cyber crime soft copy

Upload: calijeffreena

Post on 29-May-2018

239 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 Cyber Crime Soft Copy

    1/19

    PRESENTED BY

    Cali Jeffreena and Swetha

    II BSc.ComputerTechnology

    Sri Krishna Arts and

    Science College

  • 8/8/2019 Cyber Crime Soft Copy

    2/19

    www.company.com

    Criminal activity involving

    Information technology infrastructure

    Illegal access

    Data interference

    Misuse of devices

    Forgery and

    Electronic fraud.

  • 8/8/2019 Cyber Crime Soft Copy

    3/19

  • 8/8/2019 Cyber Crime Soft Copy

    4/19

    Children and adolescents between the

    age group of 6 18 years

    Organised hackers Professional hackers / crackers

    Discontented employees

  • 8/8/2019 Cyber Crime Soft Copy

    5/19

    Unauthorized access to computer systems ornetworks / Hacking

    Theft of information contained in electronic form Email bombing Data diddling Salami attacks Denial of Service attack

    Virus / worm attacks Logic bombs Trojan attacks Internet time thefts Web jacking

  • 8/8/2019 Cyber Crime Soft Copy

    6/19

    CLASSIFICATION

    Against Individuals

    Against Individual Property

    Against OrganizationAgainst Society at large

  • 8/8/2019 Cyber Crime Soft Copy

    7/19

    www.company.com

    Harassment via e-mails.

    Cyber-stalking.

    Dissemination of obscene material.

    Defamation. Unauthorized control/access overcomputer system.

    Indecent exposure

    Email spoofing

    Cheating & Fraud

  • 8/8/2019 Cyber Crime Soft Copy

    8/19

    Computer vandalism.

    Transmitting virus.

    Unauthorized control/access over computer system.

    Intellectual Property crimes Internet time thefts

  • 8/8/2019 Cyber Crime Soft Copy

    9/19

  • 8/8/2019 Cyber Crime Soft Copy

    10/19

    Unauthorized control/accessover computer

    system

    Possessionofunauthorizedinformation.

    Cyberterrorismagainstthegovernment

    organization.

    Distributionofpiratedsoftwareetc.

  • 8/8/2019 Cyber Crime Soft Copy

    11/19

    Pornography (basically child pornography).

    Polluting the youth through indecent

    exposure.

    Trafficking

    Financial crimes

    Sale of illegal articles

    Online gambling

    Forgery

  • 8/8/2019 Cyber Crime Soft Copy

    12/19

  • 8/8/2019 Cyber Crime Soft Copy

    13/19

  • 8/8/2019 Cyber Crime Soft Copy

    14/19

  • 8/8/2019 Cyber Crime Soft Copy

    15/19

    The hurry in which the legislation was passed, withoutsufficient public debate, did not really serve the desiredpurpose

    Cyber laws, in their very preamble and aim, state that they aretargeted at aiding e-commerce, and are not meant to regulatecybercrime

    Cyber torts

    Cyber crime in the Act is neither comprehensive nor exhaustive

    Ambiguity in the definitions

    Uniform law Lack of awareness

    Jurisdiction issues

    Extra territorial application

    Raising a cyber army

    Hesitation to report offences

  • 8/8/2019 Cyber Crime Soft Copy

    16/19

    HOW TO DEAL WITH THIS PROBLEM

    y International Agreements and Cooperation Essential due to

    the Worldwide Nature of the Internet

    y Software and Hardware defenses

    (e.g., antispam, antivirus software, firewalls)y Other practical steps.

  • 8/8/2019 Cyber Crime Soft Copy

    17/19

    Avoiddisclosinganyinformationpertainingtooneself.

    Avoidsendinganyphotographonlineparticularly

    tostrangers.Uselatestandupdateantivirussoftware.

    Keepback upvolumes.

    Never

    send

    your

    credit

    card

    number

    to

    any

    site

    thatisnotsecured.

    Useoffirewallsmaybebeneficial.

  • 8/8/2019 Cyber Crime Soft Copy

    18/19

    CONCLUSION

    The only possible step is to make people aware

    of their rights and duties (to report crime as a

    collective duty towards the society) and further

    making the application of the laws morestringent to check crime.

  • 8/8/2019 Cyber Crime Soft Copy

    19/19