Cyber Space
Cyber space includes computers, networks,
softwares, data storage devices(such as hard
disks, USB disks etc), the internet, websites,
emails and even electronic devices such as cell
phones, ATM machines etc.
Cyber crime
 Any offence or crime in which a computer is used
is a cyber crime.
Cyber law
 Cyber law is described as that branch of law
that deals with legal issues related to
computers and the internet
Cyber law
Cyber law encompasses
 Cyber crimes
 Electronic and digital signatures
 Intellectual property
 Data protection and
 Privacy
Computer as a Target
 Attacking other computers.
 e.g. Hacking, Virus/Worm attacks, DOS attack
etc.
Computer as a weapon
 Using a computer to commit real world crimes.
 e.g. Cyber Terrorism, IPR violations, Credit card
frauds, EFT frauds, Pornography etc.
Need for Regulation
 Mid 90’s saw an impetus in globalization and
computerisation,with more and more nations
computerizing their governance, and e-commerce
seeing an enormous growth.
 The growth of Electronic Commerce has propelled
the need for vibrant and effective regulatory
mechanisms which would further strengthen the
legal infrastructure
Urgent Need
 With much of international trade being done
through electronic communication and with email
gaining momentum, an urgent and imminent need
was felt for recognizing electronic records
Global Initiative
 The United Nations Commission on International
Trade Law (UNCITRAL) adopted the Model Law
on e-commerce in 1996. The General Assembly of
United Nations passed a resolution in January
1997
Indian Act
 India enacted Information Technology Act 2000
and I.T. Amendment Act 2008.
 The Information Technology Act defines a
computer, computer network, data, information
and all other necessary ingredients that form part
of a cybercrime.
Scope of the Act
 Cyber law in India is a combination of Contract,
Intellectual property, Data protection, and privacy
laws.
 It covers the digital circulation of information,
software, information security, e-commerce, and
monetary transactions.
Preface to the IT Act, 2000
 To provide legal recognition for transactions
carried out by means of electronic data
interchange and storage of information and
 To facilitate electronic filing of documents with
the Government agencies
Acts Ammended
 Indian Penal Code
 Indian Evidence Act, 1872
 Bankers' Books Evidence Act, 1891 and
 Reserve Bank of India Act, 1934
Scope of the Act
 The Act essentially deals with the following issues:
 Legal Recognition of Electronic Documents
 Legal Recognition of Digital Signatures, offenses
and contraventionsJustice Dispensation Systems for
cyber crimes.
Specific Domains
 Cyber Crimes
 Electronic and Digital Signatures
 Intellectual Property
 Data Protection and Privacy
Types of Cyber Crimes
 Identity theft - When personal information of a
person is stolen with the purpose of using their
financial resources or to take a loan orcredit card
in their name then such a crime is known as
Identity theft.
Types of Cyber Crimes
 Cyberterrorism - When a threat of extortion or
any kind of harm is being subjected towards a
person, organization, group or state, it is known as
the crime of Cyber Terrorism. Generally, it
includes the well-planned attack strategies on the
Government and corporate computer system.
Types of Cyber Crimes
 Cyberbullying - When a teenager or adolescent
harasses,defames, or intimidates someone with the
use of the internet, phone, chat rooms, instant
messaging or any other social network then the
person is said to be committing the crime
ofCyberbullying. When the same crime is done by
adults it is known as Cyberstalking.
Types of Cyber Crimes
 Hacking - The most common cybercrime is
Hacking. In this crime, the person gets access to
other people's computers and passwords to use it
for their own wrongful gain.
Types of Cyber Crimes
 Defamation - While every individual has his or
her right to speech on internet platforms as
well, but if their statements cross a line and
harm the reputation of any individual or
organization, then they can be charged with the
Defamation Law.
Types of Cyber Crimes
 Copyright - With the massive surge in internet
users, when the data/ information is distributed on
all platforms, copyrighting your work aids you to
restrict the use of your work. Any use of your
copyrighted without your permission is a
punishable offence.
Types of Cyber Crimes
 Trade Secrets - Internet organization spends a lot
of their time and money in developing softwares,
applications, and tools and rely on Cyber Laws to
protect their data and trade secrets against theft;
doing which is a punishable offence.
Types of Cyber Crimes
 Freedom of Speech - When it comes to the
internet, there is a very thin line between freedom
of speech and being a cyber-offender. As freedom
of speech enables individuals to speak their mind,
cyber law refrains obscenity and crassness over
the web.
Types of Cyber Crimes
 Harassment and Stalking - Harassment and
stalking are prohibited over internet platforms as
well. Cyber laws protect the victims and prosecute
the offender against this offence.
 Unauthorized access
 Access means gaining entry into, instructing or
communicating with the logical, arithmetical, or
memory function resources of a computer,
computer system or computer network.
 Unauthorized access would therefore mean any
kind of access without the permission of either the
rightful owner or the person in charge of a
computer, computer system or computer network.
 Every act committed towards breaking into a
computer and/or network is hacking. Hackers
write or use ready-made computer programs to
attack the target computer. They possess the desire
to destruct and they get the kick out of such
destruction. Some hackers hack for personal
 25 Trojan Attack:-
 The program that act like something useful but do
the things that are quiet damping. The programs of
this kind are called as Trojans.
 The name Trojan Horse is popular.
 Trojans come in two parts, a Client part and a
Server part. When the victim (unknowingly) runs
the server on its machine, the attacker will then
use the Client to connect to the Server and start
using the trojan.
 TCP/IP protocol is the usual protocol type used for
communications, but some functions of the trojans
Types of Cyber Crimes
 Virus and Worm attack:-
 A program that has capability to infect other
programs and make copies of itself and spread into
other programs is called virus.
 Programs that multiply like viruses but spread
from computer to computer are called as worms.
Types of Cyber Crimes
 E-mail & IRC related crimes:-
 Email spoofing
 Email spoofing refers to email that appears to have
been originated from one source when it was
actually sent from another source. Please Read
Types of Cyber Crimes
 Email Spamming
 Email "spamming" refers to sending email to
thousands and thousands of users - similar to a
chain letter.
Types of Cyber Crimes
 Sending malicious codes through email
 E-mails are used to send viruses, Trojans etc
through emails as an attachment or by sending a
link of website which on visiting downloads
malicious code.
Types of Cyber Crimes
 Email bombing
 E-mail "bombing" is characterized by abusers
repeatedly sending an identical email message to a
particular address.
Types of Cyber Crimes
 Sending threatening emails
Types of Cyber Crimes
 Defamatory emails
Types of Cyber Crimes
 Email frauds
Types of Cyber Crimes
 Denial of Service attacks:-
 Flooding a computer resource with more requests
than it can handle. This causes the resource to
crash thereby denying access of service to
authorized users.
Types of Cyber Crimes
 IPR Violations:-
 These include software piracy, copyright
infringement, trademarks violations, theft of
computer source code, patent violations. etc.
 Cyber Squatting- Domain names are also
trademarks and protected by ICANN’s domain
dispute resolution policy and also under trademark
laws.
 Cyber Squatters registers domain name identical
to popular service provider’s domain so as to
attract their users and get benefit from it.
Types of Cyber Crimes
 Cyber Terrorism:-
 Targeted attacks on military installations, power
plants, air traffic control, banks, trail traffic
control, telecommunication networks are the most
likely targets. Others like police, medical, fire and
rescue systems etc.
 Cyberterrorism is an attractive option for modern
terrorists for several reasons.
Types of Cyber Crimes
 Banking/Credit card Related crimes:-
 In the corporate world, Internet hackers are
continually looking for opportunities to
compromise a company’s security in order to gain
access to confidential banking and financial
information.
 Use of stolen card information or fake credit/debit
cards are common.
 Bank employee can grab money using programs to
deduce small amount of money from all customer
accounts and adding it to own account also called
as salami.
 E-commerce/ Investment Frauds:-
 Sales and Investment frauds. An offering that uses
false or fraudulent claims to solicit investments or
loans, or that provides for the purchase, use, or
trade of forged or counterfeit securities.
 Merchandise or services that were purchased or
contracted by individuals online are never
delivered.
 The fraud attributable to the misrepresentation of a
product advertised for sale through an Internet
auction site or the non-delivery of products
purchased through an Internet auction site.
 Investors are enticed to invest in this fraudulent
scheme by the promises of abnormally high
Types of Cyber Crimes
 Sale of illegal articles:-
 This would include trade of narcotics, weapons
and wildlife etc., by posting information on
websites, auction websites, and bulletin boards or
simply by using email communication.
 Research shows that number of people employed
in this criminal area. Daily peoples receiving so
many emails with offer of banned or illegal
products for sale.
Types of Cyber Crimes
 Identity Theft :-
Identity theft is the fastest growing crime in
countries like America.
 Identity theft occurs when someone appropriates
another's personal information without their
knowledge to commit theft or fraud.
 Identity theft is a vehicle for perpetrating other
types of fraud schemes.
Types of Cyber Crimes
 Data diddling:-
 Data diddling involves changing data prior or
during input into a computer.
 In other words, information is changed from the
way it should be entered by a person typing in the
data, a virus that changes data, the programmer of
the database or application, or anyone else
involved in the process of having information
stored in a computer file.
 It also include automatic changing the financial
information for some time before processing and
then restoring original information.
Types of Cyber Crimes
 Theft of Internet Hours:-
 Unauthorized use of Internet hours paid for by
another person.
 By gaining access to an organisation's telephone
switchboard (PBX) individuals or criminal
organizations can obtain access to dial-in/dial-out
circuits and then make their own calls or sell call
time to third parties.
 Additional forms of service theft include capturing
'calling card' details and on-selling calls charged to
the calling card account, and counterfeiting or
illicit reprogramming of stored value telephone
Types of Cyber Crimes
 Theft of computer system (Hardware):-
 This type of offence involves the theft of a
computer, some part(s) of a computer or a
peripheral attached to the computer.
Types of Cyber Crimes
 Physically damaging a computer system:-
 Physically damaging a computer or its
peripheralseither by shock, fire or excess electric
supply etc.
Types of Cyber Crimes
 Breach of Privacy
 Privacy refers to the right of an individual/s to
determine when, how and to what extent his or her
personal data will be shared with others.
 Breach of privacy means unauthorized use or
distribution or disclosure of personal information
like medical records, sexual preferences, financial
status etc.
Types of Cyber Crimes
 Breach of Confidentiality
 It means non disclosure of information to
unauthorized or unwanted persons.
 In addition to Personal information some other
type of information which useful for business and
leakage of such information to other persons may
cause damage to business or person, such
information should be protected.
 Many times party or their employees leak such
valuable information for monitory gains and
causes breach of contract of confidentiality.
 Special techniques such as Social Engineering are

More Related Content

PPTX
cyber crime.pptx
PDF
Cyber Law & Forensics
PPSX
Cyber crime and cyber security
PDF
Cyber Crime Types & Tips
PPTX
CYBER CRIME - A Threat To Internet Users
PPTX
Introduction to cybercrime
PPTX
Module vi mis
PPTX
12 c business i environment i society mba 2016
cyber crime.pptx
Cyber Law & Forensics
Cyber crime and cyber security
Cyber Crime Types & Tips
CYBER CRIME - A Threat To Internet Users
Introduction to cybercrime
Module vi mis
12 c business i environment i society mba 2016

Similar to Cyber Laws.ppt (20)

PPTX
Cyber crime and security 1
DOCX
UNIT 5.docx
PPT
CYBER-CRIME PRESENTATION.ppt
PPT
cyber crimes ppt computer vulnerability softeware testing
PPT
CYBER CRIME PRESENTATION for Law Students for Semester four
PPT
CYBER-CRIME PRESENTATION with real-time examples
PPT
Cybercrimes and legal enforcement in India.ppt
PDF
Cyber Crime and Security ppt by Neeraj Ahirwar
PPT
liullwkjajjlkjsd892009jlaoijlajkjkdfCYBER-CRIME PRESENTATION.ppt
PPT
CYBER CRIME PRESENTATION and awareness.ppt
PPTX
Cyber security and cyber laws
PPT
CYBER-CRIME PRESENTATION law realted ppt
PPT
Title: CYBER CRIME: Understanding, Prevention & Legal Framework
PPTX
Computer crime
PPTX
lec 15.pptxlec 15.pptxlec 15.pptxlec 15.pptx
PPTX
Cyber crime
PPSX
Cyber crime
PPTX
PPT
Cyber crime & security final tapan
PDF
cybersecurityawareness-presentation-170627121043.pdf
Cyber crime and security 1
UNIT 5.docx
CYBER-CRIME PRESENTATION.ppt
cyber crimes ppt computer vulnerability softeware testing
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER-CRIME PRESENTATION with real-time examples
Cybercrimes and legal enforcement in India.ppt
Cyber Crime and Security ppt by Neeraj Ahirwar
liullwkjajjlkjsd892009jlaoijlajkjkdfCYBER-CRIME PRESENTATION.ppt
CYBER CRIME PRESENTATION and awareness.ppt
Cyber security and cyber laws
CYBER-CRIME PRESENTATION law realted ppt
Title: CYBER CRIME: Understanding, Prevention & Legal Framework
Computer crime
lec 15.pptxlec 15.pptxlec 15.pptxlec 15.pptx
Cyber crime
Cyber crime
Cyber crime & security final tapan
cybersecurityawareness-presentation-170627121043.pdf
Ad

More from silas Sargunam (8)

PPT
Emotional Intelligence as a critical success factor.ppt
PPT
Exercise The Server as a participative learning.ppt
PPT
Emotional_Intelligence TEST as a measurement.ppt
PPT
Flow of Capital - Prospects and Consequences.ppt
PPT
Digital Innovation - Illustrations and Challenges.ppt
PPT
Cultural Influence on Product Adaptation.ppt
PPT
Design Thinking - Ramco.ppt
PDF
Education india and vietnam
Emotional Intelligence as a critical success factor.ppt
Exercise The Server as a participative learning.ppt
Emotional_Intelligence TEST as a measurement.ppt
Flow of Capital - Prospects and Consequences.ppt
Digital Innovation - Illustrations and Challenges.ppt
Cultural Influence on Product Adaptation.ppt
Design Thinking - Ramco.ppt
Education india and vietnam
Ad

Recently uploaded (20)

DOCX
NATIONAL BUILDING CODE OF THE PHILIPPINES SUMMARY
PDF
CORPORATE_LAW_NOTES. for LLB law students
PPTX
Law-On-Obligations-Presentation-One-1.pptx
PDF
INCORPORATION OF COMPANIES for company law
PPTX
CHAPTER 6 - COMPANY LAW COMPANY LAW COMPANY LAW
PDF
Insolvency and Bankruptcy Code (IBC) Overview and Company Management Insights...
PDF
Private Notice of Disqualification and Notice of Violation for Disqualificati...
PPTX
The Balance of Power: Emergency Provisions in India
PPTX
INGLÉS 4 - SESSIONES 3 Y 4 - SEMANA DEL 18 DE AGOSTO.pptx
PDF
UNIT- 10_Universal Ethics.pdf (Business Context)
PPT
Module Number 1 - VII Semester LLB Course - General Concepts
PDF
Trade Union ACT NOTES for llb law students
PPT
Federalism lecture note power point for law
PPT
Module – 4 Indirect Tax Regime - II.ppt
PPTX
THE-STORY-OF-THE-RIZAL-LAW-Critical-Analyses-of-the-Rizal-Law.pptx
PPTX
toppdf_ sa understanding te1753419803952.pptx
PPTX
Sususysydudufoc9f9dnsususyaayaysyydycudoej
PPTX
The doctrine of separation of power is known to us by Montesquieu as he gave ...
PPTX
Compliance Training for Br. ver 0.1.pptx
PPTX
Constitution of India, A teacher's guide to the Constitution
NATIONAL BUILDING CODE OF THE PHILIPPINES SUMMARY
CORPORATE_LAW_NOTES. for LLB law students
Law-On-Obligations-Presentation-One-1.pptx
INCORPORATION OF COMPANIES for company law
CHAPTER 6 - COMPANY LAW COMPANY LAW COMPANY LAW
Insolvency and Bankruptcy Code (IBC) Overview and Company Management Insights...
Private Notice of Disqualification and Notice of Violation for Disqualificati...
The Balance of Power: Emergency Provisions in India
INGLÉS 4 - SESSIONES 3 Y 4 - SEMANA DEL 18 DE AGOSTO.pptx
UNIT- 10_Universal Ethics.pdf (Business Context)
Module Number 1 - VII Semester LLB Course - General Concepts
Trade Union ACT NOTES for llb law students
Federalism lecture note power point for law
Module – 4 Indirect Tax Regime - II.ppt
THE-STORY-OF-THE-RIZAL-LAW-Critical-Analyses-of-the-Rizal-Law.pptx
toppdf_ sa understanding te1753419803952.pptx
Sususysydudufoc9f9dnsususyaayaysyydycudoej
The doctrine of separation of power is known to us by Montesquieu as he gave ...
Compliance Training for Br. ver 0.1.pptx
Constitution of India, A teacher's guide to the Constitution

Cyber Laws.ppt

  • 1. Cyber Space Cyber space includes computers, networks, softwares, data storage devices(such as hard disks, USB disks etc), the internet, websites, emails and even electronic devices such as cell phones, ATM machines etc.
  • 2. Cyber crime  Any offence or crime in which a computer is used is a cyber crime.
  • 3. Cyber law  Cyber law is described as that branch of law that deals with legal issues related to computers and the internet
  • 4. Cyber law Cyber law encompasses  Cyber crimes  Electronic and digital signatures  Intellectual property  Data protection and  Privacy
  • 5. Computer as a Target  Attacking other computers.  e.g. Hacking, Virus/Worm attacks, DOS attack etc.
  • 6. Computer as a weapon  Using a computer to commit real world crimes.  e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
  • 7. Need for Regulation  Mid 90’s saw an impetus in globalization and computerisation,with more and more nations computerizing their governance, and e-commerce seeing an enormous growth.  The growth of Electronic Commerce has propelled the need for vibrant and effective regulatory mechanisms which would further strengthen the legal infrastructure
  • 8. Urgent Need  With much of international trade being done through electronic communication and with email gaining momentum, an urgent and imminent need was felt for recognizing electronic records
  • 9. Global Initiative  The United Nations Commission on International Trade Law (UNCITRAL) adopted the Model Law on e-commerce in 1996. The General Assembly of United Nations passed a resolution in January 1997
  • 10. Indian Act  India enacted Information Technology Act 2000 and I.T. Amendment Act 2008.  The Information Technology Act defines a computer, computer network, data, information and all other necessary ingredients that form part of a cybercrime.
  • 11. Scope of the Act  Cyber law in India is a combination of Contract, Intellectual property, Data protection, and privacy laws.  It covers the digital circulation of information, software, information security, e-commerce, and monetary transactions.
  • 12. Preface to the IT Act, 2000  To provide legal recognition for transactions carried out by means of electronic data interchange and storage of information and  To facilitate electronic filing of documents with the Government agencies
  • 13. Acts Ammended  Indian Penal Code  Indian Evidence Act, 1872  Bankers' Books Evidence Act, 1891 and  Reserve Bank of India Act, 1934
  • 14. Scope of the Act  The Act essentially deals with the following issues:  Legal Recognition of Electronic Documents  Legal Recognition of Digital Signatures, offenses and contraventionsJustice Dispensation Systems for cyber crimes.
  • 15. Specific Domains  Cyber Crimes  Electronic and Digital Signatures  Intellectual Property  Data Protection and Privacy
  • 16. Types of Cyber Crimes  Identity theft - When personal information of a person is stolen with the purpose of using their financial resources or to take a loan orcredit card in their name then such a crime is known as Identity theft.
  • 17. Types of Cyber Crimes  Cyberterrorism - When a threat of extortion or any kind of harm is being subjected towards a person, organization, group or state, it is known as the crime of Cyber Terrorism. Generally, it includes the well-planned attack strategies on the Government and corporate computer system.
  • 18. Types of Cyber Crimes  Cyberbullying - When a teenager or adolescent harasses,defames, or intimidates someone with the use of the internet, phone, chat rooms, instant messaging or any other social network then the person is said to be committing the crime ofCyberbullying. When the same crime is done by adults it is known as Cyberstalking.
  • 19. Types of Cyber Crimes  Hacking - The most common cybercrime is Hacking. In this crime, the person gets access to other people's computers and passwords to use it for their own wrongful gain.
  • 20. Types of Cyber Crimes  Defamation - While every individual has his or her right to speech on internet platforms as well, but if their statements cross a line and harm the reputation of any individual or organization, then they can be charged with the Defamation Law.
  • 21. Types of Cyber Crimes  Copyright - With the massive surge in internet users, when the data/ information is distributed on all platforms, copyrighting your work aids you to restrict the use of your work. Any use of your copyrighted without your permission is a punishable offence.
  • 22. Types of Cyber Crimes  Trade Secrets - Internet organization spends a lot of their time and money in developing softwares, applications, and tools and rely on Cyber Laws to protect their data and trade secrets against theft; doing which is a punishable offence.
  • 23. Types of Cyber Crimes  Freedom of Speech - When it comes to the internet, there is a very thin line between freedom of speech and being a cyber-offender. As freedom of speech enables individuals to speak their mind, cyber law refrains obscenity and crassness over the web.
  • 24. Types of Cyber Crimes  Harassment and Stalking - Harassment and stalking are prohibited over internet platforms as well. Cyber laws protect the victims and prosecute the offender against this offence.
  • 25.  Unauthorized access  Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network.  Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network.  Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. They possess the desire to destruct and they get the kick out of such destruction. Some hackers hack for personal
  • 26.  25 Trojan Attack:-  The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans.  The name Trojan Horse is popular.  Trojans come in two parts, a Client part and a Server part. When the victim (unknowingly) runs the server on its machine, the attacker will then use the Client to connect to the Server and start using the trojan.  TCP/IP protocol is the usual protocol type used for communications, but some functions of the trojans
  • 27. Types of Cyber Crimes  Virus and Worm attack:-  A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus.  Programs that multiply like viruses but spread from computer to computer are called as worms.
  • 28. Types of Cyber Crimes  E-mail & IRC related crimes:-  Email spoofing  Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source. Please Read
  • 29. Types of Cyber Crimes  Email Spamming  Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter.
  • 30. Types of Cyber Crimes  Sending malicious codes through email  E-mails are used to send viruses, Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code.
  • 31. Types of Cyber Crimes  Email bombing  E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address.
  • 32. Types of Cyber Crimes  Sending threatening emails
  • 33. Types of Cyber Crimes  Defamatory emails
  • 34. Types of Cyber Crimes  Email frauds
  • 35. Types of Cyber Crimes  Denial of Service attacks:-  Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users.
  • 36. Types of Cyber Crimes  IPR Violations:-  These include software piracy, copyright infringement, trademarks violations, theft of computer source code, patent violations. etc.  Cyber Squatting- Domain names are also trademarks and protected by ICANN’s domain dispute resolution policy and also under trademark laws.  Cyber Squatters registers domain name identical to popular service provider’s domain so as to attract their users and get benefit from it.
  • 37. Types of Cyber Crimes  Cyber Terrorism:-  Targeted attacks on military installations, power plants, air traffic control, banks, trail traffic control, telecommunication networks are the most likely targets. Others like police, medical, fire and rescue systems etc.  Cyberterrorism is an attractive option for modern terrorists for several reasons.
  • 38. Types of Cyber Crimes  Banking/Credit card Related crimes:-  In the corporate world, Internet hackers are continually looking for opportunities to compromise a company’s security in order to gain access to confidential banking and financial information.  Use of stolen card information or fake credit/debit cards are common.  Bank employee can grab money using programs to deduce small amount of money from all customer accounts and adding it to own account also called as salami.
  • 39.  E-commerce/ Investment Frauds:-  Sales and Investment frauds. An offering that uses false or fraudulent claims to solicit investments or loans, or that provides for the purchase, use, or trade of forged or counterfeit securities.  Merchandise or services that were purchased or contracted by individuals online are never delivered.  The fraud attributable to the misrepresentation of a product advertised for sale through an Internet auction site or the non-delivery of products purchased through an Internet auction site.  Investors are enticed to invest in this fraudulent scheme by the promises of abnormally high
  • 40. Types of Cyber Crimes  Sale of illegal articles:-  This would include trade of narcotics, weapons and wildlife etc., by posting information on websites, auction websites, and bulletin boards or simply by using email communication.  Research shows that number of people employed in this criminal area. Daily peoples receiving so many emails with offer of banned or illegal products for sale.
  • 41. Types of Cyber Crimes  Identity Theft :- Identity theft is the fastest growing crime in countries like America.  Identity theft occurs when someone appropriates another's personal information without their knowledge to commit theft or fraud.  Identity theft is a vehicle for perpetrating other types of fraud schemes.
  • 42. Types of Cyber Crimes  Data diddling:-  Data diddling involves changing data prior or during input into a computer.  In other words, information is changed from the way it should be entered by a person typing in the data, a virus that changes data, the programmer of the database or application, or anyone else involved in the process of having information stored in a computer file.  It also include automatic changing the financial information for some time before processing and then restoring original information.
  • 43. Types of Cyber Crimes  Theft of Internet Hours:-  Unauthorized use of Internet hours paid for by another person.  By gaining access to an organisation's telephone switchboard (PBX) individuals or criminal organizations can obtain access to dial-in/dial-out circuits and then make their own calls or sell call time to third parties.  Additional forms of service theft include capturing 'calling card' details and on-selling calls charged to the calling card account, and counterfeiting or illicit reprogramming of stored value telephone
  • 44. Types of Cyber Crimes  Theft of computer system (Hardware):-  This type of offence involves the theft of a computer, some part(s) of a computer or a peripheral attached to the computer.
  • 45. Types of Cyber Crimes  Physically damaging a computer system:-  Physically damaging a computer or its peripheralseither by shock, fire or excess electric supply etc.
  • 46. Types of Cyber Crimes  Breach of Privacy  Privacy refers to the right of an individual/s to determine when, how and to what extent his or her personal data will be shared with others.  Breach of privacy means unauthorized use or distribution or disclosure of personal information like medical records, sexual preferences, financial status etc.
  • 47. Types of Cyber Crimes  Breach of Confidentiality  It means non disclosure of information to unauthorized or unwanted persons.  In addition to Personal information some other type of information which useful for business and leakage of such information to other persons may cause damage to business or person, such information should be protected.  Many times party or their employees leak such valuable information for monitory gains and causes breach of contract of confidentiality.  Special techniques such as Social Engineering are