Академический Документы
Профессиональный Документы
Культура Документы
ÔComputer is a target
ÔComputer is a tool of crime
ÔComputer is incidental to crime
Because:
c
REASONS u OR CYBER CRIME:
Ô Capacity of a computer to store data in comparatively low space.
Ô Weakness in operating system
Ô Easy to access
Ô Negligence or lack of awareness in users
Ô oss of Evidence
÷ ÷
c
AGAINST INDIVIDUA S
Virus
Attack
Cyber-
arassment
Stalking
Against
Individual
Defamation Thefts
Email
spoofing
AGAINST ORGANIZATIONS
Unauthorized
Control
on System
Unauthorized Pirated
Information
Against
Soft are
Organization
Possessed Distribution
Cyber
AGAINST SOCIETY
Terrorism
c
AGAINST SOCIETY
Pornography
uinancial
Trafficking crimes
Against
Society
Sale of illegal
uorgery articles
Online
gambling
c
MODE & MANNER Ou CYBER CRIMES:
a)HACKING:
b)CYBER STA KING:
Ô Action: Virus infects other programs and makes copies of itself and
spread into other programs in the same machine. Worms, unlike
viruses do not need the host to attach themselves to. They merely
make functional copies of themselves and do this repeatedly till they
eat up all the availab le space on a computer's memory.
Ô Case: Use of malicious software like Trojan horse, Time Bomb, ogic
Bomb, Rabbit & Bacterium.
Ô aw: Sections 43 and 66 of Information Technology Act and section
426 of Indian Penal Code
Ô Punishment: Provides for imprisonment up to 3 years or fine, which
may extend up to 2 lakh rupees or both.
c
d)CREDIT CARD uRAUD:
Ô Action: The victim·s credit card information is stolen and misused for
making online purchases. Install key-loggers in public computers. If
electronic transactions are not secured, the credit card number can be
stolen by the hackers who can misuse this card by impersonating the
credit card owner.
Ô Case: credit card fraud in a BPO in Chennai.
Ô aw: Sections 43 and 66 of Information Technology Act and section
420 of Indian Penal Code.
Ô Punishment: Imprisonment of either description for a term which may
extend to seven years, and shall also be liable to fine(420). Provides for
imprisonment up to 3 years or fine, which may extend up to 2 lakh
rupees or both(66).
c
e)SA AMI ATTACKS:
f) EMAI BOMBING:
g)CYBER PORNOGRAPHY:
c
h)SOuTWARE P IRACY:
i) WEB J ACKING:
Ô Action: In these kinds of offences the hacker gains access and control
over the web site of another person or organization. He may even
mutilate or change the information on the site
Ô Case: the site of MIT (Ministry of Information Technology) was
hacked by the Pakistani hackers and some obscene matter was placed
therein
Ô aw: Section 383 IPC
k)NET EXTORTION:
c
l) EMAI SPOOuING :
m) CYBER DEuAMATION:
c
n) EMAI P HISHING:
c
IMAGE Ou NIGERIAN M AI
c
ANOTHER EXAMP E Ou PHISHING MAI
To: India
https://infinity.*****bank.co.in/Verify.jsp
c
Actual ogin Page
c
OOPHO ES IN THE OW ENuORCEMENT:
SAuETY MEASURES:
CONC USION:
c