cybercrime kunal gupta

16

Upload: kg19

Post on 07-Aug-2015

49 views

Category:

Internet


1 download

TRANSCRIPT

What Is Cyber Crime?

History

Classification Of Cyber Crime

Cyber Laws In India

Case Study

Safety Tips To Cyber Crime

Conclusion

What is cyber crime?Cyber Crime or Computer

Crime refers to any crime that involves a computer and a network .The computer may have been used in the commission of crime, or it may be the target.

History• The first recorded cyber crime took

place in the year 1820.• The firm spam e-mail took place in 1978

when it was sent out over the Arpanet.• The first Virus was installed on an Apple

computer in1982.• Denial of Service (DoS) attacks by

‘Mafia Boy’ on eBay, Yahoo!, Amazon And other popular sites (2000).

Classification of cyber crime

Against Individual

Against Property

Against Organisation

(i) Email spoofing (ii) Spamming (iii) Cyber Defamation (iv) Harassment & Cyber stalking

Against Individual

Against property

(i) Credit Card Fraud (ii) Intellectual Property crimes:

Software piracy Copyright infringement Trademarks violations Theft of computer source code

(iii) Internet time theft

Against organisation

(i) Unauthorized Accessing of Computer(ii) Denial Of Service (iii) Virus attack  (iv) Email Bombing

Cyber laws in India

IT Act 2000

IT Amendment bill 2006

• Aims to provide the legal infrastructure for e-commerce in India.

• A major impact for e-businesses and the new economy in India.

IT Amendment Bill 2008

Case Study

Cyber Crime activities rare in north eastern states . Only one case each in Nagaland and Mizoram.

Most dramatic increase in cases in Uttarakhand at 475% (from 4 cases to 23)

The highest incidents of cyber crime in Maharashtra (907) followed by Uttar Pradesh (682) and Andhra Pradesh (651)

Rapid increase in cyber crime by 50% from 2012 to 2013.Maximum offenders from the 18-30 age group

Cyber Crime Statistics for the 2013 year.

The Nation Crime Records Bureau (NCRB), Ministry of Home Affairs

Safety tips to Cyber Crime

• Use hard to guess passwords• Use anti-virus software and firewalls-keep them

up to date• Don’t open email or attachments from unknown

sources. • Uninstall unnecessary software • Maintain backup.• Do not reveal personal information to an

unknown source.• Learn more about Internet privacy.

Conclusion...“Bytes are replacing bullets

in the modern world”