8/2/2019 internet-110120093801-phpapp02
1/20
AMRITA RANASEMESTER 3RD
AIALS (BUSINESS LAW)
CYBER CRIME
8/2/2019 internet-110120093801-phpapp02
2/20
CYBER CRIMECyber crime - Criminal activity in which computers
or computer networks are a tool, a target, or a placeof criminal activity and include everything from
electronic cracking to denial of service attacks. Italso refers to criminal exploitation of Internet. Itincludes-
Unauthorized access to computer systems,
Data alteration, Data destruction,
Theft of intellectual property,etc.
8/2/2019 internet-110120093801-phpapp02
3/20
Computer crime encompasses a broad range ofpotentially illegal activities.
It can be divided into two broad activities:
(1) Crimes that target computer networks ordevices directly,
e.g., Computer viruses, Denial of service attacks.
(2) Crimes facilitated by computer networks or
devices, the primary target of which isindependence of computer network or device.
e.g., Cyber stalking, Fraud and identity theft,Phishing scams,etc.
8/2/2019 internet-110120093801-phpapp02
4/20
.
Cybercrimes can be basically divided into 3 majorcategories:
1. Cybercrimes against persons.
2. Cybercrimes against property.
3. Cybercrimes against government.
8/2/2019 internet-110120093801-phpapp02
5/20
8/2/2019 internet-110120093801-phpapp02
6/20
.
A minor girl in Ahmedabad was lured to a privateplace through cyberchat by a man, who, along withhis friends, attempted to gangrape her. As somepassersby heard her cry, she was rescued.
Another example wherein the damage was not doneto a person but to the masses is the case of theMelissa virus. The Melissa virus first appeared on the
internet in March of 1999. It spread rapidlythroughout computer systems in the United Statesand Europe. It is estimated that the virus caused 80million dollars in damages to computers worldwide.
8/2/2019 internet-110120093801-phpapp02
7/20
Cybercrimes against property
The second category of Cyber-crimes is that ofCybercrimes against all forms of property. Thesecrimes include computer vandalism (destruction ofothers' property), transmission of harmful
programmes.
A Mumbai-based upstart engineering company lost asay and much money in the business when the rival
company, an industry major, stole the technicaldatabase from their computers with the help of acorporate cyberspy.
8/2/2019 internet-110120093801-phpapp02
8/20
A Mumbai-based upstart engineering company lost asay and much money in the business when the rivalcompany, an industry major, stole the technicaldatabase from their computers with the help of acorporate cyberspy
8/2/2019 internet-110120093801-phpapp02
9/20
Cybercrimes against government
The third category of Cyber-crimes relate toCybercrimes against Government. Cyberterrorism isone distinct kind of crime in this category. Thegrowth of internet has shown that the medium ofCyberspace is being used by individuals and groupsto threaten the international governments as also toterrorise the citizens of a country. This crime
manifests itself into terrorism when an individual"cracks" into a government or military maintainedwebsite.
8/2/2019 internet-110120093801-phpapp02
10/20
In a report of expressindia.com, it was said that internetwas becoming a boon for the terrorist organisations.According to Mr. A.K. Gupta, Deputy Director (Co-ordination), CBI, terrorist outfits are increasingly using
internet to communicate and move funds. "Lashker-e-Toiba is collecting contributions online from itssympathisers all over the world. During the investigationof the Red Fort shootout in Dec. 2000, the accused
Ashfaq Ahmed of this terrorist group revealed that the
militants are making extensive use of the internet tocommunicate with the operatives and the sympathisersand also using the medium for intra-bank transfer offunds".
8/2/2019 internet-110120093801-phpapp02
11/20
Types of cyber crimes
Cyber stalking
Hacking
Phishing
Crosssite scriptingVishing
Cyber Squatting
Bot Networks
8/2/2019 internet-110120093801-phpapp02
12/20
1. Cyber Stalking
Cyber stalking is also called as Online harassment andOnline abuse.
It is use of the Internet or other electronic means to
stalk someone. Stalking generally involves harassing orthreatening behaviour that an individual engages inrepeatedly, such as following a person, appearing at aperson's home or place of business, making harassingphone calls, leaving written messages or objects, orvandalizing a person's property.
8/2/2019 internet-110120093801-phpapp02
13/20
2. Phishing
Phishing is just one of the many
frauds on the Internet, trying to fool
people into parting with their money.
Phishing refers to the receiptof unsolicited emails by customers
of financial institutions, requesting
them to enter their username,password or other personal
information to access their account
for some reason.
8/2/2019 internet-110120093801-phpapp02
14/20
3. Cross site scripting
Cross-site scripting (XSS) is a type of computersecurity vulnerability typically found in web
applications which allow code injection by maliciousweb users into the web pages viewed by other users.
8/2/2019 internet-110120093801-phpapp02
15/20
4. Hacking
Hacking" is a crime, which entails cracking systemsand gaining unauthorized access to the data stored inthem. Hacking had witnessed a 37 per cent increase
this year.
8/2/2019 internet-110120093801-phpapp02
16/20
5. Vishing
Vishing is the criminal practice of using socialengineering and Voice over IP (VoIP) to gain accessto private, personal and financial information fromthe public for the purpose of financial reward. Theterm is a combination of "voice" and phishing.
8/2/2019 internet-110120093801-phpapp02
17/20
6. Cyber Squatting
Cyber squatting is the act of registering a famousdomain name with intent to profit from the goodwillof a trademark belonging to someone else. Thecybersquatter then offers to sell the domain to the
person or company who owns a trademark containedwithin the name at an inflated price. This is an issuethat has not been tackled in IT act 2000.
8/2/2019 internet-110120093801-phpapp02
18/20
7. Bot Networks
A CYBER CRIME CALLED 'BOT NETWORKS', WHEREIN
SPAMSTERS AND OTHER PERPETRATORS OF CYBER
CRIMES REMOTELY TAKE CONTROL OF COMPUTERS
WITHOUT THE USERS REALIZING IT. IT ISINCREASING AT AN ALARMING RATE.
COMPUTERS GET LINKED TO BOT NETWORKS WHEN
USERS UNKNOWINGLY DOWNLOAD MALICIOUS
CODES SUCH AS TROJAN HORSE SENT AS E-MAIL
ATTACHMENTS.
8/2/2019 internet-110120093801-phpapp02
19/20
CYBER CRIME CASES On 7th Feb,2000 Yahoo! Website was attacked.
Yahoo was pinged at a rate of 1gb/sec.
In 26 March 1999, the Melissa worm infected a
document on a victim's computer, thenautomatically sent that document and copy of the
virus via e-mail to other people.
On 2nd March 2010, Spanish investigators busted
3 infection of over 13 million computers aroundthe world. The "botnet" of infected computersincluded PCs inside more than half of the Fortune1,000 companies and more than 40 major banks.
8/2/2019 internet-110120093801-phpapp02
20/20
Issues
1) Cyber crime law in India: Has law keptpace with emerging trends?
2) What measures should be taken to
prevent the cyber crimes?