Cyber Crime and Punishments
Cyber Crime and Punishments
Cyber Crime and Punishments
3/24/15
Cyber Crime
Variants
Hacking
"Hacking" is a crime, which entails
cracking systems and gaining
unauthorized access to the data
stored in them.
Cyber Squatting
Cyber Squatting is the act of
registering a famous Domain Name
and then selling it for a fortune.
3/24/15
3/24/15
VISHING
3/24/15
Vishing
is
the
criminal
practice
of
using
social
engineering and Voice over IP
(VoIP) to gain access to
private personal and financial
information from the public
for the purpose of financial
reward.
The
term
is
a
combination of Voice" and
phishing. Vishing exploits the
public's trust in landline
telephone services.
Cyber Laws in
India
Under The Information
Technology Act, 2000
CHAPTER XI OFFENCES 66. Hacking with
computer system.
(1)Whoever with the Intent to cause or knowing
that he is likely to cause Wrongful Loss or
Damage to the public or any person Destroys or
Deletes or Alters any Information Residing in a
Computer Resource or diminishes its value or
utility or affects it injuriously by any means,
commits hack.
(2) Whoever commits hacking shall be punished with imprisonment up to
three years, or with fine which may extend up to two lakh rupees, or
with both.
3/24/15
Information Technology
Amendment Act, 2008
Section 43,
Destroys, Deletes or Alters any Information residing in a
computer resource or diminishes its value or utility or
affects it injuriously by any means;
Steals, conceals, destroys or alters or causes any person to
steal, conceal, destroy or alter any computer source code
used for a computer resource with an intention to cause
damage;
If any person, dishonestly, or fraudulently, does any act
referred
to in section 43, he shall be punishable with
3/24/15
imprisonment for a term which may extend to two three
Shall be punishable with imprisonment for a term which may extend to three
years and with fine.
3/24/15
3/24/15
cases.
forgery or fraud
Firewalls:
A firewall protects a computer network from
unauthorized access. Network firewalls may be hardware
devices, software programs, or a combination of the two.
A3/24/15
network firewall typically guards an internal computer
network against malicious access from outside the
Cryptography:
Cryptography is the science of encrypting and decrypting information.
Encryption is like sending a postal mail to another party with a lock code
on the envelope which is known only to the sender and the recipient. A
number of cryptographic methods have been developed and some of them
are still not cracked.
3/24/15
THANK YOU!!
3/24/15