0% found this document useful (0 votes)
46 views14 pages

Cyber Crimes: Presented To: N. Padmanabha Swamy Presented By: Himanshu Chauhan and CH - Jayvardhan

Uploaded by

hc656098
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views14 pages

Cyber Crimes: Presented To: N. Padmanabha Swamy Presented By: Himanshu Chauhan and CH - Jayvardhan

Uploaded by

hc656098
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

CYBER CRIMES

Presented to:
N. Padmanabha Swamy

Presented by:
Himanshu chauhan
And
Ch.Jayvardhan
INTRODUCTION
 Activity in which computers or networks are
a tool, target, or a place of criminal activity.
 cyber crime is a subset of computer crime. In
a cyber crime, the computer network can be;
The tool of a crime
The target of a crime
Used for purpose incidental to a crime
DEFINITIONS

 Cyber crime is a term for any illegal activity that


uses a computer as its primary means of
communication. The U.S. department of Justice
expands the definition of cyber crime and
includes any illegal activity that uses a computer
for the storage of evidence.
 Cyber crime also stated as any use of a computer
as an instrument of further illegal ends, such as;
Committing fraud
Stealing identities
Violating privacy
HISTORY

 The first recorded cyber crime took place in


the year 1820, when , Joseph-Marie
Jacquard, a textile manufacturer in France,
produced the loom.
 The firm spam e-mail took place in 1978
when it was sent out over the Arpanet.
 The first Virus was installedon an Apple
computer in1982.
 A Sixteen years old student nicknamed “Data
Stream”, arrested by UK police (1994).
TARGETS OF CYBER CRIMES
 Against individual property
Transmitting virus
Un-authorized control/access over computer
Intellectual property crimes
Internet time thefts
 Against Organization
Possession of un-authorized information
Cyber terrorism against the government
organization
Distribution of pirated software,etc
SOME COMMON CYBER
CRIMES
 Computer Virus: A computer virus is a computer
program or attaches itself to application
programs or other executable system software
causing damage to the files.

Hacking: The act of penetrating or gaining


unauthorized access to or use of data
unavailable in a computer system or a computer
Offences that are committed against individuals
or group of individuals with a criminal motive to
intentionally harm the reputation of the victim or
cause physical or mental harm to the victim
directly or indirectly, using modern
telecommunication networks such a s internet.
 Cyber stalking: Cyber stalking refers to the
use of the internet, email or other electronic
communications device to stalk another
person. It is an electronic harassment that
involves harassing or threatening over a
period of time.
MOTIVES OF CYBER
CRIMINALS
 Desire for entertainment
 Profit
 Revenge
 Political agenda
 Sexual motivations
CYBER LAWS

Cyber law is a term used to describe the legal


issues related to use of communication
technology, particularly cyber space, i.e.
internet.
Cyber law is an attempt to apply laws
designed for the physical world to human
activities on internet.
Cyber laws in the world
Electronic Commerce Act (Ireland)
Electronic Transactions Act (UK, USA,
Australia, New Zealand, Singapore)
Electronic Transactions Ordinance (Hong
Kong)
Information Technology Act (India)
Information communication Technology Act
(Bangladesh)
Cyber laws in India
 India has enacted the first I.T. Act, 2000
based on the UNCIRAL model recommended
by the general assembly of the United
Nations.
 Offences under IT acts are:
Tampering with computer source document
Hacking with computer systems, data
alterations
Publishing obscene information
Un-authorized access to protected systems
Breach of confidentiality and privacy
Publishing false digital signature certificates.
PREVENTION
Use hard to guess passwords
Use anti-virus software and firewalls-keep
them up to date
Don’t open email or attachments from
unknown sources
Back up your computer on disk or CD often
CONCLUSION
It is not possible to eliminate cyber crime from
the cyber space in its entirety. However, it is
quite possible to check it. Any legislation in its
entirety might be less successful in totally
eliminating crime from the globe. The primary
step is to make people aware of their rights
and duties and further making the application
of the laws more stringent to check crime.
However, in any draft legislation it is important
that the provisions of the cyber law are not
made so stringent that it may retard the
growth of the industry and prove to be counter
-productive.
THANK YOU
ALL!

You might also like