Smarttrafficlightcontroller 13337105649115 Phpapp01 120406061310 Phpapp01
1205106025-140713085706-phpapp01
Transcript of 1205106025-140713085706-phpapp01
-
8/10/2019 1205106025-140713085706-phpapp01
1/23
Presented by:Jayashree Dora
Regd. No:12051060254thSem, MCA
Guided by:Mr. Manjit Ku. NayakDept. of CSA
-
8/10/2019 1205106025-140713085706-phpapp01
2/23
History of Cyber Crime
Introduction to Cyber Crime
Classification of Cyber Crime
Categories of Cyber CrimeTypes of Cyber Crime
Who are Cyber Criminals?
Cyber Crime in India
Need of Cyber LawsCyber Laws in India
Cyber Laws Amendment
Penalty Under IT Act
Conclusion
-
8/10/2019 1205106025-140713085706-phpapp01
3/23
The first recorded cyber crime took place in the year 1820! In1981 Ian Murphy, becomes first felon convicted of a
computer crime.
In 1982 Elk Cloner, an Apple II boot virus, is written.
In 1985 Online hacking magazine Phrack established.
In 1986 Pakistani Brain, the oldest virus created underunauthorized circumstances, infects IBM computers.
In 1987 Computer Emergency Response Team (CERT)
created.
In 1988 Kevin Mitnick secretly monitors the e-mail of MCIand Digital Equipment corporation (DEC) security officials.He is convicted and sentenced to a year in jail.
-
8/10/2019 1205106025-140713085706-phpapp01
4/23
In 1989 Hackers in West Germany are arrested forbreaking into US government and corporatecomputers and selling operating-system sourcecode to the KGB.
In 1990 The Electronic Frontier Foundation (EFF)is formed.
Legion of Doom and Masters of Deception
engaged in online warfare - jamming phone lines,monitoring calls, trespassing in each other'sprivate computers.
-
8/10/2019 1205106025-140713085706-phpapp01
5/23
Cyber Crime is a term used to broadly describe criminal activity inwhich computers or computer networks are a tool, a target, or aplace of criminal activity and include everything from electroniccracking to denial of service attacks.
Itsan unlawful act where in the computer is either a tool or a targetor both.
Computer crime mainly consists of unauthorized access to
computer systems data alteration, data destruction, theft ofintellectual property. Cyber crime in the context of nationalsecurity may involve hacking, traditional espionage,.
-
8/10/2019 1205106025-140713085706-phpapp01
6/23
Cybercrime includes a wide variety of crime
Offences under cyber crime:
oOffences against the confidentiality, integrity and
availability of computer data and systems
o Copyright-related offences
-
8/10/2019 1205106025-140713085706-phpapp01
7/23
-
8/10/2019 1205106025-140713085706-phpapp01
8/23
-
8/10/2019 1205106025-140713085706-phpapp01
9/23
Kids (age group 9-16 etc.)
Organized hack activists
Disgruntled employees
Professional hackers (corporate espionage)
-
8/10/2019 1205106025-140713085706-phpapp01
10/23
Ind ia stand s 11th in th e rankin g fo r Cyber Crime in the World,
con st i tut in g 3% of the Global Cyber Crime.
-
8/10/2019 1205106025-140713085706-phpapp01
11/23
121 Million Internet Users
65 Million Active Internet Users, up by 28%
from 51 million in 201050 Million users shop online on Ecommerce
and Online Shopping Sites
46+ Million Social Network Users
346 million mobile users had subscribed to
Data Packages.
-
8/10/2019 1205106025-140713085706-phpapp01
12/23
The major i ty of c ybercr im es are centered on fo rgery, fraud andPhishing,
Ind ia is the third-mos t targeted cou ntry fo r Phishing attacks
after the US and the UK ,
Social networks as wel l as ecommerce sites are major targets,
6.9 mil l ion bo t- infected sys tems in 2010,14,348 webs ite defacements in 2010,
6,850 .in and 4,150 .com domains were defaced durin g 2011,
15,000 sites hacked in 2011,
Ind ia is the number 1 cou ntry in th e world for generat ing spam .
-
8/10/2019 1205106025-140713085706-phpapp01
13/23
29.9 million people fell victim to cybercrime,
$4 billion in direct financial losses,
$3.6 billion in time spent resolving the crime,
4 in 5 online adults (80%) have been a victim ofCybercrime,
17% of adults online have experienced cyber
crime on their mobiles.
-
8/10/2019 1205106025-140713085706-phpapp01
14/23
Cyber Law is the law governing cyber space. Cyberspace is a very wide term and includes computers,networks, software, data storage devices (such as
hard disks, USB disks etc), the Internet, websites,emails and even electronic devices such as cellphones, ATM machines etc.
-
8/10/2019 1205106025-140713085706-phpapp01
15/23
TACKLING CYBER CRIMES
Laws are necessary in all segments of
society, and e-commerce.
All Internet users, including minors, need to be assured of theirprivacy and the safety of their personal information online.
http://images.google.co.in/imgres?imgurl=http://www1.istockphoto.com/file_thumbview_approve/1806794/2/istockphoto_1806794_cyber_theft.jpg&imgrefurl=http://www.istockphoto.com/file_closeup/?id=1806794&refnum=566747&h=380&w=380&sz=41&hl=en&start=48&um=1&tbnid=b8kuTOkGQfXoZM:&tbnh=123&tbnw=123&prev=/images?q=cyber+laws&start=40&ndsp=20&svnum=10&um=1&hl=en&sa=N -
8/10/2019 1205106025-140713085706-phpapp01
16/23
The primary source of cyber law in India is the InformationTechnology Act, 2000 (IT Act) which came into force on 17 October2000.
The primary purpose of the Act is to provide legal recognition toelectronic commerce and to facilitate filing of electronic records withthe Government.
The IT Act also penalizes various cyber crimes and provides strict
punishments (imprisonment terms up to 10 years and compensationup to Rs 1(crore)
http://images.google.co.in/imgres?imgurl=http://cyberlaws.net/cyberindia/indiaindex1_files/logo.jpg&imgrefurl=http://cyberlaws.net/cyberindia/column.htm&h=72&w=420&sz=19&hl=en&start=11&um=1&tbnid=mOR67jQ9Yqi3nM:&tbnh=21&tbnw=125&prev=/images?q=google+images+on+cyber+laws&svnum=10&um=1&hl=en&cr=countryIN&sa=N -
8/10/2019 1205106025-140713085706-phpapp01
17/23
email would now be a valid and legal form ofcommunication in our country that can be duly producedand approved in a court of law.
Companies shall now be able to carry out electronic
commerce using the legal infrastructure provided by theAct.
Digital signatures have been given legal validity andsanction in the Act.
-
8/10/2019 1205106025-140713085706-phpapp01
18/23
HACKING WITH
COMPUTER SYSTEM
PUBLISHING OBSCENE
MATERIAL ON INTERNET
BREACHING OF CONFIDENTIALITY
AND PRIVACY
http://images.google.co.in/imgres?imgurl=http://www.missingpersons.gov.au/__data/assets/image/5881/hack.jpg&imgrefurl=http://www.missingpersons.gov.au/media/publications/platypus_magazine/march_2000/intfrd.html&h=424&w=567&sz=76&hl=en&start=22&um=1&tbnid=6kLYQiHLmC2K5M:&tbnh=100&tbnw=134&prev=/images?q=CYBER+CRIMES+GRAPHS&start=20&ndsp=20&svnum=10&um=1&hl=en&sa=N -
8/10/2019 1205106025-140713085706-phpapp01
19/23
INDIAN PENAL CODE,1860
INDIAN EVIDENCE ACT,1872
-
8/10/2019 1205106025-140713085706-phpapp01
20/23
Under the IT Act, 966 cybercrime cases werefiled in 2010 420 in 2009)
233 persons were arrested in 2010
33% of the cases registered were related tohacking
Under the IPC, 356 cybercrime cases wereregistered in 2010
The majority of these crimes were eitherforgery or fraud cases
-
8/10/2019 1205106025-140713085706-phpapp01
21/23
As internet technology advances so does the threat ofcyber crime. In times like these we must protectourselves from cyber crime. Anti-virus software, firewallsand security patches are just the beginning. Never opensuspicious e-mails and only navigate to trusted sites
CYBER LAWS_ ESSENTIAL FEATURE IN TODAYSWORLD OF INTERNET
ACHIEVING GLOBAL PEACE AND HARMONY
-
8/10/2019 1205106025-140713085706-phpapp01
22/23
www.slideshares.net
en.wikipedia.org
please.hackmii.com
http://www.slideshares.net/http://www.slideshares.net/ -
8/10/2019 1205106025-140713085706-phpapp01
23/23