2
Most read
4
Most read
7
Most read
Prepared by
Mehta Ishani
2nd M.E.(C.S.E)
130040701003
Cyber Crime and Cyber Laws
Introduction
Internet
two sides of a coin
Computer vulnerabilities
Cyber crime refers to all the activities done with criminal intent
in cyberspace or using the medium of Internet.
Types of Cyber crimes
Credit card frauds
Sale of illegal articles-narcotics,
weapons, wildlife
Online gambling
Intellectual Property crimes-
software piracy, copyright infringement,
trademarks violations,
theft of computer source code
Email spoofing
Forgery
Phishing
Cyber terrorism
TYPES OF CYBER ATTACK BY
PERCENTAGE
• Financial fraud: 11%
• Sabotage of data/networks: 17%
• Theft of proprietary information: 20%
• System penetration from the outside: 25%
• Denial of service: 27%
• Unauthorized access by insiders: 71%
• Employee abuse of internet privileges 79%
• Viruses 85%
INFORMATION TECHNOLOGY
ACT, 2000 & CYBERCRIME
Various cyber offences defined
Cyber offences to be investigated only by a Police
Officer not below the rank of the Deputy
Superintendent of Police who have been duly
authorized and who have also been given the
power of entry, search and arrest without warrant
in public places..
CYBER OFFENCES UNDER THE IT
ACT
Tampering with computer source documents –
Section 65
Hacking - Section 66
Publishing of information which is obscene in
electronic form - Section 67
SECTION 65
Tampering with computer source documents
Knowingly or intentionally concealing, destroying
or altering or intentionally or knowingly causing
another to conceal, destroy or alter any computer
source code used for computer, computer
programme, computer system or computer
network, when the computer source code is
required to be kept or maintained by law for the
time being in force
PUNISHMENT FOR TAMPERING
COMPUTER SOURCE
DOCUMENTS
Imprisonment up to three years, or with fine which
may extend up to two lakh rupees, or with both.
SECTION 66
Hacking with computer system
Occurs when there is intent to cause or
knowledge that one is likely to cause wrongful
loss or damage to the public or any person by
destroying or deleting or altering any information
residing in a computer resource or diminishing its
value or utility or affecting it injuriously by any
means
PUNISHMENT FOR HACKING
Imprisonment up to three years, or with fine which
may extend upto two lakh rupees, or with both.
SECTION 67
Publishing of information which is obscene in
electronic form
Publishing or transmitting or causing to be
published in the electronic form, any material
which is lascivious or appeals to the prurient
interest or if its effect is such as to tend to
deprave and corrupt persons who are likely,
having regard to all relevant circumstances, to
read, see or hear the matter contained or
embodied in it
PUNISHMENT FOR PUBLISHING
OBSCENE INFORMATION IN
ELECTRONIC FORM
On first conviction - imprisonment of either
description for a term which may extend to five
years and with fine which may extend to one lakh
rupees
Second or subsequent conviction - imprisonment
of either description for a term which may extend
to ten years and also with fine which may extend
to two lakh rupees.
Challenges faced by Law
Enforcement
Awareness:
Technical Issues:
Software and Hardware Issues:
Information sharing:
Inadequate Training and Funds:
Global Issues:
Wireless or Wi-Fi, Bluetooth, Infrared Issues:
PREVENTION
Disable and log off a specific user account to
prevent access.
Disable and log off a group of user accounts
which access a particular service that is being
attacked.
Disable and dismount specific (network)
devices, for instance disk devices that are
being swamped.
Disable specific applications, for example, an
e-mail system subjected to a SPAM attack.
Close down an entire system, and divert
processing to an alternative or backup service
on a secondary network.
SAFETY TIPS FOR CYBER
CRIME
Use antivirus software’s.
Insert firewalls.
Uninstall unnecessary software
Maintain backup.
Check security settings.
Stay anonymous - choose a genderless screen
name.
Never give your full name or address to
strangers.
Learn more about Internet privacy.
CONCLUSION
Obviously computer crime is on the rise, but so is
the awareness and ability to fight it. Law
enforcement realizes that it is happening more
often than it is reported and are doing there best
to improve existing laws and create new laws as
appropriate. The problem is not with the
awareness or the laws, but with actually reporting
that a crime has occurred. Hopefully people will
begin to realize that unless they report these
crimes and get convictions, those committing
computer crimes will continue to do so.
Cyber crime and cyber laws

More Related Content

PPTX
Cyber crime ✔
PDF
Social engineering attacks
PPTX
Cybercrime & Security
PPTX
PPTX
Cyber security
PPTX
PPTX
What is Cybercrime and How to Prevent Cybercrime?
PPTX
Cyber Crime and Security
Cyber crime ✔
Social engineering attacks
Cybercrime & Security
Cyber security
What is Cybercrime and How to Prevent Cybercrime?
Cyber Crime and Security

What's hot (20)

DOC
Report of cyber crime
PPTX
Cyber Crime
DOCX
Research paper on cyber security.
PPTX
Cyber crime ppt
PPTX
Cyber crime ppt
PPTX
Cyber crime
PPT
Cyber Crime and Security
PPTX
Cyber Crime And Security
PPTX
cyber crime
PPTX
Cyber Security Presentation
PPTX
Cyber security ppt
PPT
presentation on cyber crime and security
PPSX
Cyber crime
PPTX
Cybercrime and security
PPTX
Introduction to Cyber Crime
PPTX
Cyber crime-140128140443-phpapp02 (1)
PPTX
Cyber crime and Security
PPTX
Cyber crime and issues
PPTX
Cyber-crime PPT
PPTX
Cyber security
Report of cyber crime
Cyber Crime
Research paper on cyber security.
Cyber crime ppt
Cyber crime ppt
Cyber crime
Cyber Crime and Security
Cyber Crime And Security
cyber crime
Cyber Security Presentation
Cyber security ppt
presentation on cyber crime and security
Cyber crime
Cybercrime and security
Introduction to Cyber Crime
Cyber crime-140128140443-phpapp02 (1)
Cyber crime and Security
Cyber crime and issues
Cyber-crime PPT
Cyber security
Ad

Viewers also liked (20)

PPTX
Cyber Crime
PPTX
Asis Verma cyber crime ppt
PPT
Cyber Warrant & Engineer Slides
PPT
Email crimes and Cyber Law-Nasscom Cyber safe 2010
PPTX
Cybercrime kunal gupta
PDF
Km Introduction PowerPoint
PPT
Introduction to knowledge management
PPTX
Knowledge Management system in current scenario.
PPTX
Knowledge management at infosys
PPTX
Privacy and Security Issues in E-Commerce
PDF
e commerce security and fraud protection
PPTX
Computer Crimes
PPTX
Knowledge management system priyank
PPTX
Security Threats to Electronic Commerce
PPT
Knowledge Management Tools & Techniques
PPTX
E cash payment system
PPT
E payment
PPT
Technology management
PPTX
cyber crime & cyber law
PPT
Knowledge Management System & Technology
Cyber Crime
Asis Verma cyber crime ppt
Cyber Warrant & Engineer Slides
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Cybercrime kunal gupta
Km Introduction PowerPoint
Introduction to knowledge management
Knowledge Management system in current scenario.
Knowledge management at infosys
Privacy and Security Issues in E-Commerce
e commerce security and fraud protection
Computer Crimes
Knowledge management system priyank
Security Threats to Electronic Commerce
Knowledge Management Tools & Techniques
E cash payment system
E payment
Technology management
cyber crime & cyber law
Knowledge Management System & Technology
Ad

Similar to Cyber crime and cyber laws (20)

PDF
Cyber Laws
PPTX
Cyber crime ppt
PDF
Cybercrimeppt 160421074211
PPTX
Cyber crime
PPTX
Cyber crime
PPTX
cyber crime in india and law related to cyber crime
PPT
CYBERCRIMES AND DUE DILIGENCE
PPT
Cyber Crime & Security
PPT
IT Act 2000
PPTX
Cyber Law in India.pptx
PPTX
Cyber crime
PPTX
Cyber_security_EI _48,49,50.pptx
PDF
cybersecurityawareness-presentation-170627121043.pdf
PPSX
Cyber security awareness presentation
PPTX
Cybercrimeppt
PPTX
Cyber Crime
PPTX
Module 3- Information Tech. Act 2000.ppt
PPT
Cyber crime and forensic
PPTX
CYBER CRIME - A Threat To Internet Users
PPTX
Cyber crime
Cyber Laws
Cyber crime ppt
Cybercrimeppt 160421074211
Cyber crime
Cyber crime
cyber crime in india and law related to cyber crime
CYBERCRIMES AND DUE DILIGENCE
Cyber Crime & Security
IT Act 2000
Cyber Law in India.pptx
Cyber crime
Cyber_security_EI _48,49,50.pptx
cybersecurityawareness-presentation-170627121043.pdf
Cyber security awareness presentation
Cybercrimeppt
Cyber Crime
Module 3- Information Tech. Act 2000.ppt
Cyber crime and forensic
CYBER CRIME - A Threat To Internet Users
Cyber crime

More from ishmecse13 (14)

PDF
Search engine and web crawler
PPTX
Web services concepts, protocols and development
PDF
Web services concepts, protocols and development
PPTX
Web services
PPTX
Wap wml
PDF
Wap architecture and wml script
PPT
Solving travelling salesman problem using firefly algorithm
PPTX
Object oriented concepts with java
PPTX
Kerberos using public key cryptography
PPTX
Hierarchical clustering
PPT
File models and file accessing models
PDF
Case study on cyber crime
PPTX
Branch and bound technique
PDF
Branch and bound technique
Search engine and web crawler
Web services concepts, protocols and development
Web services concepts, protocols and development
Web services
Wap wml
Wap architecture and wml script
Solving travelling salesman problem using firefly algorithm
Object oriented concepts with java
Kerberos using public key cryptography
Hierarchical clustering
File models and file accessing models
Case study on cyber crime
Branch and bound technique
Branch and bound technique

Recently uploaded (20)

PDF
LS-6-Digital-Literacy (1) K12 CURRICULUM .pdf
PDF
Artificial Intelligence_ Basics .Artificial Intelligence_ Basics .
PPTX
Unit IImachinemachinetoolopeartions.pptx
PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
PDF
Beginners-Guide-to-Artificial-Intelligence.pdf
PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
PPTX
Real Estate Management PART 1.pptxFFFFFFFFFFFFF
PPTX
Quality engineering part 1 for engineering undergraduates
PDF
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
PPTX
Solar energy pdf of gitam songa hemant k
PDF
Cryptography and Network Security-Module-I.pdf
PDF
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
PDF
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
PDF
electrical machines course file-anna university
DOCX
ENVIRONMENTAL PROTECTION AND MANAGEMENT (18CVL756)
PPT
UNIT-I Machine Learning Essentials for 2nd years
PPTX
SE unit 1.pptx aaahshdhajdviwhsiehebeiwheiebeiev
PDF
Engineering Solutions for Ethical Dilemmas in Healthcare (www.kiu.ac.ug)
PPTX
chapter 1.pptx dotnet technology introduction
PPTX
CNS - Unit 1 (Introduction To Computer Networks) - PPT (2).pptx
LS-6-Digital-Literacy (1) K12 CURRICULUM .pdf
Artificial Intelligence_ Basics .Artificial Intelligence_ Basics .
Unit IImachinemachinetoolopeartions.pptx
Environmental studies, Moudle 3-Environmental Pollution.pptx
Beginners-Guide-to-Artificial-Intelligence.pdf
Environmental studies, Moudle 3-Environmental Pollution.pptx
Real Estate Management PART 1.pptxFFFFFFFFFFFFF
Quality engineering part 1 for engineering undergraduates
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
Solar energy pdf of gitam songa hemant k
Cryptography and Network Security-Module-I.pdf
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
electrical machines course file-anna university
ENVIRONMENTAL PROTECTION AND MANAGEMENT (18CVL756)
UNIT-I Machine Learning Essentials for 2nd years
SE unit 1.pptx aaahshdhajdviwhsiehebeiwheiebeiev
Engineering Solutions for Ethical Dilemmas in Healthcare (www.kiu.ac.ug)
chapter 1.pptx dotnet technology introduction
CNS - Unit 1 (Introduction To Computer Networks) - PPT (2).pptx

Cyber crime and cyber laws

  • 1. Prepared by Mehta Ishani 2nd M.E.(C.S.E) 130040701003 Cyber Crime and Cyber Laws
  • 2. Introduction Internet two sides of a coin Computer vulnerabilities
  • 3. Cyber crime refers to all the activities done with criminal intent in cyberspace or using the medium of Internet.
  • 4. Types of Cyber crimes Credit card frauds Sale of illegal articles-narcotics, weapons, wildlife Online gambling Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code Email spoofing Forgery Phishing Cyber terrorism
  • 5. TYPES OF CYBER ATTACK BY PERCENTAGE • Financial fraud: 11% • Sabotage of data/networks: 17% • Theft of proprietary information: 20% • System penetration from the outside: 25% • Denial of service: 27% • Unauthorized access by insiders: 71% • Employee abuse of internet privileges 79% • Viruses 85%
  • 6. INFORMATION TECHNOLOGY ACT, 2000 & CYBERCRIME Various cyber offences defined Cyber offences to be investigated only by a Police Officer not below the rank of the Deputy Superintendent of Police who have been duly authorized and who have also been given the power of entry, search and arrest without warrant in public places..
  • 7. CYBER OFFENCES UNDER THE IT ACT Tampering with computer source documents – Section 65 Hacking - Section 66 Publishing of information which is obscene in electronic form - Section 67
  • 8. SECTION 65 Tampering with computer source documents Knowingly or intentionally concealing, destroying or altering or intentionally or knowingly causing another to conceal, destroy or alter any computer source code used for computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force
  • 9. PUNISHMENT FOR TAMPERING COMPUTER SOURCE DOCUMENTS Imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.
  • 10. SECTION 66 Hacking with computer system Occurs when there is intent to cause or knowledge that one is likely to cause wrongful loss or damage to the public or any person by destroying or deleting or altering any information residing in a computer resource or diminishing its value or utility or affecting it injuriously by any means
  • 11. PUNISHMENT FOR HACKING Imprisonment up to three years, or with fine which may extend upto two lakh rupees, or with both.
  • 12. SECTION 67 Publishing of information which is obscene in electronic form Publishing or transmitting or causing to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it
  • 13. PUNISHMENT FOR PUBLISHING OBSCENE INFORMATION IN ELECTRONIC FORM On first conviction - imprisonment of either description for a term which may extend to five years and with fine which may extend to one lakh rupees Second or subsequent conviction - imprisonment of either description for a term which may extend to ten years and also with fine which may extend to two lakh rupees.
  • 14. Challenges faced by Law Enforcement Awareness: Technical Issues: Software and Hardware Issues: Information sharing: Inadequate Training and Funds: Global Issues: Wireless or Wi-Fi, Bluetooth, Infrared Issues:
  • 15. PREVENTION Disable and log off a specific user account to prevent access. Disable and log off a group of user accounts which access a particular service that is being attacked. Disable and dismount specific (network) devices, for instance disk devices that are being swamped. Disable specific applications, for example, an e-mail system subjected to a SPAM attack. Close down an entire system, and divert processing to an alternative or backup service on a secondary network.
  • 16. SAFETY TIPS FOR CYBER CRIME Use antivirus software’s. Insert firewalls. Uninstall unnecessary software Maintain backup. Check security settings. Stay anonymous - choose a genderless screen name. Never give your full name or address to strangers. Learn more about Internet privacy.
  • 17. CONCLUSION Obviously computer crime is on the rise, but so is the awareness and ability to fight it. Law enforcement realizes that it is happening more often than it is reported and are doing there best to improve existing laws and create new laws as appropriate. The problem is not with the awareness or the laws, but with actually reporting that a crime has occurred. Hopefully people will begin to realize that unless they report these crimes and get convictions, those committing computer crimes will continue to do so.