cyber crime and issues

25
Cyber Crime Submitted To: Submitted By: Roshan Mastana Ish Khurana Assistant Professor M.A. Mass Com IMC & MT Final Kurukshetra University, Kurukshetra

Upload: roshan-mastana

Post on 21-Feb-2017

154 views

Category:

Social Media


0 download

TRANSCRIPT

Page 1: Cyber crime and issues

Cyber Crime

Submitted To: Submitted By:Roshan Mastana Ish KhuranaAssistant Professor M.A. Mass ComIMC & MT FinalKurukshetra University, Kurukshetra

Page 2: Cyber crime and issues

Cyber Crime• “Cyber crime” is a term used to broadly describe criminal

activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks.

• Cyber crime mainly consists of unauthorized access to computer systems data alteration, data destruction, theft of intellectual properly. Cyber crime in the context of national security may involve hacking, traditional espionage, or information warfare and related activities.

Page 3: Cyber crime and issues

Main Objectives

– To explore about cybercrime.– To create awareness about cyber crime to the mass.– To gain more knowledge about cyber crime.

Page 4: Cyber crime and issues

Cyber Crime In India• The majority of cyber crimes are centered on fraud and

phishing.• India is the 3rd most targeted country for phishing attacks

after the us and uk.• Social networks as well as ecommerce sites are major

targets.• India is the no. 1 country for generating spam.

Page 5: Cyber crime and issues

Why India?• A rapidly growing online user base• 121 million internet users.• 65 million active internet users• 50 million users shop online on economic and online

shopping sites• 46+ million social network users.• Huge population.

Page 6: Cyber crime and issues

India Crime Scene• The major cyber crimes reported in india, are denial of

services, spam computer virus, cyber stalking and phishing.• Nearly $120 million worth of mobiles are being lost or stolen

in the country every year.• The users have to protect information, contact details and

telephone numbers as these could be misused.• They should not keep any document related to their bank

reports

Page 7: Cyber crime and issues

Types Of Cyber Crime• Sale of illegal articles weapons, wildlife, narcotics.• Online gambling• Cyber stalking• Phishing• Vulnerability• Cyber terrorism• Intellectual property crimes• Cyber defamation

Page 8: Cyber crime and issues

Cyber Crime Variants

Hacking “ Hacking is a crime which includes cracking systems and gaining unauthorized access to the data stored in

them.

Cyber Squatting “ Cyber squatting is the act of registering a famous domain

name and then selling it in future. This is an issue that has not been tackled in IT Act 2000.

Page 9: Cyber crime and issues

Phishing• Phishing is the just one of the many frauds on the internet

trying to fool people into parting with their money.• Phishing refers to the receipt of unsolicited emails by

customer of financial institutions, requesting them to enter their username password or other personal information to access their account for some reason.

• The fraudster then has access to the customer’s online bank account and to the funds contained in that account.

Page 10: Cyber crime and issues

Cyber Stalking• Cyber Stalking is use of the internet or other electronic

means to stalk someone.• This term is used interchangeably with online harassment

and online abuse.• Stalking generally involves harassing or threatening

behaviour that an individual engages in repeatedly.• Such as following a person, appearing at person’s home or

place of business, making harassing phone calls, leaving written messages or objects.

Page 11: Cyber crime and issues

Vishing• Vishing is the criminal practise of using social engineering

and voice over IP to gain access to private personal and information from the public for the purpose of financial reward.

• The term is a combination of “voice and phishing”. vishing exploits the public’s trust in landline telephone services.

• Vishing is typically used to steal credit card numbers or other inforrmation used in identify theft schemes from individuals.

Page 12: Cyber crime and issues

• Trojan Horse: A Trojan as this program is called as an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing

• Internet time theft: This connotes the usage by unauthorized persons of the internet hours paid for by another person

• Web Jacking: This occurs when someone forcefully takes control of a website(By cracking the password).

Page 13: Cyber crime and issues

• Salami Attacks: are used for the commission of financial crimes. The key here to make the alteration so insignificant in a single case it would go completely unnoticed e.g a bank employee insert a program into bank’s servers that deducts a small amount from the account of every customer.

• Click Jacking: Click jacking is a form of cyber attack where the hacker uses an invisible layer over the embedded web content.

Page 14: Cyber crime and issues

Cyber laws in India• Under the information technology act, 2000• Whoever with the intent to cause or knowing that he is likely

to cause wrongful loss or damage to the public or any person.

• Destroys or deletes or alter any information residing in a computer resource or diminishes its value or affects it injuriously by any means commits hack.

• Whoever commits hacking shall be punished with imprisonment up to three years or with fine which may extent up to two lakh rupees, or with both.

Page 15: Cyber crime and issues

IT Amendment act 2008

• Section 66A: punishment for sending offensive message through communication service ,etc

• Section 66C: Punishment for identity theft.

• Section 66D: Punishment for cheating by personation by using computer resource

• Section 66E: Punishment for violation of privacy.

Page 16: Cyber crime and issues

Preventions of cybercrime

• Anti virus and Anti spyware software:• Anti virus software consists of computer programs that

attempt to identify and eliminate computer virus and other malware software. Anti spywares are used to restrict backdoor program.

• Firewalls: • A firewall protects a computer network from unauthorized

access. Network firewalls may be hardware devices, software programs or a combination of two.

Page 17: Cyber crime and issues

Future Of Cyber crime

• Continued websites hacks.• Data and information theft.• Increasing phishing attacks on financial websites.• Cybercriminals targeting social and professional networks.• Threats directed at the mobile platform.

Page 18: Cyber crime and issues

Computer Vulnerability• Computer stores huge amount of data in small spaces• Ease of access.• Complexity of technology.• Human error.• Need new laws and upgraded technology to combat cyber

crimes.

Page 19: Cyber crime and issues

Cyber Defamation• Cyber defamation occours when defamation takes place

with the help of computers and from the internet • Example- email containing defamation about that person by

making a false statement to another.

Page 20: Cyber crime and issues

Crime Under IPC

SENDING THREATENING MESSAGE BY EMAIL

SEC 503 IPC

SENDING DEFAMATORY MESSAGE BY EMAIL

SEC 499, 500 IPC

FORGERY OF ELECTRONIC RECORDS

SEC 463, 470, 471 IPC

CYBER FRAUDS SEC 420 IPC

Page 21: Cyber crime and issues

Power Of Police

• SECTION 156 CR.P.C : POWER TO INVESTIGATE COGNIZABLE OFFENCES.

• SECTION 155 CR.P.C : POWER TO INVESTIGATE NON COGNIZABLE OFFENCES.

• SECTION 91 CR.P.C : SUMMON TO PRODUCE DOCUMENTS

• SECTION 160 CR.P.C : SUMMON TO REQUIRE ATTENDENCE OF WITNESSES.

Page 22: Cyber crime and issues

Other Acts

• Stored communications Act: It is passed in 1986 is focused on protecting the confidentiality, integrity and availability of electronic communications that are currently in form of electronic storage.

• Digital millennium Copyright Act: It is passed in 1998 is a united states copyright law that criminalizes the production and dissemination of technology, devices.

Page 23: Cyber crime and issues

Better Initiatives• Suggested amendments to the IT act 2000-new provisions

for child pornography etc.• More public awareness campaigns• Training of police officers to effectively combat cyber crime.• More cyber crime cells set up across the country.• Websites aid in creating awareness and encouraging

reporting of cyber crime cases• Active coordination between police and other law

enforcement agencies and authorities is required.

Page 24: Cyber crime and issues

Conclusion• Indian laws are well drafted and capable of handling all kind

of challenges as posed by cyber criminal, however the enforcement agencies are required to be well reversed with the changing technologies and laws”

• As internet technology advances so does the threat of cyber crime. In times likes these we must protect ourselves from cyber crime. Antivirus software, firewalls and security patches are just the beginning. Never open suspicious emails and only navigate to trusted sites.

Page 25: Cyber crime and issues

A Final Word

Treat your password like you treat your tooth brush. Never give to anyone else to use, and change it every few months.