Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 20

Cyber Crime

Cyber Crime ?
“A generalized definition of cyber crime may be “Unlawful acts wherein the
computer is either USED AS a tool or target or both”

Cyber criminal can be motivated criminals, organized hackers, cyber terrorists.


 Cyber crime can include everything from non-delivery of goods or services and
computer intrusions (hacking) to intellectual property rights abuses, economic
espionage (theft of trade secrets), online extortion, international money
laundering, identity theft, and a growing list of other Internet-facilitated
offenses.
REASONS BEHIND THE CYBER CRIME

 For the sake of quick money.


 Low marginal cost of online activity due to global reach
 Absence of concrete regulatory measure.
 Lack of reporting and standards
 Difficulty in identification
 Lack of awareness
Challenges in Cyber Crimes
 Identity of Cyber Criminals
 Jurisdictional Challenges
 Challenges with regard to the nature of evidence
 Lack of effective reporting and dearth of data
 Dearth of experts in prosecution of cyber crimes
 Extradition process challenges
Classification of cyber crime
Crime against person/ Crime against
Crime against property
individual state/society

• Extracting secret
• Cyber Stalking information from the
• Defamation • Computer Vandalism Computer system of
• Dissemination of • Virus Transmission any organization
Obscene Material • Unauthorized access • Cyber terrorism
• Harassment via email over computer system • Web jacking
• Hacking • Intellectual property • Polluting the Youth
• Email Spoofing crime through Indecent
• Pornography • Financial scams and exposure
• Credit Card Fraud frauds • Financial Crimes
• Phishing • Sale of Illegal Articles
• Net Extortion • Salami Attacks
• Illegal human
trafficking online
• Online gambling
Crime against person/
individual
Types of Cyber Crime

1. Cyber Harassment

Abuse and violence don’t always come in the physical form, Online behavior by
a partner, family member or someone else can also be abusive if it makes
someone feel scared or unsafe. That may include:
a. Unwanted sexually explicit emails, text (or online) messages;
b. Sharing photos or videos of you without your consent.
c. Inappropriate or offensive advances on social networking websites or
internet chat rooms;
d. Threats of physical and/or sexual violence by email, text (or online)
messages;
e. Hate speech, meaning language that denigrates, insults, threatens or
targets an individual based on her identity (gender) and other traits (such as
sexual orientation or disability).
f. Cyber Stalking, Cyber Bullying
2. Cyber Extortion

Cyber extortion is the act of cyber-criminals demanding payment through the use of
or threat of some form of malicious activity against a victim, such as data
compromise or denial of service attack. Cyber extortion permeates actions such as
ransomware, email ransom campaigns, and distributed denial of service (DDoS)
attacks.

3. Hacking

Hacking is an attempt to exploit a computer system or a private network inside a


computer. Simply put, it is the unauthorized access to or control over computer
network security systems for some illicit purpose.
Examples: Network Hacking, Password Hacking, Computer Hacking
Examples: Email Fraud, Email Spoofing, Email spamming, Spreading malicious code
through Email

5. Financial Crime

Examples: Credit Card Fraud, Salami Attacks, Online Gambling, Sale of Illegal items

6. Identity Theft

Examples: Phishing, Pharming, Vishing


7. Cyber Squatting

Examples: Software Piracy, Trademark Violation, Copyright


Infringement

8. Malicious Code

Examples: Spyware, Virus, Trojan, Password, Botnet, Worm

9. Denial of Service
10. Cyber Pornography

11. Data Didling

A data diddling (also called false data entry) simply means altering of data before entering it
or during entering to the computer system.
Data diddling can also occur when data is altered just before it is processed by computer
system and this same data can be modify back after processing the fake data that was
entered.
This form of cyber crime usually occur within organization providing customer services i.e.
electricity organization, medical organization, transport organization, etc. where customer
bill, personal information or order valuable and important records are manipulated.

Data diddling actions are also classified to be forging or counterfeiting of documents.


Cyber Crime Record in 2018
 Cyber Crimes During 2018, 55.2% of cyber-crime cases registered
were for the motive of fraud (15,051 out of 27,248 cases) followed
by sexual exploitation with 7.5% (2,030 cases) and causing
disrepute with 4.4% (1,212 cases)
Regulatory Framework for Cyber Crimes in
India
Offences under the Act: Offences are provided under Chapter XI from Sec 65-76

 Section 65: Tampering with computer source documents: If any person


• conceals,
• destroys,
• or alters any computer source document intentionally,
• then he shall be punishable with imprisonment which may extend to three
years, or fine which may extend to two lakh rupees or both.
 Section 66: Computer related offences:
 Any person dishonestly, or fraudulently does any act as referred in Section 43 (damage
to computer, computer system), then he shall be he shall be punishable with
imprisonment for a term which may extend to three years or with fine which may extend
to five lakh rupees or with both.

 Section 66B: Receiving stolen computer’s resources or communication devices


dishonestly:
 Any person dishonestly,
 or fraudulently receives or retains any stolen computer resource or communication
device,
 then he shall be punished with imprisonment of either description for a term which may
extend to three years or with fine which may extend to rupees one lakh or with both.

 Section 66C: Identify theft:


 Any person dishonestly,
 or fraudulently make use of Electronic Signature, Password or
 any other Unique Identification Feature of any other person,
 then he shall be punished with imprisonment of either description for a term which may
extend to three years and shall also be liable to fine which may extend to rupees one
lakh or both.
 Section 66D: Cheating by personation by the use of computer’s resources:
 Any person dishonestly,
 or fraudulently by means of any communication device or computer resource cheats by
personating,
 then he shall be punished with imprisonment of either description for a term which may
extend to three years and shall also be liable to fine which may extend to one lakh rupees.

 Section 66E: Violation of privacy:


 Any person intentionally captures,
 publishes,
 or transmits the image of a private area of any person without consent,
 then he shall be punished with imprisonment which may extend to three years or with fine
not exceeding two lakh rupees, or with both.

 Section 66F: Cyber terrorism:


 Any person does any act electronically,
 or with use of computer with intent to threaten unity, integrity, security, or sovereignty of
India,
 then he shall be punishable with imprisonment for life.
 Section 67: Publishing or transmitting obscene material in electronic form:
 Any person publishes, or transmits in electronic form any material which appeals to prurient interest,
 or if its effect is such as to tend to deprave and corrupt persons who are likely to read, see, or hear the matter
contained in it,
 then he shall be punished on first conviction with imprisonment of either description for a term which may extend
to three years and with fine which may extend to five lakh rupees and in the event of a second or subsequent
conviction with imprisonment of either description for a term which may extend to five years and also with fine
which may extend to ten lakh rupees.

 Section 67A: Publishing or transmitting of material containing sexually explicit act, etc., in electronic form:
 Any person publishes, or transmits in electronic form any material which contains sexually explicit act, or conduct,
 then he shall be punished on first conviction with imprisonment of either description for a term which may extend
to five years and with fine which may extend to ten lakh rupees and in the event of a second or subsequent
conviction with imprisonment of either description for a term which may extend to seven years and also with fine
which may extend to ten lakh rupees.

 Section 67B: Publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form:
 Whoever transmits or publishes any materials that depict children in sexually explicit act or conduct in any
electronics form
 shall be sentenced for either description for a term which may extend to five years of imprisonment with a fine that
could extend to rupees ten lakhs on the first conviction. And in the event of second conviction criminals could be
sentenced for either description for a term that could extend to 7 years along with a fine that could extend to
rupees ten lakhs.
 Section 75: Act to apply for contravention or offence that is committed outside India:
 If any person has committed an offence, or contravention committed outside India,
 and if the act or conduct constituting the offence or contravention involves a computer, computer
system or computer network located in India,
 then the provisions of this Act shall apply also to any offence or contravention committed outside India
by any person irrespective of his nationality.

 Section 76: Confiscation:


 Any computer, computer system, floppies, compact disks, tape drives or any other accessories
related thereto, in respect of which any provision of this Act, rules, orders or regulations made
thereunder has been or is being contravened,
 shall be liable to confiscation However, if it is proved that such resources were not used in
committing fraud then only person in default will be arrested.

You might also like