Slide 1: PRESENTED BY Cali Jeffreena and Swetha
II BSc.Computer Technology
Sri Krishna Arts and Science College CYBER CRIME
Slide 2: Criminal activity involving
Information technology infrastructure
Illegal access
Data interference
Misuse of devices
Forgery and
Electronic fraud.
Slide 3: Capacity to store data in small space
Easy to access
Complex
Negligence
Loss of evidence REASONS FOR CYBER CRIME
Slide 4: Children and adolescents between the age group of 6 – 18 years
Organised hackers
Professional hackers / crackers
Discontented employees Cyber Criminals
Slide 5: Unauthorized access to computer systems or networks / Hacking
Theft of information contained in electronic form
Email bombing
Data diddling
Salami attacks
Denial of Service attack
Virus / worm attacks
Logic bombs
Trojan attacks
Internet time thefts
Web jacking Modes and Manners of Cyber Crime
CLASSIFICATION : CLASSIFICATION Against Individuals
Against Individual Property
Against Organization
Against Society at large
Slide 7: Harassment via e-mails.
Cyber-stalking.
Dissemination of obscene material.
Defamation. Unauthorized control/access over computer system.
Indecent exposure
Email spoofing
Cheating & Fraud Against Individuals
Slide 8: Computer vandalism.
Transmitting virus.
Unauthorized control/access over computer system.
Intellectual Property crimes
Internet time thefts Against Individual Property
Slide 10: Unauthorized control/access over computer system
Possession of unauthorized information.
Cyber terrorism against the government organization.
Distribution of pirated software etc. Against Organization
Slide 11: Pornography (basically child pornography).
Polluting the youth through indecent exposure.
Trafficking
Financial crimes
Sale of illegal articles
Online gambling
Forgery Against Society at large
Slide 14: STATUTORY PROVISONS
Slide 15: The hurry in which the legislation was passed, without sufficient public debate, did not really serve the desired purpose
Cyber laws, in their very preamble and aim, state that they are targeted at aiding e-commerce, and are not meant to regulate cybercrime
Cyber torts
Cyber crime in the Act is neither comprehensive nor exhaustive
Ambiguity in the definitions
Uniform law
Lack of awareness
Jurisdiction issues
Extra territorial application
Raising a cyber army
Hesitation to report offences ANALYSIS OF THE STATUTORY PROVISONS
HOW TO DEAL WITH THIS PROBLEM : HOW TO DEAL WITH THIS PROBLEM International Agreements and Cooperation –Essential due to the Worldwide Nature of the Internet
Software and Hardware defenses
(e.g., antispam, antivirus software, firewalls)
Other practical steps….
PRACTICAL STEPS FOR PREVENTION OF CYBERCRIME : PRACTICAL STEPS FOR PREVENTION OF CYBERCRIME Avoid disclosing any information pertaining to oneself.
Avoid sending any photograph online particularly to strangers.
Use latest and up date anti virus software.
Keep back up volumes.
Never send your credit card number to any site that is not secured.
Use of firewalls may be beneficial.
CONCLUSION : CONCLUSION The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime.