0% found this document useful (0 votes)
194 views66 pages

Cyber Crimes & Its Examples

The document provides an overview of the topics covered in a cyber security course, including an introduction to cybercrime, different types of cyber offenses and criminals, tools and methods used in cybercrime, and the legal perspectives of cybercrime and cyber security. The course contains 6 units and refers to two textbooks on computer forensics, cyber crime, and cyber security. It defines cybercrime and categorizes different types of cybercrimes such as those against individuals, property, organizations, and society.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
194 views66 pages

Cyber Crimes & Its Examples

The document provides an overview of the topics covered in a cyber security course, including an introduction to cybercrime, different types of cyber offenses and criminals, tools and methods used in cybercrime, and the legal perspectives of cybercrime and cyber security. The course contains 6 units and refers to two textbooks on computer forensics, cyber crime, and cyber security. It defines cybercrime and categorizes different types of cybercrimes such as those against individuals, property, organizations, and society.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 66

Cyber Security

Syllabus
UNIT 1: Introduction to Cybercrime
UNIT 2: Cyber offenses
UNIT 3: Cybercrime: Mobile and Wireless devices
UNIT 4: Tools and method used in Cybercrime
UNIT 5: Phishing and identity theft
UNIT 6: Cybercrimes and Cyber Security: The legal
perspectives
TEXT BOOK:
Cyber Security by Nina Godbole,Sunit Belapure, Wiley
India, 1st edition copyright 2011 reprint 2013.
REFERENCES:
Computer Forensics and Cyber Crime An Introduction by
Marjie T. Britz ,Pearson publication, 2nd edition.
definition
⚫ “Cybercrime (computer crime) is any illegal behavior,
directed by means of electronic operations, that target
the security of computer systems and the data
processed by them”.
⚫ Hence cybercrime can sometimes be called as
computer-related crime, computer crime, E-crime,
Internet crime, High-tech crime….
Cybercrime specifically
can be defined
in number of ways…
⚫ A crime committed using a computer and the internet
to steal a person’s identity(identity theft) or sell
contraband or stalk victims or disrupt operations with
malevolent programs.
⚫ Crimes completed either on or with a computer
⚫ Any illegal activity through the Internet or on the
computer.
⚫ All criminal activities done using the medium of
computers, the Internet, cyberspace and the WWW.
definitions for
cybercrime
⚫ Any illegal act where a special knowledge of computer
technology is essential for its perpetration, investigation or
prosecution
⚫ Any traditional crime that has acquired a new dimension
or order of magnitude through the aid of a computer, and
abuses that have come into being because of computers
⚫ Any financial dishonesty that takes place in a computer
environment.
⚫ Any threats to the computer itself, such as theft of
hardware or software, sabotage and demands for ransom
1.2 DEFINING CYBER CRIME
▪ Crime committed using a computer and the
internet to steal data or information.
▪ Illegal imports.
▪ Malicious programs.
Cybercrime
⚫ Cybercrime is not a new phenomena
⚫ The first recorded cybercrime took place in the year 1820.
⚫ In 1820, JosephMarie Jacquard, a textile manufacturer in
France, produced the loom. This device allowed the
repetition of a series of steps in the weaving of special
fabrics. This resulted in a fear amongst Jacquard's
employees that their traditional employment and livelihood
were being threatened. They committed acts of sabotage to
discourage Jacquard from further use of the new echnology.
This is the first recorded cyber crime!
further
⚫ Cybercrime refers to the act of performing a criminal act using cyberspace
as communication vehicle.
⚫ Two types of attacks are common:
⚫ Techno- crime : Active attack
⚫ Techno Crime is the term used by law enforcement agencies to denote criminal activity
which uses (computer) technology, not as a tool to commit the crime, but as the
subject of the crime itself. Techno Crime is usually pre-meditated and results in the
deletion, corruption, alteration, theft or copying of data on an organization's systems.
⚫ Techno Criminals will usually probe their prey system for weaknesses and will almost
always leave an electronic 'calling card' to ensure that their pseudonym identity is
known.
⚫ Techno – vandalism: Passive attack
⚫ Techno Vandalism is a term used to describe a hacker or cracker who breaks into a
computer system with the sole intent of defacing and or destroying its contents.
⚫ Techno Vandals can deploy 'sniffers' on the Internet to locate soft (insecure) targets
and then execute a range of commands using a variety of protocols towards a range of
ports. If this sounds complex - it is! The best weapon against such attacks is a firewall
which will hide and disguise your organization's presence on the Internet.
1.3 Cybercrime and information
security
⚫ Lack of information security give rise to cybercrime
⚫ Cybersecurity: means protecting information,
equipment, devices, computer, computer resource,
communication device and information stored therein
from unauthorized access, use, disclosure, disruption,
modification or destruction.
Challenges for securing data in
business perspective
⚫ Cybercrime occupy an important space in information
security due to their impact.
⚫ Most organizations do not incorporate the cost of the
vast majority of computer security incidents into their
accounting
⚫ The difficulty in attaching a quantifiable monetary
value to the corporate data and yet corporate data get
stolen/lost
⚫ Financial loses may not be detected by the victimized
organization in case of Insider attacks : such as leaking
customer data
1.4 Who are Cybercriminals?
⚫ Are those who conduct acts such as:
⚫ Child pornography
⚫ Credit card fraud
⚫ Cyberstalking
⚫ Defaming another online
⚫ Gaining unauthorized access to computer systems
⚫ Ignoring copyrights
⚫ Software licensing and trademark protection
⚫ Overriding encryption to make illegal copies
⚫ Software piracy
⚫ Stealing another’s identity to perform criminal acts
Categorization of Cybercriminals
⚫ Type 1: Cybercriminals- hungry for recognition
⚫ Hobby hackers
⚫ A person who enjoys exploring the limits of what is
possible, in a spirit of playful cleverness. May modify
hardware/ software
⚫ IT professional(social engineering):
⚫ Ethical hacker

⚫ Politically motivated hackers :


⚫ promotes the objectives of individuals, groups or nations supporting a
variety of causes such as : Anti globalization, transnational conflicts and
protest
⚫ Terrorist organizations
⚫ Cyberterrorism
⚫ Use the internet attacks in terrorist activity
⚫ Large scale disruption of computer networks , personal
computers attached to internet via viruses
Type 2: Cybercriminals- not
interested in recognition
⚫ Psychological perverts
⚫ Express sexual desires, deviates from normal behavior
⚫ Poonam panday
⚫ Financially motivated hackers
⚫ Make money from cyber attacks
⚫ Bots-for-hire : fraud through phishing, information theft, spam and
extortion
⚫ State-sponsored hacking
⚫ Hacktivists
⚫ Extremely professional groups working for governments
⚫ Have ability to worm into the networks of the media, major
corporations, defense departments
Type 3: Cybercriminals- the
insiders
⚫ Disgruntled or former employees seeking
revenge
⚫ Competing companies using employees to gain
economic advantage through damage and/ or
theft.
Motives behind cybercrime
⚫ Greed
⚫ Desire to gain power
⚫ Publicity
⚫ Desire for revenge
⚫ A sense of adventure
⚫ Looking for thrill to access forbidden information
⚫ Destructive mindset
⚫ Desire to sell network security services
1.5 Classification of cybercrimes
1. Cybercrime against an individual
2. Cybercrime against property
3. Cybercrime against organization
4. Cybercrime against Society
5. Crimes emanating from Usenet newsgroup
1. Cybercrime against an individual
⚫ Electronic mail spoofing and other online frauds
⚫ Phishing, spear phishing
⚫ spamming
⚫ Cyberdefamation
⚫ Cyberstalking and harassment
⚫ Computer sabotage
⚫ Pornographic offenses
⚫ passwordsniffing
2.Cybercrime against property
⚫ Credit card frauds
⚫ Intellectual property( IP) crimes
⚫ Internet time theft
3.Cybercrime against organization
⚫ Unauthorized accessing of computer
⚫ Password sniffing
⚫ Denial-of-service attacks
⚫ Virus attack/dissemination of viruses
⚫ E-Mail bombing/mail bombs
⚫ Salami attack/ Salami technique
⚫ Logic bomb
⚫ Trojan Horse
⚫ Data diddling
⚫ Industrial spying/ industrial espionage
⚫ Computer network intrusions
⚫ Software piracy
4.Cybercrime against Society
⚫ Forgery
⚫ Cyberterrorism
⚫ Web jacking
5.Crimes emanating from Usenet
newsgroup
⚫ Usenet groups may carry very offensive, harmful,
inaccurate material
⚫ Postings that have been mislabeled or are
deceptive in another way
⚫ Hence service at your own risk
History of Usenet groups
⚫ In 1979 it was developed by two graduate student
⚫ s from Duke University in North Carolina (UNC)
as a network that allowed users to exchange
quantities of information too large for mailboxes
⚫ Usenet was designed to facilitate textual
exchanges between scholars.
⚫ Slowly, the network structure adapted to allow the
exchange of larger files such as videos or images.
Usenet groups as a “safe” place?
⚫ Usenet newsgroups constitute one o the largest
source of child pornography available in
cyberspace
⚫ This source useful for observing other types of
criminal or particular activities: online interaction
between pedophiles, adult pornographers and
writers of pornographic stories.
⚫ Usenet for sharing illegal content
Criminal activity on Oracle USENET
Newsgroups
⚫ This interesting SearchOracle article on Oracle security
bloopers, we see the risks with engaging the unsavory
inhabitants of the Oracle USENET newsgroup, a forum laced
with profanity, pornography and, according to this note,
criminal Oracle hackers:
⚫ “I subscribe to several Usenet groups so I can keep my skills
current. Well, a few years ago a DBA needed some assistance
and posted a question in which he shared his tnsnames.ora file
and wondered why he could not connect to SQL*Plus with the
following syntax:
⚫ sqlplus system/SecurePswd@prod
⚫ Almost immediately several people connected to this person’s
production system and was able to fish around the system.
Numerous people emailed the DBA back and pointed out that he
just broadcasted to the world his production connection string
and password. How crazy is that?”
Credit card frauds
⚫ Credit card fraud is a wide-ranging term for theft and
fraud committed using or involving a payment card,
such as a credit card or debit card, as a fraudulent
source of funds in a transaction.
⚫ The purpose may be to obtain goods without paying,
or to obtain unauthorized funds from an account.
⚫ Credit card fraud is also an adjunct to identity theft.
E-Mail Spoofing
⚫ E-mail spoofing is the forgery of an e-mail header so
that the message appears to have originated from
someone or somewhere other than the actual source.
⚫ To send spoofed e-mail, senders insert commands in
headers that will alter message information.
⚫ It is possible to send a message that appears to be from
anyone, anywhere, saying whatever the sender wants it
to say.
⚫ Thus, someone could send spoofed e-mail that appears
to be from you with a message that you didn't write.
⚫ Classic examples of senders who might prefer to
disguise the source of the e-mail include a sender
reporting mistreatment by a spouse to a welfare agency.
E-Mail Spoofing
⚫ Although most spoofed e-mail falls into the "nuisance"
category and requires little action other than deletion, the
more malicious varieties can cause serious problems and
security risks.
⚫ For example, spoofed e-mail may purport to be from
someone in a position of authority, asking for sensitive
data, such as passwords, credit card numbers, or other
personal information -- any of which can be used for a
variety of criminal purposes.
⚫ The Bank of America, eBay, and Wells Fargo are among the
companies recently spoofed in mass spam mailings.
⚫ One type of e-mail spoofing, self-sending spam, involves
messages that appear to be both to and from the recipient.
Spamming
⚫ People who create electronic spam : spammers
⚫ Spam is abuse of electronic messaging systems to send
unsolicited bulk messages indiscriminately
⚫ Spamming may be
⚫ E-Mail Spam
⚫ Instant messaging spam
⚫ Usenet group spam
⚫ Web search engine spam
⚫ Spam in blogs, wiki spam
⚫ Online classified ads spam
⚫ Mobile phone messaging spam
⚫ Internet forum spam
⚫ Junk fax spam
⚫ Social networking spam
……..
Spamming
⚫ Spamming is difficult to control
⚫ Advertisers have no operating costs beyond the
management of their mailing lists
⚫ It is difficult to hold senders accountable for their mass
mailings
⚫ Spammers are numerous
Search engine spamming
⚫ Alteration or creation of a document with the intent to
deceive an electronic catalog or a filing system
⚫ some web authors use “subversive techniques” to
ensure that their site appears more frequently or
higher number in returned search results.
⚫ remedy: permanently exclude from the search index
Cyber defamation
Cyber defamation
⚫ The tort of cyber defamation is considered to be the
act of defaming, insulting, offending or otherwise
causing harm through false statements pertaining to
an individual in cyberspace.
⚫ Example: someone publishes
defamatory matter about
someone on a website
or sends an E-mail containing
defamatory information
to all friends of that person.
It may amount to defamation
when-
⚫ If imputation to a deceased person would harm the
reputation of that person, and is intended to be hurtful to
the feelings of his family or other near relatives
⚫ An imputation is made concerning a company or an
association or collection of people as such.
⚫ An imputation in the form of an alternative or expressed
ironically
⚫ An imputation that directly or indirectly, in the estimation
of others, lowers the moral or intellectual character of that
person, or lowers the character of that person in respect of
his caste or of his calling, or lowers the credit of that
person.
Types of defamation
⚫ Libel : written defamation
⚫ Slander: oral defamation
⚫ The plaintiff must have to show that the defamatory
statements were unlawful and would indeed injure the
person’s or organization’s reputation.
⚫ When failed to prove, the person who made the
allegations may still be held responsible for
defamation.
Cyber defamation cases
⚫ In first case of cyber defamation in India (14 dec 2009),
⚫ the employee of a corporate defamed its reputation was sending
derogatory and defamatory emails against the company and its managing
directo
⚫ In this case the Court(delhi court) had restrained the defendant from
sending derogatory, defamatory, obscene, vulgar, humiliating and abusive
emails.
⚫ The court passed as important ex-parte injunction.
⚫ In another case, accused posted obscene, defamatory and annoying message
about a divorcee woman and also sent emails to the victim.
⚫ The offender was traced and was held guilty of offences under section 469, 509 IPC
and 67 of IT Act, 2000.
⚫ Other defamation cases:
⚫ A malicious customer review by a competitor could destroy a small business.
⚫ A false accusation of adultery on a social networking site could destroy a marriage.
⚫ An allegation that someone is a “crook” could be read by a potential employer or
business partner
Internet Time Theft
⚫ Occurs when an unauthorized person uses
the Internet hours paid for by another person
⚫ Comes under hacking
⚫ The person get access to someone else’s ISP user ID and
password, either by hacking or by gaining access to it by
illegal means
⚫ And uses the internet without the other person’s
knowledge
⚫ This theft can be identified when Internet time is
recharged often, despite infrequent usage.
⚫ This comes under “identity theft”
Salami attack/ salami technique
⚫ Are used for committing financial crimes.
⚫ The alterations made are so insignificant that in a
single case it would go completely unnoticed.
⚫ Example: a bank employee inserts a program, into the
bank’s serve, that deduces a small amount from the
account of every customer every month,
⚫ The unauthorised debit goes unnoticed by the
customers, but the employee will make a sizable
amount every month.
Salami attack: real life examples
⚫ Small “shavings” for Big gains!
⚫ The petrol pump fraud
Data diddling
⚫ Data diddling involves changing data input in a computer.
⚫ In other words, information is changed from the way it
should be entered by a person typing in the data.
⚫ Usually, a virus that changes data or a programmer of the
database or application has pre-programmed it to be
changed.
⚫ For example, a person entering accounting may change
data to show their account, or that or a friend or family
member, is paid in full. By changing or failing to enter the
information, they are able to steal from the company.
⚫ To deal with this type of crime, a company must
implement policies and internal controls.
⚫ This may include performing regular audits, using
software with built-in features to combat such
problems, and supervising employees.
Real life example:
Doodle me Diddle
⚫ Electricity board in India have been victims to data
diddling programs inserted when private parties
computerized their systems.
Forgery
⚫ The act of forging something, especially the unlawful
act of counterfeiting a document or object for the
purposes of fraud or deception.
⚫ Something that has been forged, especially a
document that has been copied or remade to look like
the original.
⚫ Counterfeit currency notes, postage, revenue stamps,
marksheets, etc., can be forged using sophisticated
computers, printers and scanners.
Real life case:
⚫ Stamp Paper Scam – a racket that flourished on
loopholes in the system
⚫ Abdul Karim Telgi, the mastermind of the multi-crore
counterfeiting, printed fake stamp papers worth thousands
of crores of rupees using printing machines purchased
illegally with the help of some conniving officials of the
Central Govt.’s Security Printing Press (India Security
Press) located in Nasik. These fake stamp papers
penetrated in more than 12 states through a widespread
network of vendors who sold the counterfeits without any
fear and earned hefty commissions.
⚫ Amount swindled Rs. 172 crores
⚫ Telgi is in jail serving his 13 plus 10 years term
Hacking
Every act committed toward breaking into a computer
and/ or network is hacking.
Purpose
⚫ Greed
⚫ Power
⚫ Publicity
⚫ Revenge
⚫ Adventure
⚫ Desire to access forbidden information
⚫ Destructive mindset
HACKING
Any attempt to intrude into a computer or a network without
authorization is called hacking.

This involves changing of system or security features in a bid to


accomplish a goal that differs from the intended purpose of the
system. It can also refer to non-malicious activities, usually
involving unusual or improvised alterations to equipment or
processes.

An individual who involves themselves in hacking activities is


known as a hacker, and some companies employ hackers as part
of their support staff. These kind of hackers use their skills to find
flaws in the company security system, to prevent identity theft and
other computer-related crimes against the company.
There are various kinds of hackers: the most common
are white hats, black hats and grey hats.

● White hats hack to check their own security systems to make it


more hack-proof. In most cases, they are part of the same
organisation.
● Black hat hackers hack to take control over the system for
personal gains. They destroy, steal and even prevent authorized
users from accessing the system, by finding loopholes and
weaknesses in the system.
● Grey hat hackers comprise curious people who have just about
enough computer language skills to enable them to hack a
system to locate potential loopholes in the network security
system. They then notify the network system admin about the
weaknesses discovered in the system.
cracking
Cracking is when someone performs a security hack for
criminal or malicious reasons,cracking is the practice with
criminal intention.

Cracking is generally less harmful than hacking.

A cracker is someone who breaks into a network; bypasses


passwords or licenses in computer programs; or in other ways
intentionally breaches computer security.

Crackers also act as Black Hats: by gaining access to the


accounts of people maliciously and misusing this information
across networks. They can steal credit card information, they
can destroy important files, disclose crucial data and
information or personal details and sell them for personal
gains.
Hacking vs. Cracking
⚫ Malicious attacks on computer networks are officially
known as cracking ,
⚫ while hacking truly applies only to activities having
good intentions.
⚫ Most non-technical people fail to make this
distinction, however.
⚫ Outside of academia, its extremely common to see the
term "hack" misused and be applied to cracks as well.
E-mail bombing/mail bombs
⚫ In Internet usage, an email bomb is a form of net abuse
consisting of sending huge volumes of email to an
address in an attempt to overflow the mailbox or
overwhelm the server where the email address is
hosted in a denial-of-service attack.
⚫ Construct a computer to repeatedly send E-mail to a
specified person’s E-mail address.
⚫ Can overwhelm the recipient’s personal account and
potentially shut down the entire system.
Pornographic offenses: Child
pornography
⚫ Means any visual depiction, including but not limited
to the following:
1. Any photograph that ca be considered obscene and/
or unsuitable for the age of child viewer.
2. Film ,video, picture;
3. Obscene Computer generated image or picture
How do they Operate
1. Pedophiles use false identity to trap the children/teenagers
2. Pedophiles contact children/teens in various chat rooms which are
used by children/teen to interact with other children/teen.
3. Befriend the child/teen.
4. Extract personal information from the child/teen by winning his
confidence.
5. Gets the e-mail address of the child/teen and starts making contacts
on the victims e-mail address as well.
6. Starts sending pornographic images/text to the victim including
child pornographic images in order to help child/teen shed his
inhibitions so that a feeling is created in the mind of the victim that
what is being fed to him is normal and that everybody does it.
7. Extract personal information from child/teen
8. At the end of it, the pedophile set up a meeting with the child/teen
out of the house and then drag him into the net to further sexually
assault him or to use him as a sex object.
Software piracy
⚫ Theft of software through the illegal copying of
genuine programs or the counterfeiting and
distribution of products intended to pass for the
original.
⚫ End-user copying
⚫ Hard disk loading with illicit means
⚫ Counterfeiting
⚫ Illegal downloads from internet
Buying Pirated software have a lot
to lose:
⚫ Getting untested software that may have been copied
thousands of times.
⚫ Potentially contain hard-ware infecting viruses
⚫ No technical support in case of software failure
⚫ No warranty protection
⚫ No legal right to use the product
Exploit
An exploit is a code that takes advantage of a
software vulnerability or security flaw. It is written
either by security researchers as a proof-of-concept
threat or by malicious actors for use in their
operations. When used, exploits allow an intruder to
remotely access a network and gain elevated
privileges, or move deeper into the network.

In some cases, an exploit can be used as part of a


multi-component attack. Instead of using a malicious
file, the exploit may instead drop another malware,
which can include backdoor Trojans and spyware that
can steal user information from the infected systems.
a cybercrime investigation
a cybercrime investigation is the process of investigating, analyzing
and recovering critical forensic digital data from the networks
involved in the attack—this could be the Internet and/or a local
network—in order to identify the authors of the digital crime and
their true intentions.
Cybercrime investigators must be experts in computer science,
understanding not only software, file systems and operating
systems, but also how networks and hardware work. They must be
knowledgeable enough to determine how the interactions between
these components occur, to get a full picture of what happened, why
it happened, when it happened, who performed the cybercrime itself,
and how victims can protect themselves in the future against these
types of cyber threats.
Intellectual property (IP)
It is a category of property that includes intangible
creations of the human intellect.[1][2] There are many
types of intellectual property, and some countries
recognize more than others.[3][4][5][6][7]

The most well-known types are

Copyrights, Patents, Trademarks, and Trade Secrets


Computer network intrusions
⚫ An intrusion to computer network from any where in
the world and steal data, plant viruses, create
backdoors, insert trojan horse or change passwords
and user names.
⚫ An intrusion detection system (IDS) inspects all
inbound and outbound network activity and identifies
suspicious patterns that may indicate a network or
system attack from someone attempting to break into
or compromise a system.
⚫ The practice of strong password
Password sniffing
⚫ Password sniffers are programs that monitor and
record the name and password of network users as
they login, jeopardizing security at a site.
⚫ through sniffers installed, anyone can impersonate an
authorized user and login to access restricted
documents.
Identity theft
⚫ Identity theft is a fraud involving another person’s identity
for an illicit purpose.
⚫ The criminal uses someone else’s identity for his/ her own
illegal purposes.
⚫ Phishing and identity theft are related offenses
⚫ Examples:
⚫ Fraudulently obtaining credit
⚫ Stealing money from victim’s bank account
⚫ Using victim’s credit card number
⚫ Establishing accounts with utility companies
⚫ Renting an apartment
⚫ Filing bankruptcy using the victim’s name
Real life cases
⚫ Dr. Gerald Barnes
Gerald Barnbaum lost his pharmacist license after committing
Medicaid fraud. He stole the identity of Dr. Gerald Barnes and
practiced medicine under his name. A type 1 diabetic died under
his care. “Dr. Barnes” even worked as a staff physician for a
center that gave exams to FBI agents. He’s currently serving hard
time.
⚫ Andrea Harris-Frazier
Margot Somerville lost her wallet on a trolley. Two years later she
was arrested. Andrea Harris-Frazier had defrauded several
banks—using Somerville’s identity—out of tens of thousands of
dollars. The real crook was caught.
⚫ Abraham Abdallah
A busboy named Abraham Abdallah got into the bank accounts
of Steven Spielberg and other famous people after tricking his
victims via computer, getting sufficient data to fake being their
financial advisors—then calling their banks…and you know the
Cybercrime:
the legal perspective
⚫ Cybercrime possess a mammoth challenge
⚫ Computer crime: Criminal Justice Resource
Manual(1979)
⚫ Any illegal act for which knowledge of computer
technology is essential for a successful prosecution.
⚫ International legal aspects of computer crimes were
studied in 1983
⚫ Encompasses any illegal act for which the knowledge of
computer technology is essential for its prepetration
Cybercrime:
the legal perspective
⚫ The network context of cyber crime make it one of the
most globalized offenses of the present and most
modernized threats of the future.
⚫ Solution:
⚫ Divide information system into segments bordered by
state boundaries.
⚫ Not possible and unrealistic because of globalization
⚫ Or incorporate the legal system into an integrated entity
obliterating these state boundaries.
Cybercrimes: An Indian Perspective
⚫ India has the fourth highest number of internet users
in the world.
⚫ 45 million internet users in India
⚫ 37% - in cybercafes
⚫ 57% are between 18 and 35 years
⚫ The Information Technology (IT) Act, 2000, specifies
the acts which are punishable. Since the primary
objective of this Act is to create an enabling
environment for commercial use of I.T.
Cybercrimes: An Indian Perspective
⚫ 217 cases were registered under IT Act during the year
2007 as compared to 142 cases during the previous year
(2006)
⚫ Thereby reporting an increase of 52.8% in 2007 over
2006.
⚫ 22.3% cases (49out of 217 cases) were reported from
Maharashtra followed by Karnataka (40), Kerala (38)
and Andhra Pradesh and Rajasthan (16 each).
Cybercrimes: An Indian Perspective
Incidence of Cyber Crimes in
Cities
⚫ 17 out of 35 mega cities did not report any case of Cyber Crime
i.e, neither under the IT Act nor under IPC Sections) during the
year 2007.
⚫ 17 mega cities have reported 118 cases under IT Act and 7
megacities reported 180 cases undervarious section of IPC.
⚫ There was an increase of 32.6% (from 89 cases in 2006 to 118
cases in 2007) in cases under IT Act as compared to previous
year (2006),
⚫ and an increase of 26.8% (from 142 cases in 2006 to 180 cases in
2007) of cases registered under various section of IPC
⚫ Bengaluru (40), Pune (14) and Delhi (10) cities have reported
high incidence of cases (64 out of 118 cases) registered under IT
Act, accounting for more than half of the cases (54.2%) reported
under the Act.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy