17
CYBER CRIME BY- MD. ANEES RAZA (DELHI UNIVERSITY)

Cyber crime

Embed Size (px)

DESCRIPTION

Cyber Crime Presentation, Cyber Crime

Citation preview

Page 1: Cyber crime

CYBER CRIME BY- MD. ANEES RAZA

(DELHI UNIVERSITY)

Page 2: Cyber crime

Cyber Crime or Computer Crime refers to any crime that involves computer and a network.

(a). The computer may have been used in the commission of a crime , it may be the target. NETCRIME refers to criminal exploitation of the internet.

Page 3: Cyber crime

Debarati Halder & Dr. K.Jaishankar (2011) defines

cybercrimes as: “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly ,using modern telecommunication networks

such as internet.

Page 4: Cyber crime

Issues surrounding these types of crimes have become high-profile ,particularly those

surrounding cracking, copyright, infringement, child pornography and

child grooming.There are also problems of privacy

when confidential information is lost or intercepted, lawfully or otherwise.

Page 5: Cyber crime

CLASSIFICATION:

Computer crime encompasses a broad range of activities .

Generally, however, it may be divided into two categories:(1). Crimes that target computers directly.(2). Crimes facilitated by computer networks or devices,

the primary target of which is independent of the computer network or device.

Crimes that primarily target computer networks or devices include:

• Computer viruses• Denial-of-service attacks• Malware (malicious code)

Page 6: Cyber crime

Crimes that use computer networks or devices to advance other ends

include:* Cyber stalking

* Fraud and Identity theft* Information Warfare

*Phishing scams

Page 7: Cyber crime

(1). SPAM: Spam, or the unsolicited sending of the bulk email for

commercial purposes, is unlawful in some jurisdictions. While anti-spam laws are relatively new, limits on unsolicited electronics communications have existed for some time.

(2). FRAUD: Computer fraud is any dishonest misrepresentation of

the fact intended to let another to do or refrain from doing something which causes loss.

Including Bank fraud, Identity theft, extortion, and theft of classified information

Page 8: Cyber crime

A variety of internet scams target direct to consumers.

(1) Obscene and offensive content: The content of websites and the other

electronics communications may be distasteful, obscene or offensive for a variety of reasons. In some instances these communication may be illegal.

One area of Internet pornography that has been the target of the strongest efforts at curtailment is child pornography.

Page 9: Cyber crime

(2). Harassment: Whereas content may be offensive in a non-

specific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation.

This often occurs in the chat rooms, through newsgroups, and by sending hate email to interested parties.(E.g. Cyber bullying, Cyber stalking, Hate Crime, and Stalking)

Page 10: Cyber crime

(3). Drug Trafficking: Drug traffickers are increasingly taking

advantage of the Internet to sell their illegal substances through encrypted e-mail and other internet technology.

(4). Cyber terrorism: Cyber terrorism Is the use of internet based

attacks in terrorists activities, including acts of deliberate, large- scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.

Page 11: Cyber crime

CYBER LAW: Cyber law is a term use

to describe the legal issues related to use of communication technology, particularly cyber space, i.e. Internet.

Cyber law is an attempt to apply laws designed for the physical world to human activities on the internet.

Page 12: Cyber crime

IT ACT:An act to provide legal recognition for the

transaction carried out by means of electronics data interchange and other means of

electronics communication, commonly referred to as “electronics commerce”.

Page 13: Cyber crime

CYBER THEFT CASE

Page 14: Cyber crime

Rs. 24 crore cyber theft

(a). Theft of Rs.24 crore from the YES Bank account of RPG Group.

(b). Cops recovered more than half of the stolen amount.

(c). Police arrested 13 persons from Chennai and Delhi.

Page 15: Cyber crime

TRAILS

(a). Hackers operating from two Wi-Fi connections in Delhi allegedly stole the amount on may 11,2013.

(b). The money was deposited in 12 bank accounts across the country.

(c). In June, Police located the address where the IP address originated , but it turned out false.

Page 16: Cyber crime

IT ACT APPLICABLE & PUNISHMENT

(a). Section 66D Punishment for cheating by personation by using computer resource are applicable.

(b). Section 415 & 420 of IPC are applicable for cheating and theft.

(c). Punished with imprisonment of either description for a term which may extended to three years and also be liable to fine which may be extended to 1 lakh rupees.

Page 17: Cyber crime

THANK YOU