CYBER CRIMES

1 of
Published on Video
Go to video
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Page 1 (0s)

CYBER CRIMES. Presented by: Bhavneet Kaur (Roll No: 257).

Page 2 (24s)

INTRODUCTION. Activity in which computers or networks are a tool, target, or a place of criminal activity. cyber crime is a subset of computer crime. In a cyber crime, the computer network can be; The tool of a crime The target of a crime Used for purpose incidental to a crime.

Page 3 (44s)

DEFINITIONS. Offences that are committed against individuals or group of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such a s internet. Cyber crime is a term for any illegal activity that uses a computer as its primary means of communication. The U.S. department of Justice expands the definition of cyber crime and includes any illegal activity that uses a computer for the storage of evidence. Cyber crime also stated as any use of a computer as an instrument of further illegal ends, such as; Committing fraud Stealing identities Violating privacy.

Page 4 (1m 36s)

HISTORY. The first recorded cyber crime took place in the year 1820, when , Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. The firm spam e-mail took place in 1978 when it was sent out over the Arpanet. The first Virus was installedon an Apple computer in1982. A Sixteen years old student nicknamed “Data Stream”, arrested by UK police (1994)..

Page 5 (2m 6s)

Denial of Service ( DoS ) attacks by ‘Mafia Boy’ on eBay, Yahoo! And other popular sites (2000). FBI’s e-mail system was hacked (Feb, 2005). Travelling documents of NATO forces were hacked in Afghanistan..

Page 6 (2m 24s)

TARGETS OF CYBER CRIMES. Against individual property Transmitting virus Un-authorized control/access over computer Intellectual property crimes Internet time thefts Against Organization Possession of un-authorized information Cyber terrorism against the government organization Distribution of pirated software,etc.

Page 7 (2m 49s)

Against Social at Large Pornography (basically child pornography) Trafficking Financial crimes Online gambling Forgery Sale of illegal articles.

Page 8 (3m 2s)

SOME COMMON CYBER CRIMES. Computer Virus : A computer virus is a computer program or attaches itself to application programs or other executable system software causing damage to the files. Phishing : Phishing occurs when the perpetrator sends fictitious e-mails to individuals with links to fraudulent websites that appear official and thereby cause the victim to release personal information to the perpetrator..

Page 9 (3m 34s)

Hacking : The act of penetrating or gaining unauthorized access to or use of data unavailable in a computer system or a computer network for the purpose of gaining knowledge, stealing or making unauthorized use of the data. Spoofing : Spoofing is the creation of TCP/IP packets using somebody else’s IP address. Netsplonage: Netsplonage occurs when perpetrators back into online systems or individual PCs to obtain confidential information for the purpose of selling it to other parties..

Page 10 (4m 10s)

Cyber stalking: Cyber stalking refers to the use of the internet, email or other electronic communications device to stalk another person. It is an electronic harassment that involves harassing or threatening over a period of time. Cyber Terrorism: Cyber terrorism occurs when terrorists cause virtual destruction in online computer system..

Page 11 (4m 33s)

MOTIVES OF CYBER CRIMINALS. Desire for entertainment Profit Infuriation or revenge Political agenda Sexual motivations Psychiatric illness.

Page 12 (4m 45s)

CYBER LAWS. Cyber law is a term used to describe the legal issues related to use of communication technology, particularly cyber space, i.e. internet. Cyber law is an attempt to apply laws designed for the physical world to human activities on internet..

Page 13 (5m 1s)

Cyber laws in the world. Electronic Commerce Act (Ireland) Electronic Transactions Act (UK, USA, Australia, New Zealand, Singapore) Electronic Transactions Ordinance (Hong Kong) Information Technology Act (India) Information communication Technology Act (Bangladesh).

Page 14 (5m 19s)

Cyber laws in India. India has enacted the first I.T. Act, 2000 based on the UNCIRAL model recommended by the general assembly of the United Nations. Offences under IT acts are: Tampering with computer source document Hacking with computer systems, data alterations Publishing obscene information Un-authorized access to protected systems Breach of confidentiality and privacy Publishing false digital signature certificates..

Page 15 (6m 43s)

Electronic transaction ordinance, 2002. Important sections are: 36 .Violation of privacy information. 37. Damage to information system, etc.

Page 16 (6m 53s)

Electronic/ cyber crime bill, 2007. It deals with the electronic crimes included: Cyber terrorism Data damage Electronic fraud Electronic forgery Cyber stalking Cyber spaming Un-authorizes access to code.

Page 17 (7m 8s)

PREVENTION. Use hard to guess passwords Use anti-virus software and firewalls-keep them up to date Don’t open email or attachments from unknown sources Back up your computer on disk or CD often.

Page 18 (7m 23s)

RECOMMENDATIONS. Fostering Linkages: Creation liaison with international community will create sharing of experiences and good practices. The value of fostering co-operation internationally with other countries/regions and parties needs to be enhanced. Co-operation between governments and the private sector in combating cyber crime..

Page 19 (7m 46s)

Building National level Partnerships and Creating Awareness: Create specialized forums for exchange of experiences and information which would entail initiating and promoting literary, technical and scientific activity. Setting up a cyber crime cell consisting of experts to deal with cyber-crime will encourage reporting and evolve into a process online with the legislature..

Page 20 (8m 10s)

Training and Awareness Raising : It is essential to educate and empower youth to safely and responsibly take control of their Internet experience. Disseminate general awareness of cyber crimes and user laws/rights by arranging symposia, seminars, lectures, classes, demonstrations, and presentations, briefings, to educate the society and gain their comfort level. People need to be aware of the appropriate law enforcement investigative authorities at the local, state, federal, or international levels..

Page 21 (8m 44s)

CONCLUSION. It is not possible to eliminate cyber crime from the cyber space in its entirety. However, it is quite possible to check it. Any legislation in its entirety might be less successful in totally eliminating crime from the globe. The primary step is to make people aware of their rights and duties and further making the application of the laws more stringent to check crime. However, in any draft legislation it is important that the provisions of the cyber law are not made so stringent that it may retard the growth of the industry and prove to be counter-productive..

Page 22 (9m 26s)

THANK YOU ALL!.