Cyber Crimer 2003 Final

Embed Size (px)

Citation preview

  • 8/2/2019 Cyber Crimer 2003 Final

    1/20

  • 8/2/2019 Cyber Crimer 2003 Final

    2/20

    INTRODUCTION

    It is any crime thatInvolves the use of acomputer/network.

    Computers can be usedin the commission ofthe crime or maybe thetarget.

    Examples-Bank fraud,identity theft, extortion,espionage.

    CYBER CRIME

  • 8/2/2019 Cyber Crimer 2003 Final

    3/20

    The FBI estimates thatcyber crime cost UScompanies $ 559.7

    million in 2009.Annual cyber crime

    survey carried out incities across the country

    reveals that the cost ofcyber crime suffered byIndians is aroundRs. 34,110 croresannually.

    CYBER CRIME

  • 8/2/2019 Cyber Crimer 2003 Final

    4/20

    Everybody is using COMPUTERS. From children to teenagers to adults, white collarexecutives, criminals to terrorist organizations. Conventional crimes like forgery, extortion,kidnapping etc. are being committed with the help

    of computers.

    Monetary transactions are being done via theINTERNET.

  • 8/2/2019 Cyber Crimer 2003 Final

    5/20

    TYPES OF CYBER CRIMES

    Illegal intrusion into

    a computer

    system/network.Government

    websites- HOT

    targets for hackers.

    Hackers enjoy

    media coverage.

  • 8/2/2019 Cyber Crimer 2003 Final

    6/20

    Involves the use of

    malicious software.

    It attaches itself to

    other software.

    Examples- Trojans,Viruses, Worms, etc.

  • 8/2/2019 Cyber Crimer 2003 Final

    7/20

    Distribution of illegaland unauthorizedpirated copies of

    software. Involves theft of

    software intended topass for the original.

    Retail revenue lossesworldwide are everincreasing due to this

    crime.

  • 8/2/2019 Cyber Crimer 2003 Final

    8/20

    Acts of terrorism committed

    through the use of cyberspace or

    computers.

    Hacking directed towards

    individuals, families, organized by

    groups within networks, tending

    to cause fear among people.

    A Cyber terrorist intimidates a

    government or organization toadvance his/her political or social

    objectives by launching

    computer-based attack against

    computers, network, and the

    information stored on them.

  • 8/2/2019 Cyber Crimer 2003 Final

    9/20

    It is a term for theftand fraud committedusing a credit card as a

    fraudulent source offunds in a transaction.

    Credit card numberscan be stolen by

    hackers who canmisuse this card byimpersonating thecredit card owner.

  • 8/2/2019 Cyber Crimer 2003 Final

    10/20

    Is the unsolicited sending of

    bulk email for commercial

    purposes.

    It is unlawful to varyingdegrees.

    Anti-spam laws are

    relatively new. However

    limits on unsolicitedelectronic communications

    have existed in some forms

    for some time.

  • 8/2/2019 Cyber Crimer 2003 Final

    11/20

    Turn ON your spam blocker.Most Internet providersprovide a spam blockingfeature to prevent unwantedmessages, such as fraudulentemails and phishing emails,from getting to your inbox.

    Adequate anti-virus softwarefor your computer- McAfee,Norton Anti-Virus, Stopzilla orother similar programs.

    Use your computer's firewallprotection feature, which is adigitally created barrier thatprevents hackers from gettinginto your computer system.

    What can we do to protect ourselves?

  • 8/2/2019 Cyber Crimer 2003 Final

    12/20

    Encrypt important data you don'twant compromised. Utilize

    encryption software, which makes it

    unavailable to anyone who tries to

    hack into your computer system.

    Be wary of providing personalinformation via a website-name,

    mailing address, bank account

    number.

    Shopping at insecure websites-run

    the risk of submitting credit cardinformation and other personal

    information to a site that may be a

    fraud.

    Monitor the online activities of

    children.

    What can we do to protect ourselves?

  • 8/2/2019 Cyber Crimer 2003 Final

    13/20

    Is the law governing computers, networks, software, data storage

    devices (such as hard disks, USB drives etc), the Internet, websites,emails even electronic devices such as cell phones, ATM machines etc.

    Deals with unlawful acts where the computer is used either as a tool or

    atarget or both.

    Is needed as Cyberspace tends to show complete disrespect for

    jurisdictional boundaries.

    Is necessary as Cyberspace offers enormous potential for anonymity.

    CYBER LAW

  • 8/2/2019 Cyber Crimer 2003 Final

    14/20

    CYBER LAW IN INDIA

    India has enacted the firstInformation Technology Act(I.T. Act) in the year 2000based on the UNCITRAL

    (United Nations Commissionon International Trade Law)model.

    Chapter XI of this Act dealswith offence/crimes alongwith certain other provisionsscattered in this Act.

  • 8/2/2019 Cyber Crimer 2003 Final

    15/20

    It defends us from cyber attacks. It helps us browse websites safely.

    Encourages purchase transactions over theInternet through credit cards without fear of

    misuse. Provides compensations to the victims of Cyber

    Crimes.

  • 8/2/2019 Cyber Crimer 2003 Final

    16/20

    BAAZEE.COM CASE(DECEMBER 2004)

    Police arrested the CEO of auction websiteBaazee.com Avnish Bajaj.

    He was arrested under Section 67 of theInformation Technology Act 2000.

    A CD containing a lewd MMS of a student of a

    public school was being sold on the website.

  • 8/2/2019 Cyber Crimer 2003 Final

    17/20

    Pune Citibank MphasiSCall Center Fraud

    US $ 3,50,000 from accounts of four US customerswere dishonestly transferred to bogus accounts.

    Employees gained the confidence of the customerand obtained their PIN numbers to commit fraud.

    All accounts were opened in Pune and thecustomers complained that the money from theiraccounts was transferred to Pune accounts andthats how the criminals were traced.

  • 8/2/2019 Cyber Crimer 2003 Final

    18/20

    PARLIAMENT ATTACK CASE

    (DECEMBER 2001)

    Bureau of Police Research and

    Development at Hyderabadretrieved information from alaptop recovered from a terroristwho attacked Parliament.

    The laptop contained the stickerof the Ministry of Home thatthey had made on the laptopand pasted on their ambassadorcar to gain entry into Parliament

    House. It also contained the fake ID card

    that one of the two terroristswas carrying with a Governmentof India emblem and seal.

  • 8/2/2019 Cyber Crimer 2003 Final

    19/20

    Many case studies indicate thatall walks of life are gettingexposed to cyber crime.

    The Internet offers a number of

    opportunities for cyber criminalseither to cause harm to innocentpeople, or to make a fast buck atthe expense of unsuspectingcitizens.

    Cyber crime in India, as all overthe world, is on the rise and tocurb its scope and complexity isthe need of today.

  • 8/2/2019 Cyber Crimer 2003 Final

    20/20

    -PRESENTED BY -

    Amanda Almeida- 1002

    Patricia Pereira- 1003

    Varun Brahmwar- 1008

    Lukvisha Carvalho- 1009

    Valenie Fernandes- 1031

    Zubin Fernandes- 1037

    Annette Pinto- 1072