Cyber crime

Preview:

DESCRIPTION

Cyber Crime Presentation, Cyber Crime

Citation preview

CYBER CRIME BY- MD. ANEES RAZA

(DELHI UNIVERSITY)

Cyber Crime or Computer Crime refers to any crime that involves computer and a network.

(a). The computer may have been used in the commission of a crime , it may be the target. NETCRIME refers to criminal exploitation of the internet.

Debarati Halder & Dr. K.Jaishankar (2011) defines

cybercrimes as: “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly ,using modern telecommunication networks

such as internet.

Issues surrounding these types of crimes have become high-profile ,particularly those

surrounding cracking, copyright, infringement, child pornography and

child grooming.There are also problems of privacy

when confidential information is lost or intercepted, lawfully or otherwise.

CLASSIFICATION:

Computer crime encompasses a broad range of activities .

Generally, however, it may be divided into two categories:(1). Crimes that target computers directly.(2). Crimes facilitated by computer networks or devices,

the primary target of which is independent of the computer network or device.

Crimes that primarily target computer networks or devices include:

• Computer viruses• Denial-of-service attacks• Malware (malicious code)

Crimes that use computer networks or devices to advance other ends

include:* Cyber stalking

* Fraud and Identity theft* Information Warfare

*Phishing scams

(1). SPAM: Spam, or the unsolicited sending of the bulk email for

commercial purposes, is unlawful in some jurisdictions. While anti-spam laws are relatively new, limits on unsolicited electronics communications have existed for some time.

(2). FRAUD: Computer fraud is any dishonest misrepresentation of

the fact intended to let another to do or refrain from doing something which causes loss.

Including Bank fraud, Identity theft, extortion, and theft of classified information

A variety of internet scams target direct to consumers.

(1) Obscene and offensive content: The content of websites and the other

electronics communications may be distasteful, obscene or offensive for a variety of reasons. In some instances these communication may be illegal.

One area of Internet pornography that has been the target of the strongest efforts at curtailment is child pornography.

(2). Harassment: Whereas content may be offensive in a non-

specific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation.

This often occurs in the chat rooms, through newsgroups, and by sending hate email to interested parties.(E.g. Cyber bullying, Cyber stalking, Hate Crime, and Stalking)

(3). Drug Trafficking: Drug traffickers are increasingly taking

advantage of the Internet to sell their illegal substances through encrypted e-mail and other internet technology.

(4). Cyber terrorism: Cyber terrorism Is the use of internet based

attacks in terrorists activities, including acts of deliberate, large- scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.

CYBER LAW: Cyber law is a term use

to describe the legal issues related to use of communication technology, particularly cyber space, i.e. Internet.

Cyber law is an attempt to apply laws designed for the physical world to human activities on the internet.

IT ACT:An act to provide legal recognition for the

transaction carried out by means of electronics data interchange and other means of

electronics communication, commonly referred to as “electronics commerce”.

CYBER THEFT CASE

Rs. 24 crore cyber theft

(a). Theft of Rs.24 crore from the YES Bank account of RPG Group.

(b). Cops recovered more than half of the stolen amount.

(c). Police arrested 13 persons from Chennai and Delhi.

TRAILS

(a). Hackers operating from two Wi-Fi connections in Delhi allegedly stole the amount on may 11,2013.

(b). The money was deposited in 12 bank accounts across the country.

(c). In June, Police located the address where the IP address originated , but it turned out false.

IT ACT APPLICABLE & PUNISHMENT

(a). Section 66D Punishment for cheating by personation by using computer resource are applicable.

(b). Section 415 & 420 of IPC are applicable for cheating and theft.

(c). Punished with imprisonment of either description for a term which may extended to three years and also be liable to fine which may be extended to 1 lakh rupees.

THANK YOU