Вы находитесь на странице: 1из 15

Cyber Crime

Cyber crime is a term used to broadly

describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. Cyber crime in the context of national security may involve hacktivism, traditional espionage, or information warfare and related activities.
2

Types of Cyber Crimes


Cyber Stalking
Ex: Mrs. Ritu Kohli Case (1st Cyber Stalking Case) Pornography

Ex: Dr. L Prakash (1st case registered under IT Act)


Hacking Ex: State of Maharashtra v/s Anand Ashok Khare Phishing Ex: Umashankar Vs ICICI Bank Software Piracy
3

Types of Cyber Crimes contd.


Property Frauds/Monetory frauds
Internet time thefts Transmitting virus

Hacking organization system


Electronic Fund Transfer Online Gambling Digital Signature Certificate

Information Technology Act 2000


Defines 5 cyber crime: Tampering with Computer source documents Hacking/Data Alterations Publishing obscene information Breach of confidentiality Publishing false digital signature(controller of certificate authorities)
5

Why Cyber Crime?


Ease of Anonymity
Inadequate Legal Jurisdiction Old Crime, New Technology

Holding a Grudge(Tamil Nadu Vs Suhas Katti first

case convicted under sec 67 IT act) Thrill of the Game

Need for Cyber Laws


Integrity and Security of information.
Protecting people from cyber criminals. Methods to reduce Cyber Crime.

Privacy and Confidentiality of information.


Protecting Intellectual Property Rights.

Ways for security


Encryption
Secure passwords Use virtual keyboards for online transactions

Secure Wifi
Use antivirus Firewalls Backups Software updates and patches

Types of Hacking

ETHICAL

UNETHICAL

What is Ethical Hacking


It is a methodology to restrict hacking.
With the growth of the Internet, computer security has

become a major concern for businesses and Government. In their search for a way to approach the problem, organizations came to realize that one of the best ways to evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.

10

Competencies of Ethical Hackers


Trustworthy
Strong programming and computer

networking skills Adept at installing and maintaining systems Detailed knowledge of Hardware and software

11

Certified Ethical Hacker (C/EH) Training


InfoSec Academy

http://www.infosecacademy.com
It is a professional certification provided by the

International Council of E-Commerce Consultants (EC-Council)

12

How to report a Cyber Crime


Filing a complaint/ Writing an application letter.
What details will I be asked to include in my complaint?

Your name,

Your mailing address,


Your telephone number, Specific details on how the offence was committed, along with the

names and addresses of suspects and any other relevant information necessary.
What contents should be there in the application letter?

Contents vary with respect to the type of fraud or crime faced by you.

13

Implications
Offence Tampering with computer source documents Publishing any obscene material electronically Implication Upto 3 years and/or with a fine upto Rs. 2 Lakh 1st conviction upto 2 years + fine upto Rs. 5 Lakh 2nd conviction or subsequent upto 5 years + fine upto Rs. 10 Lakh 1st conviction upto 3 years + fine upto Rs. 10 Lakh 2nd conviction or subsequent conviction upto 7 years + fine upto Rs. 10 Lakh Upto 3 years + fine Upto 5 years + fine
14

Child pornography

Cheating using digital signature of other person Impersonation using communication network

Udayan Sikdar Vikas Batra Pratham Tiwari Prashasti Tandon

15

Вам также может понравиться