Top Banner

of 20

internet-110120093801-phpapp02

Apr 05, 2018

Download

Documents

Amrita Rana
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/2/2019 internet-110120093801-phpapp02

    1/20

    AMRITA RANASEMESTER 3RD

    AIALS (BUSINESS LAW)

    CYBER CRIME

  • 8/2/2019 internet-110120093801-phpapp02

    2/20

    CYBER CRIMECyber crime - Criminal activity in which computers

    or computer networks are a tool, a target, or a placeof criminal activity and include everything from

    electronic cracking to denial of service attacks. Italso refers to criminal exploitation of Internet. Itincludes-

    Unauthorized access to computer systems,

    Data alteration, Data destruction,

    Theft of intellectual property,etc.

  • 8/2/2019 internet-110120093801-phpapp02

    3/20

    Computer crime encompasses a broad range ofpotentially illegal activities.

    It can be divided into two broad activities:

    (1) Crimes that target computer networks ordevices directly,

    e.g., Computer viruses, Denial of service attacks.

    (2) Crimes facilitated by computer networks or

    devices, the primary target of which isindependence of computer network or device.

    e.g., Cyber stalking, Fraud and identity theft,Phishing scams,etc.

  • 8/2/2019 internet-110120093801-phpapp02

    4/20

    .

    Cybercrimes can be basically divided into 3 majorcategories:

    1. Cybercrimes against persons.

    2. Cybercrimes against property.

    3. Cybercrimes against government.

  • 8/2/2019 internet-110120093801-phpapp02

    5/20

  • 8/2/2019 internet-110120093801-phpapp02

    6/20

    .

    A minor girl in Ahmedabad was lured to a privateplace through cyberchat by a man, who, along withhis friends, attempted to gangrape her. As somepassersby heard her cry, she was rescued.

    Another example wherein the damage was not doneto a person but to the masses is the case of theMelissa virus. The Melissa virus first appeared on the

    internet in March of 1999. It spread rapidlythroughout computer systems in the United Statesand Europe. It is estimated that the virus caused 80million dollars in damages to computers worldwide.

  • 8/2/2019 internet-110120093801-phpapp02

    7/20

    Cybercrimes against property

    The second category of Cyber-crimes is that ofCybercrimes against all forms of property. Thesecrimes include computer vandalism (destruction ofothers' property), transmission of harmful

    programmes.

    A Mumbai-based upstart engineering company lost asay and much money in the business when the rival

    company, an industry major, stole the technicaldatabase from their computers with the help of acorporate cyberspy.

  • 8/2/2019 internet-110120093801-phpapp02

    8/20

    A Mumbai-based upstart engineering company lost asay and much money in the business when the rivalcompany, an industry major, stole the technicaldatabase from their computers with the help of acorporate cyberspy

  • 8/2/2019 internet-110120093801-phpapp02

    9/20

    Cybercrimes against government

    The third category of Cyber-crimes relate toCybercrimes against Government. Cyberterrorism isone distinct kind of crime in this category. Thegrowth of internet has shown that the medium ofCyberspace is being used by individuals and groupsto threaten the international governments as also toterrorise the citizens of a country. This crime

    manifests itself into terrorism when an individual"cracks" into a government or military maintainedwebsite.

  • 8/2/2019 internet-110120093801-phpapp02

    10/20

    In a report of expressindia.com, it was said that internetwas becoming a boon for the terrorist organisations.According to Mr. A.K. Gupta, Deputy Director (Co-ordination), CBI, terrorist outfits are increasingly using

    internet to communicate and move funds. "Lashker-e-Toiba is collecting contributions online from itssympathisers all over the world. During the investigationof the Red Fort shootout in Dec. 2000, the accused

    Ashfaq Ahmed of this terrorist group revealed that the

    militants are making extensive use of the internet tocommunicate with the operatives and the sympathisersand also using the medium for intra-bank transfer offunds".

  • 8/2/2019 internet-110120093801-phpapp02

    11/20

    Types of cyber crimes

    Cyber stalking

    Hacking

    Phishing

    Crosssite scriptingVishing

    Cyber Squatting

    Bot Networks

  • 8/2/2019 internet-110120093801-phpapp02

    12/20

    1. Cyber Stalking

    Cyber stalking is also called as Online harassment andOnline abuse.

    It is use of the Internet or other electronic means to

    stalk someone. Stalking generally involves harassing orthreatening behaviour that an individual engages inrepeatedly, such as following a person, appearing at aperson's home or place of business, making harassingphone calls, leaving written messages or objects, orvandalizing a person's property.

  • 8/2/2019 internet-110120093801-phpapp02

    13/20

    2. Phishing

    Phishing is just one of the many

    frauds on the Internet, trying to fool

    people into parting with their money.

    Phishing refers to the receiptof unsolicited emails by customers

    of financial institutions, requesting

    them to enter their username,password or other personal

    information to access their account

    for some reason.

  • 8/2/2019 internet-110120093801-phpapp02

    14/20

    3. Cross site scripting

    Cross-site scripting (XSS) is a type of computersecurity vulnerability typically found in web

    applications which allow code injection by maliciousweb users into the web pages viewed by other users.

  • 8/2/2019 internet-110120093801-phpapp02

    15/20

    4. Hacking

    Hacking" is a crime, which entails cracking systemsand gaining unauthorized access to the data stored inthem. Hacking had witnessed a 37 per cent increase

    this year.

  • 8/2/2019 internet-110120093801-phpapp02

    16/20

    5. Vishing

    Vishing is the criminal practice of using socialengineering and Voice over IP (VoIP) to gain accessto private, personal and financial information fromthe public for the purpose of financial reward. Theterm is a combination of "voice" and phishing.

  • 8/2/2019 internet-110120093801-phpapp02

    17/20

    6. Cyber Squatting

    Cyber squatting is the act of registering a famousdomain name with intent to profit from the goodwillof a trademark belonging to someone else. Thecybersquatter then offers to sell the domain to the

    person or company who owns a trademark containedwithin the name at an inflated price. This is an issuethat has not been tackled in IT act 2000.

  • 8/2/2019 internet-110120093801-phpapp02

    18/20

    7. Bot Networks

    A CYBER CRIME CALLED 'BOT NETWORKS', WHEREIN

    SPAMSTERS AND OTHER PERPETRATORS OF CYBER

    CRIMES REMOTELY TAKE CONTROL OF COMPUTERS

    WITHOUT THE USERS REALIZING IT. IT ISINCREASING AT AN ALARMING RATE.

    COMPUTERS GET LINKED TO BOT NETWORKS WHEN

    USERS UNKNOWINGLY DOWNLOAD MALICIOUS

    CODES SUCH AS TROJAN HORSE SENT AS E-MAIL

    ATTACHMENTS.

  • 8/2/2019 internet-110120093801-phpapp02

    19/20

    CYBER CRIME CASES On 7th Feb,2000 Yahoo! Website was attacked.

    Yahoo was pinged at a rate of 1gb/sec.

    In 26 March 1999, the Melissa worm infected a

    document on a victim's computer, thenautomatically sent that document and copy of the

    virus via e-mail to other people.

    On 2nd March 2010, Spanish investigators busted

    3 infection of over 13 million computers aroundthe world. The "botnet" of infected computersincluded PCs inside more than half of the Fortune1,000 companies and more than 40 major banks.

  • 8/2/2019 internet-110120093801-phpapp02

    20/20

    Issues

    1) Cyber crime law in India: Has law keptpace with emerging trends?

    2) What measures should be taken to

    prevent the cyber crimes?