Internet Crime and Punishment
Internet Crime and Punishment
Internet Crime and Punishment
RUHEE MITTAL
WHAT IS CYBER
CRIME?
Cyber crime refers to any crime
that involves a computer/mobile
and a network. The computer may
have been used in the
commission of a crime, or it may
be the target.
INTRODUCTION
The internet in India is growing rapidly.
It has given rise to new opportunities in
every field we can think of be it
entertainment, business, sports or
education.
There are two sides to a coin. Internet
also has its own disadvantages. One of the
major disadvantages is Cyber crime
illegal activity committed on the internet.
INDIA STANDS 11TH IN THE RANKING FOR CYBER CRIME IN THE WORLD,
CONSTITUTING 3% OF THE GLOBAL CYBER CRIME.
WHY INDIA ?
The police have recorded 3,038 cases but made only 2,700
arrests in 3 years (between 2007 and 2010)
India registered only 1,350 cases under the IT Act and IPC in 2010
50% of cybercrimes are not even reported
TYPES
Cyber Crime refers to all activities done
with criminal intent in cyberspace. These
fall into three slots.
Cyberspace is the electronic medium of
computer networks in which online
communication takes place.
1. Those against persons.
2. Against Business and Non-business
organizations.
3. Crime targeting the government.
Computer as a tool
Computer as a target
Computer as an
instrumentality
Crime associated with
prevalence of
computers
COMPUTER AS A
TOOL
When the individual is the main
target of the crime the computer
can be considered as a tool rather
than target.
These crimes are not done by
technical experts.
Eg: Spam, cyber stalking , cyber
theft etc
COMPUTER AS A
TARGET
These crimes are committed by
a selected group of people with
technical knowledge.
Destruction of information in
the computer by spreading
virus.
Eg : Defacement, cyber terrorism
etc.
COMPUTER AS AN
INSTRUMENTALITY
Copyright violation
Material copied from sources
that are not public domain or
compatibly licensed without
the permission of copyright
holder.
Copyright violation causes
legal issues.
Phishing
Acquiring information such as usernames,
password and credit card details by
disguising as a trustworthy entity.
India is among the top 15 countries hosting
"phishing" sites which aims at stealing
confidential information such as passwords
and credit card details.
CYBER LAW
Cyber law is a generic term which refers to
all the legal and regulatory aspects of
Internet and the World Wide Web. Anything
concerned with or related to or emanating
from any legal aspects or issues
concerning any activity of citizens in and
concerning Cyberspace comes within the
ambit of Cyber law.
FORENSICS
The use of science and technology to
investigate and establish facts in
criminal or civil courts of law.
Goal of computer forensics is to
examine digital media in a forensically
sound manner with the aim of
identifying, preserving, recovering,
analyzing and presenting facts and
opinions about the information.
HISTORY
Michael Anderson
Father of computer forensics
special agent with IRS
Meeting in 1988 (Portland, Oregon)
creation of IACIS, the International
Association of Computer Investigative
Specialists
the first Seized Computer Evidence
Recovery Specialists (SCERS) classes
held
WHY?
The main task or the advantage from the computer
forensic is to catch the culprit or the criminal who is
involved in the crime related to the computers.
Computer forensics has emerged as important part
in the disaster recovery management
Ability to search through a massive amount of dataQuickly, Thoroughly and In any language
The importance lies mainly in handling criminal
actions such as fraud, phishing, identity theft or
many other criminal activities
Acquisition
Identification
Evaluation
Presentation
DISADVANTAGES
It may happen in some cases that the privacy of the
client is compromised.
There are also the chances of introduction of some
malicious programs in the computer system that may
corrupt the data at a later stage of time.
It is also possible that the data is in dispute and neither
of the disputing parties can use the data. Due to this
reason the business operations may also be affected.
Producing electronic records & preserving them is
extremely costly
Legal practitioners must have extensive computer
knowledge and vice versa
A FINAL WORD
THANK - YOU