You are on page 1of 41

CYBER CRIME

CYBER
CRIME

GROUP MEMBERS:
69 - UTSAHI MAVANI
92 - ISHA SANGHRAJKA
93 - ANURAG SHAH
114 - PRANAV UDESHI

CONTENTS:
What is Cyber Crime?
Difference between Conventional & Cyber Crime.
Reasons for Cyber Crime.
Cyber Criminals
Classification of Cyber Crimes
Types of Cyber Crimes
Statutory provisions
Prevention of Cyber Crime
Cases
Conclusion

WHAT IS CYBER CRIME?


Computer crime, or cybercrime, refers to any
crime that involves a computer and a
network, where the computers may or may
not have played an instrumental part in the
commission of a crime.
Net crime refers, more precisely, to criminal
exploitation of the Internet.
Cybercrime may be said to be those
species, of which, genus is the conventional
crime, and where either the computer is an
object or subject of the conduct constituting
crime.

DIFFERENCE BETWEEN
CONVENTIONAL CRIME & CYBER CRIME
CONVENTIONAL
CRIME

CYBER CRIME

Conventional Crime
refers to those
traditional, illegal
behaviours that most
people think of as
crime

Cybercrime is defined
as crimes committed on
the internet using the
computer as either a
tool or a targeted
victim.

It is a social and
economic phenomenon
and is as old as the
human society.

Cybercrime is the latest


and perhaps the most
complicated problem in
the cyber world.

WHY DOES CYBER CRIME


HAPPEN?
1. Capacity to store data in
comparatively small space: The
computer has a unique characteristic of
storing data in a very small space. This
makes it easier to remove or derive
information either through physical or
virtual medium.
2. Easy to access: Due to the latest
technology available today it has become
very easy to access the computer by an
unauthorised user.
3. Complex: The computers work on
operating systems and these operating

WHY DOES CYBER CRIME


HAPPEN?
4. Negligence: While protecting the
computer system there might be any
negligence, which in turn provides a
cyber-criminal to gain access and
control over the computer system.
5. Loss of evidence: Loss of evidence is a
very common & obvious problem as all
the data are routinely destroyed. Further
collection of data outside the territorial
extent also paralyses this system of
crime investigation.

CYBER CRIMINALS
1. Children and adolescents between the
age group of 6 18 years: The simple
reason for this type of behaviour pattern in
children is seen mostly due to the
inquisitiveness to know and explore the
things.
2. Organised hackers: These kinds

of hackers are mostly organised


together to fulfil a certain
objective. The reason may
be to fulfil their political bias,
fundamentalism, etc.

CYBER CRIMINALS
3. Professional hackers: Their work
is motivated by the colour of money. These
kinds of hackers are mostly employed to hack
the site of the rivals and get credible, reliable and
valuable information.
4. Discontented employees: This group include
those people who have been either fired by their
employer or are dissatisfied with their employer. To
avenge they normally hack the system
of their employer.

CLASSIFICATION OF CYBER
CRIMES:

AGAINST INDIVIDUALS
AGAINST
ORGANISATIONS
AGAINST SOCIETY AT
LARGE

AGAINST INDIVIDUALS

Harassment via e-mails.

Cyber-stalking.

Dissemination of obscene material.

Defamation.

Unauthorized control/access over


computer system.

Indecent exposure

Email spoofing

Cheating & Fraud

AGAINST ORGANISATIONS

Unauthorized control/access over


computer system

Possession of unauthorized
information.

Cyber terrorism against the


government organization.

Distribution of pirated software etc.

Transmitting virus.

Internet time thefts.

AGAINST SOCIETY AT
LARGE

Online gambling

Financial crimes

Pornography (basically child


pornography).

Polluting the youth through indecent


exposure.

Drug trafficking

Sale of illegal articles

Forgery

TYPES
OF
CRIM
CYBER
E

TYPES OF CYBER CRIME


1. HACKING:
. It is the unauthorized access to
computer systems or networks.
. Harassment through e-mails is not a new
concept. It is very similar to harassing
through letters.

TYPES OF CYBER CRIME


2. THEFT OF INFORMATION CONTAINED
IN ELECTRONIC FORM:
. This includes information stored in
computer hard disks, removable storage
media etc.
. Theft may be either by appropriating the
data physically or by
tampering them
through the
virtual medium.

TYPES OF CYBER CRIME


3. EMAIL BOMBING:
. This kind of activity refers to sending
large numbers of mail to the victim.
. The victim may be an individual or a
company or even mail servers there
by ultimately resulting into crashing.

TYPES OF CYBER CRIME


4. DATA DIDLING:
. This kind of an attack involves
altering raw data just before a
computer processes it and then
changing it back after the processing
is completed.

TYPES OF CYBER CRIME


5. SALAMI ATTACKS:
.

This kind of crime is normally


prevalent in the financial institutions
or for the purpose of committing
financial crimes.

. An important feature of this type of


offence is that the alteration is so
small that it would normally go
unnoticed.

TYPES OF CYBER CRIME


6. VIRUS OR WORM ATTACKS:
. Viruses are programs that attach
themselves to a computer or a file
and then circulate themselves to
other files and to other computers on
a network.
. They usually affect the
data on a computer, either
by altering or deleting it.

TYPES OF CYBER CRIME


7. LOGIC BOMBS:
. These are event dependent programs.
. This implies that these programs
are created to do something
only when a certain event
(known as a trigger event)
occurs.

TYPES OF CYBER CRIME


8. TROJAN ATTACKS:
. This term has its origin in the
word Trojan horse.
. In software field this means an
unauthorized programme, which
passively gains control over anothers
system by representing itself as an
authorised programme.
. The most common form of installing a
Trojan is through e-mail.

TYPES OF CYBER CRIME


9. INTERNET TIME THEFTS:
. Normally in these kinds of thefts the
Internet surfing hours of the victim
are used up by another person.
. This is done by gaining access to the
login ID and the password.

TYPES OF CYBER CRIME


10.WEB JACKING:
. This term is derived from the term hi
jacking.
. In these kinds of offences the hacker
gains access and control over the web
site of another.
. He may even mutilate or change the
information on the site.
. This may be done for fulfilling political
objectives or for money.

TYPES OF CYBER CRIME


11.DRUG TRAFFICKING:
. Drug traffickers are increasingly taking
advantage of the Internet to sell their illegal
substances through encrypted e-mail and
other Internet Technology.
. Some drug traffickers arrange deals at
internet cafes, use courier Web sites to track
illegal packages of pills, and swap
recipes in restricted-access chat
rooms.

TYPES OF CYBER CRIME


12.SPAM:
. Spam, or the unsolicited sending of
bulk email for commercial purposes, is
unlawful to varying degrees.
. As applied to email, specific antispam laws are relatively new,
however limits on unsolicited
electronic communications have
existed in some forms for some time.

TYPES OF CYBER CRIME


13.OBSCENE OR OFFENSIVE
CONTENT (PORNOGRAPHY):
. The content of websites and other
electronic communications may be
distasteful, obscene or offensive for a
variety of reasons.
. In some instances these
communications may be illegal.

TYPES OF CYBER CRIME


14.CYBER TERRORISIM:
. Cyber terrorism in general, can be defined as
an act of terrorism committed through the
use of cyberspace or computer resources.
. As well there are also hacking activities
directed towards individuals, families,
organised by groups within networks,
tending to cause fear among people,
demonstrate power, collecting information
relevant for ruining peoples' lives, robberies,
blackmailing etc.

COUNTRYWIDE CYBER
CRIME:
STATES:

No. of cyber
crimes
2008
2007
65
38
Kerela
57
40
Karnataka
25
16
Andhra Pradesh
37
49
Maharashtra
11
14
Punjab
12
10
Delhi
09
06
Madhya Pradesh
Source: National Crime Record Bureau.

WORLD WIDE CYBER


CRIME:

STATUTORY PROVISIONS
Information Technology Act 2000

was passed and enforced on 17th May


2000.
The Indian Evidence Act 1872, Bankers
Book Evidence Act 1891 and the Reserve
Bank of India Act 1934 were incorporated in
this act.
The basic purpose to incorporate the
changes in these Acts is to make them
compatible

with the Act of 2000.

STATUTORY PROVISIONS
Section 43 in particular deals with the
unauthorised access and downloading,
virus.
Fine: Up to 1 crore.
Section 65 deals with tampering with
computer source documents
Imprisonment up to 3 years or fine,
which may extend up to 2 years or both.

STATUTORY PROVISIONS
Section 66 deals with hacking with
computer system
Imprisonment up to 3 years or fine,
which may extend up to 2 years or
both.
Further section 67 deals with publication
of obscene material and provides for:
Imprisonment up to a term of
10 years and also with fine up to
Rs. 2 lakhs.

PREVENTION OF CYBER CRIME


1. Avoid disclosing any information.
2. Avoid sending any photograph online.
3. Have an latest and up dated antivirus software.
4. Keep back up volumes so that one
may not suffer data loss.
5. Never send your credit card number
to any site that is not secured.

PREVENTION OF CYBER CRIME


6. Keep a watch on the sites that your
children are accessing.
7. Watch traffic and check any
irregularity on the site.
8. Use of firewalls may be beneficial.
9. Web servers running public sites must
be protected from internal corporate
network.

HOW TO MAINTAIN WI-FI


SECURITY?
Router should never be located near
windows and door.
Always switch off the internet/router
when not in use.
Keep wireless router password
protected.
Range of a router should be
limited.

CASE 1: AUGUST 2010 ( SALAMI


ATTACK)
The cyber crime police arrested Giriraj
Tiwari, a 28 year old Malad resident,
for allegedly hacking into a net
banking account and siphoning off Rs
2 lakh.
The account belonged to an employee
of a private company who had used it
for years to collect his salary.

CASE 2: JULY 2010 ( WEB


JACKING)
The website of Mumbai polices cyber
crime cell was breached by a group of
hackers claiming to be from Pakistan.
Exposing flaws in the departments
cyber security, a group calling itself
Mafia Boyz pasted offensive
messages on the cells homepage.
You should know that your website is
very simple to hack into and we have
done it very easily, the group wrote.

CASE 3: FEBRUARY 2007 (WEB


JACKING)
The Thane police arrested a
management student, Abhishek, for
creating a fake profile of his classmate
on Orkut and sullying her image.
He put up the girls cell number on
the website and filled in fake,
slanderous details that drew vulgar
comments from online visitors.

BIBLIOGRAPHY:
www.google.com
www.wikipedia.com
News paper article dated 2 nd
October 2010 Times of India.

You might also like