Cyber crimes its classifications and preventions

MdBaharulIslam 44 views 17 slides Aug 21, 2020
Slide 1
Slide 1 of 17
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17

About This Presentation

Discussed about the Cybercrime and its classification and prevention


Slide Content

CYBER CRIMES: IT’S CLASSIFICATION AND PREVENTION Md Baharul Islam

INTRODUCTION: Information Communication technology has become an integral part of our day to day life. It has just transformed the way we communicate; make friends, share updates, play games, and do shopping and so on. The technology has impacted most aspect of our day to day life. Our new generation is getting exposure to cyber space at a very young age. More and more people are investing time online to play games, makes friends, and use social networking sites and so on. In fact with smart phones access to social networking, online games, shopping etc. has increased significantly. The cyber space connects us virtually with crores of online users from across the globe. With increasing use of cyber space, cybercrimes are also increasing rapidly.

CYBER SPACE: The term “ cyberspac e” was first used by the cyberpunk science fiction author William Gibson. Cyberspace is the electronic medium of computer networks, in which online communication taken place and where individuals can interact, exchange ideas, share information, provide social support, conduct business, direct actions, create artistic media, play games, engage in political discussion, and so on .

CYBER CRIME: The first recorded cybercrime took place in the year 1820. Cyber Crime may be said to be those species of which, genus is the conventional crime, and where either the computer is an object or subject of the constituting crime. According to UNO Expert recommendations, the term of “ cybercrimes” covers any crime committed by using computer system or networks, within their framework or against them. US Department of Justice broadly refers to cyber crimes as “forms of crimes that involve computers and networks ”.

Cont.… Professor S.T. Viswanathan has given three definitions in his book The Indian Cyber Laws with Cyber Glossary is as follows - “Any illegal action in which a computer is the tool or object of the crime i.e. any crime, the means or purpose of which is to influence the function of a computer”. “Any incident associated with computer technology in which a victim suffered or could have suffered loss and a perpetrator, by intention, made or could have made a gain” “Computer abuse is considered as any illegal, unethical or unauthorized behavior relating to the automatic processing and transmission of data.” In simple words Cyber Crime means unlawful acts wherein the computer is either a tool or a target or both.

CLASSIFICATION: 1. Cyber Crime against Individual 2. Cyber Crime against Property 3. Cyber Crime against Organization 4. Cyber Crime against Society at large

1. Cyber Crime against Individual Harassment via e-mail Cyber Stalking Dissemination of Obscene materials Defamation Unauthorise Access of computer system E-mail spoofing Cheating & Fraud

2. Cyber Crime against Property Computer Vandalism Transmitting Virus Intellectual Property Crimes Internet time theft

3. Cyber Crime against Organization Unauthorise access over Computer System/Hacking Denial of Service Email bombing Salami Attack Logic bomb Trojan Horse Data Diddling

4. Cyber Crime against Society at large Cyber Pornography Financial Crimes Cyber Terrorism Sale of illegal Articles Online Gambling Forgery

LEGAL PROVISIONS: Information Technology Act 2000 Sec . 65, Sec . 66, Sec . 66B, Sec . 65C, Sec . 66 D Sec . 66E Sec . 66F Sec . 67 Sec . 67A Sec . 67B Sec . 67C Sec . 68 69 Sec . 69A Sec . 69B Sec . 70A Sec . 70B Sec . 71, Sec . 72, Sec . 72A, Sec . 73 , Sec . 74 Indian Penal Code 1860 Sec. 503, Sec. 499, Sec. 463, Sec. 420, Sec. 463, Sec . 383, Sec.500

ROLE OF JUDICIARY: Online Defamation SMC Pneumatics (India) Pvt ltd v Jogesh Kwata Shreya Singhal v. UOI Data mining or corporate espionage Abhinav Gupta v. State of Haryana Phishing Shri Umashankar Sivasubramanian v. ICICI Bank Cyber stalking Unknown v. Jawaharlal Nehru University Computer Forgery Abdul Kareem Telgi scam Parliament Attack case Hate Speech Sandeep Varghese v. State of Kerala Piracy of music, films and other copyrighted materials Supercasette Industries v. My space inc

PREVENTIONS: 1) Education 2) Use a firewall 3) Click with caution 4) Practice safe surfing 5) Practice safe shopping 6) Use comprehensive security software and keep your system updated 7) Secure your wireless network 8) Use strong passwords 9) Use common sense 10) Be suspicious

11) Block spyware attacks 12) Be Social-Media Savvy 13) Secure your Mobile Devices 14) Protect your Data 15) Protect your e-identity 16) Avoid being scammed 17) Call the right person for help 18) National Cyber Crime Reporting Portal: https://cybercrime.gov.in /

CONCLUSION: The Information Technology Act 2000 incorporates within its understanding the various cyber offences that the world is under the threat of in the contemporary era. Proper and timely implementation of the Act may help to curb the cyber menace and also make the cyber space a more secure, safe and easy space for storage, transactions and definitely sharing. Its proper interpretation and implementation is what is the need of the hour .

Prevention is better than Cure “Be Safe, Brows Safe, Be Cyber Smart, Be Cyber Safe.”

THANK YOU