Professional Documents
Culture Documents
Cyber Crime PP T
Cyber Crime PP T
GROUP
1
Monday, September 24, 2012
Crimes are not to be measured by the issue of
events, but by the bad intensions of men.
Hacking
"Hacking" is a crime, which entails cracking
systems and gaining unauthorized access to the
data stored in them. Hacking had witnessed a 37
per cent increase this year.
Cyber Squatting
Cyber Squatting is the act of registering a famous
Domain Name and then selling it for a fortune.
This is an issue that has not been tackled in
IT ACT 2000.
A total number of 90, 119, 252 and 219 Government websites tracked by the Indian
Computer Emergency Response Team (CERT-In) were hacked / defaced by various
hacker groups in the year 2008, 2009, 2010 and Jan–Oct 2011 respectively.
Monday, September 24, 2012
Again, this is
growing trend and
it is surprising that
authorities have
not taken stern
actions to curb the
growth of these
cyber-crimes.
The police have recorded 3,038 cases but made only 2,700
arrests in 3 years (between 2007 and 2010)
India registered only 1,350 cases under the IT Act and IPC in
2010
(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with
fine which may extend up to two lakh rupees, or with both.
Secures Access;
Downloads, Copies or extracts
any data, computer database or
any information;
Introduce or causes to be introduce
any Virus or Contaminant;
Disrupts or causes disruption;
Denies or causes denial of access to any person;
Provides any assistance to any person to facilitate access
Charges the services availed of by a person to the account of
another person by Tampering with or Manipulating any Computer,
Computer System, or Computer Network;
Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy
or alter any computer source code used for a computer resource with an intention
to cause damage;
“If any person, dishonestly, or fraudulently, does any act referred to in section 43,
he shall be punishable with imprisonment for a term which may extend to two
three years or with fine which may extend to five lakh rupees or with both.” [S.66]
Monday, September 24, 2012
S .66A - P u n i s h me n tf or s e ndi ng
o f f e n s i v e me s s a g e s t h r o u g h
c o mmu n i c a t i o n s e r v i c e , e t c
A n y p e r s o n w h o s e n d s , b y me a n s o f a
c o mp u t e r r e s o u r c e o r a
c o mmu n i c a t i o n d e v i c e ;
A n y i n f o r ma t i o n t h a t i s g r o s s l y
o f f e n s i v e o r h a s me n a c i n g
c ha r a c t e r ; or
An y i n f o r ma t i o n w h i c h h e k n o w s t o
be f a l s e , but f or t he pur pos e of
c a us i ng a nnoy a nc e , i nc onv e ni e nc e ,
da nge r , obs t r uc t i on , i ns ul t ,
i n j u r y , c r i mi n a l i n t i mi d a t i o n ,
e n mi t y , h a t r e d , o r i l l w i l l ,
pe r s i s t e n t l y ma k e s b y ma k i n g u s e
of s u c h c o mp u t e r r e s o u r c e o r a
c o mmu n i c a t i o n d e v i c e ;
A n y e l e c t r o n i c ma i l o r e l e c t r o n i c
m a September
Monday, i l m e s s a ge f or t he pur pos e of
24, 2012
c a us i ng a nnoy a nc e or
S. 66C - Punishment for identity theft
“Whoever, fraudulently or dishonestly make use of the
electronic signature, password or any other unique identification
feature of any other person, shall be punished with imprisonment
of either description for a term which may extend to three years
and shall also be liable to fine which may extend to rupees one
lakh”
“Wh o e v e r , i n t e n t i o n a l l y o r
k n o wi n g l y c a p t u r e s , p u b l i s h e s o r
t r a n s mi t s t h e i ma g e o f a p r i v a t e
a r e a o f a n y p e r s o n wi t h o u t h i s o r
h e r c o n s e n t , u n d e r c i r c u ms t a n c e s
v i o l a t i ng t he pr i v a c y of t ha t
p e r s o n , s h a l l b e p u n i s h e d wi t h
i mp r i s o n me n t w h i c h ma y e x t e n d t o
t hr e e y e a r s o r wi t h f i n e n o t
e x c e e d i n g t wo l a k h r u p e e s , o r wi t h
b ot h”
S . 67 A - P u n i s h me n t f or
publ i s hi ng or t r a ns mi t t i n g
o f ma t e r i a l c o n t a i n i ng
sMonday,
e xSeptember
u a 24,l 2012l y e x p l i c i t a c t , e t c . i n
S. 67 C - Preservation and Retention of information
by intermediaries.
Firewalls:
A firewall protects a computer network from unauthorized access. Network
firewalls may be hardware devices, software programs, or a combination of the
two. A network firewall typically guards an internal computer network against
malicious access from outside the network.
Cy b e r E t h i c s a n d L a ws :
Cy b e r e t h i c s a n d c y b e r l a ws a r e
a l s o be i ng f or mu l a t e d t o s t o p
c y b e r c r i me s . I t i s a
r e s pons i bi l i t y of e v e r y
i ndi v i dua l t o f ol l ow c y be r e t hi c s
Monday, September 24, 2012
a n d c y b e r l a ws s o t ha t t he
The Future of Cyber-Crimes in India
• Continued Website Hacks and
Defacements