting it.

Page 8: Cyber crime types & laws

Against Government

Cyber Terrorism:Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt. The recent example may be cited of – Osama Bin Laden, the LTTE, and attack on America’s army deployment system during Iraq war.

Page 9: Cyber crime types & laws

TYPES OF CYBER CRIMES HACKING DENIAL OF

SERVICE ATTACK VIRUS

DISSEMINATION SOFTWARE

PIRACY PORNOGRAPHY IRC Crime

NET EXTORTION PHISHING SPOOFING CYBER STALKING CYBER

DEFAMATION SALAMI ATTACK CREDIT CARD

FRAUD

Page 10: Cyber crime types & laws

Cyber Criminal

Those who are doing crimes by using the computer as an target or object.i. Children and adolescents between the age

group of 6 – 18 years ii. Dissatisfied employeesiii.Professional hackers / crackersiv.Organized hackers

Page 11: Cyber crime types & laws

Modes & Manners of Committing Cyber Crimes Unauthorized access to computer systems or

networks:

This is generally referred as ‘Hacking’. That is accessing the information of others without proper authorization.

Theft of information contained in electronic form:

This includes theft of information stored in computer hard disks, removable storage media etc. 

Page 12: Cyber crime types & laws

Cont…

Data diddling: This is altering raw data just before a computer processes it and then changing it back after the processing is completed.

Denial of Service attack:The computer is flooded with more requests than it can handle which cause it to crash. Distributed Denial of Service (DDOS) attack is a example.

Page 13: Cyber crime types & laws

Cont… Trojan attacks:

It means unauthorized programmer. It gains control over another’s system by representing itself as an authorized programmer.

Web jacking: This term is derived from the term hi jacking. In these kinds of

offences the hacker gains access and control over the web site of another.

Email bombing:

It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing. 

Page 14: Cyber crime types & laws

Hacking

Intrusion into a computer system without the permission of the computer owner/user.

E.g : Hacking into Best Western Database.

Page 15: Cyber crime types & laws

Types of Cyber Crimesi. Child Pornography:

The use of computer networks to create, distribute, or access materials that sexually use underage children.

ii. Cyber Contraband:Transferring illegal items through the internet (such as encryption technology) that is barred in some locations.

iii. Cyber laundering:Electronic transfer of illegally-obtained money with the goal of hiding its source and possibly its destination.

Page 16: Cyber crime types & laws

Cont ..

iv. Cyber Stalking:Threats that creates fear through the use of computer technology such as email, phones, text messages, webcams, websites or videos.

v. Cyber Theft:Using a computer to steal. This includes activities related to: breaking and entering, unlawful appropriation, identity theft, fraud, malicious hacking and piracy.

Page 17: Cyber crime types & laws

Cyber Security

Cyber security involves protection of sensitive personal and business information through prevention, detection, and response to different online attacks.

Cyber security actually protects your personal information by responding, detecting and preventing the attacks.

Page 18: Cyber crime types & laws

Protecting Your Privacy

Privacy policy :Before submitting your name, email address, or other personal information on a web site, look for the site's privacy policy.

Evidence that your information is being encrypted :To protect attackers from hijacking your information, any personal information submitted online should be encrypted. Many sites use SSL or secure sockets layer, to encrypt information.

Page 19: Cyber crime types & laws

How Can We Protect

Keep software up to date:If the seller releases patches for the software operating your device, install them as soon as possible. Installing them will prevent attackers from being able to take advantage.

Use good passwords:Select passwords that will be difficult for thieves to guess. Do not choose options that allow your computer to remember your passwords.

Page 20: Cyber crime types & laws

Cont …

Disable remote connectivity:Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use.

Page 21: Cyber crime types & laws

Extent of Progress on Updating Cyber Crime Laws

No Updated Laws (33):Albania, Bulgaria, Burundi, Cuba, Dominican Republic,Egypt, Ethiopia, Fiji, France, Gambia, Hungary, Iceland,Iran, Italy, Jordan, Kazakhstan, Latvia, Lebanon,Lesotho, Malta, Moldova, Morocco, New Zealand,Nicaragua, Nigeria, Norway, Romania, South Africa,Sudan, Vietnam, Yugoslavia, Zambia, Zimbabwe

Substantially or Fully Updated (10):Australia, Canada, Estonia, India,Japan, Mauritius, Peru, Philippines,Turkey, United States

Partially Updated (9):Brazil, Chile, China, CzechRepublic, Denmark,Malaysia, Poland, Spain,United Kingdom

Page 22: Cyber crime types & laws

Cyber Laws in INDIA India has enacted the first I.T.Act, 2000

based on the UNCIRAL model recommended by the general assembly of the United Nations.

Offence under IT ActsTampering with Computer source documentsHacking with Computer systems, Data alteration Publishing obscene information Un-authorised

access to protected system Breach of Confidentiality and Privacy Publishing false digital signature certificates

Page 23: Cyber crime types & laws

Computer Related Crimes Covered under IPC & Special Laws

Sending threatening messages by email Sending defamatory messages by email Forgery of electronic records Bogus websites, cyber frauds Email spoofing Web-Jacking E-Mail Abuse Online sale of Drugs Online sale of Arms

Page 24: Cyber crime types & laws

DRAWBACKS OF PRESENT CYBER LAWS

Jurisdiction is the highly debatable issue Due to growing arms of cyber space the

territorial boundaries seem to vanish Loss of evidence because

data are routinely destroyed collection of data outside the territorial extent

Cyber Army Requirement for highly technical staff High technology crime & investigation

infrastructure A law regulating the cyber-space

Page 25: Cyber crime types & laws

Conclusion Weak penalties limit deterrence

These crimes have large-scale economic and social effects.

Self-protection remains the first line of defense for e.g. Finding the holes in the networkUsing intrusion alert programsUsing Encryption

A law regulating the cyber-space

Page 26: Cyber crime types & laws

Cont …

Co-operation for exchange of material and evidence of computer crimes between law enforcement agencies.

Page 27: Cyber crime types & laws

THANK YOU