Cyber Crime and Punishments

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 19

3/24/15

Cyber Crime is a term used to broadly describe criminal


activity in which computers or computer networks are a tool,
a target, or a place of criminal activity and include everything
from electronic cracking to denial of service attacks. It is also
used to include traditional crimes in which computers or
networks are used to enable the illegal activity.

Pornography, Threatening Email, Assuming someone's


Identity, Sexual Harassment, Spam and Phishing are some
examples where computers are used to commit crime,
whereas Viruses, Worms ,Software Piracy and Hacking are
examples where computers become target of crime.

3/24/15

Cyber Crime
Variants
Hacking
"Hacking" is a crime, which entails
cracking systems and gaining
unauthorized access to the data
stored in them.

Cyber Squatting
Cyber Squatting is the act of
registering a famous Domain Name
and then selling it for a fortune.

3/24/15

Phishing is just one of the many


frauds on the Internet, trying to
fool people into parting with
their money. Phishing refers to
the receipt of unsolicited emails
by customers of Financial
Institutions, requesting them to
enter their Username, Password
or other personal information to
access their Account for some
reason.
The
fraudster then has access to
3/24/15
the customer's online bank

3/24/15

Cyber Stalking is use of the


Internet or other electronic
means to stalk someone. This
term is used interchangeably
with online harassment and
online abuse. Stalking generally
involves harassing or
threatening behaviour that an
individual engages in
repeatedly, such as following a
person, appearing at a person's
home or place of business,

VISHING

3/24/15

Vishing
is
the
criminal
practice
of
using
social
engineering and Voice over IP
(VoIP) to gain access to
private personal and financial
information from the public
for the purpose of financial
reward.
The
term
is
a
combination of Voice" and
phishing. Vishing exploits the
public's trust in landline
telephone services.

Vishing is typically used to

India stands 11th in the ranking for


Cyber Crime in the World,
constituting 3% of the Global Cyber
3/24/15
Crime.

Cyber Laws in
India
Under The Information
Technology Act, 2000
CHAPTER XI OFFENCES 66. Hacking with
computer system.
(1)Whoever with the Intent to cause or knowing
that he is likely to cause Wrongful Loss or
Damage to the public or any person Destroys or
Deletes or Alters any Information Residing in a
Computer Resource or diminishes its value or
utility or affects it injuriously by any means,
commits hack.
(2) Whoever commits hacking shall be punished with imprisonment up to
three years, or with fine which may extend up to two lakh rupees, or
with both.
3/24/15

Whoever without permission of


the owner of the computer :
Secures Access;
Downloads, Copies or extracts
any data, computer database or
any information;
Introduce or causes to be introduce
any Virus or Contaminant;
Disrupts or causes disruption;
Denies or causes denial of access to any
person;
Provides any assistance to any person to
facilitate access
Charges the services availed of by a
person to the account of another person
by Tampering with or Manipulating any
Computer, Computer System, or
Computer Network;
3/24/15

Information Technology
Amendment Act, 2008
Section 43,
Destroys, Deletes or Alters any Information residing in a
computer resource or diminishes its value or utility or
affects it injuriously by any means;
Steals, conceals, destroys or alters or causes any person to
steal, conceal, destroy or alter any computer source code
used for a computer resource with an intention to cause
damage;
If any person, dishonestly, or fraudulently, does any act
referred
to in section 43, he shall be punishable with
3/24/15
imprisonment for a term which may extend to two three

S.66A - Punishment for sending offensive messages through communication


service, etc

Any person who sends, by means of a computer resource or a


communication device;
Any information that is grossly offensive or has menacing character; or
Any information which he knows to be false, but for the purpose of causing
annoyance, inconvenience, danger, obstruction, insult, injury, criminal
intimidation, enmity, hatred, or ill will, persistently makes by making use of
such computer resource or a communication device;
Any electronic mail or electronic mail message for the purpose of causing
annoyance or inconvenience or to deceive or to mislead the addressee or
recipient about the origin of such messages;

Shall be punishable with imprisonment for a term which may extend to three
years and with fine.
3/24/15

S. 66C - Punishment for identity theft


Whoever, fraudulently or dishonestly make
use of the electronic signature, password or any
other unique identification feature of any other
person, shall be punished with imprisonment of
either description for a term which may extend
to three years and shall also be liable to fine
which may extend to rupees one lakh

S. 66D - Punishment for cheating by


personation by using computer resource
Whoever, by means of any communication
device or computer resource cheats by
personation, shall be punished with
imprisonment
of either description for a term
3/24/15

S. 66E - Punishment for violation of privacy.


Whoever, intentionally or knowingly captures, publishes or transmits the
image of a private area of any person without his or her consent, under
circumstances violating the privacy of that person, shall be punished with
imprisonment which may extend to three years or with fine not exceeding two
lakh rupees, or with both

S. 67 A - Punishment for publishing or transmitting of material


containing sexually explicit act, etc. in electronic form
Whoever publishes or transmits or causes to be published or transmitted in
the electronic form any material which contains sexually explicit act or
conduct shall be punished on first conviction with imprisonment of either
description for a term which may extend to five years and with fine which may
extend to ten lakh rupees

3/24/15

S. 67 C - Preservation and Retention of information


by intermediaries.

(1) Intermediary shall preserve and retain such


information as may be specified for such duration and
in such manner and format as the Central Government
may prescribe.
(2) Any intermediary who intentionally or knowingly
contravenes the provisions of sub section (1) shall be
punished with an imprisonment for a term which may
extend to three years and shall also be liable to fine.
3/24/15

Arrests & Reports Under IT


Act
Under
the IT Act, 966 cybercrime
cases were filed in 2010
420 in 2009)
Geographic breakdown of cases
reported:
o
o
o
o
o
o

153 from Karnataka,


148 from Kerala
142 from Maharashtra
105 Andhra Pradesh
52 Rajasthan
52 Punjab

233 persons were arrested in 2010


33% of the cases registered were
related to hacking
Source: National Crime Records Bureau
3/24/15

Arrests & Reports Under


IPC
Under the IPC, 356 cybercrime cases were registered in 2010
(276 cases in 2009)
Geographic breakdown of cases reported -o 104 from Maharashtra
o 66 Andhra Pradesh
o 46 Chhattisgarh

The majority of these crimes were either

cases.

Source: National Crime Records Bureau


3/24/15

forgery or fraud

How to Tackle Such Activities?


An important question arises that how can these crimes
be prevented. A number of techniques and solutions have
been presented but the problems still exists and are
increasing day by day.

Antivirus And Anti Spyware Software:


ntivirus software consists of computer programs that
attempt to identify, thwart and eliminate computer
viruses and other malicious software. Anti spy wares are
used to restrict backdoor program, trojans and other spy
wares to be installed on the computer.

Firewalls:
A firewall protects a computer network from
unauthorized access. Network firewalls may be hardware
devices, software programs, or a combination of the two.
A3/24/15
network firewall typically guards an internal computer
network against malicious access from outside the

Cryptography:
Cryptography is the science of encrypting and decrypting information.
Encryption is like sending a postal mail to another party with a lock code
on the envelope which is known only to the sender and the recipient. A
number of cryptographic methods have been developed and some of them
are still not cracked.

Cyber Ethics and Laws:


Cyber ethics and cyber laws are also being formulated to stop cyber crimes.
It is a responsibility of every individual to follow cyber ethics and cyber
laws so that the increasing cyber crimes shall reduce. Security Software
like Anti Viruses and Anti Spy Wares should be installed on all computers,
in order to remain secure from Cyber Crimes. Internet Service Providers
should also provide high level of security at their servers in order to keep
their clients secure from all types of viruses and malicious programs.

3/24/15

THANK YOU!!

3/24/15

You might also like