尊敬的 微信汇率:1円 ≈ 0.046078 元 支付宝汇率:1円 ≈ 0.046168元 [退出登录]
SlideShare a Scribd company logo
B Y D R M O H A M M A D Z U N N U N K H A N
Cyber Crime
Cyber Crime
 Cyber Crime is the use of computers and other electronic devices and
Internet by criminals to execute fraud and other crimes against
companies, consumers and other individuals.
 It is a broad term which is used to describe criminal activity committed
on computers or on the internet.
Definition And Nature of Cyber Crime
 A General definition of cyber-crime may be ―unlawful act wherein the consumer is
used, either as a tool or a target or both.
 Any criminal activity that uses a computer either as an instrumentality, target or a
means for enabling further crimes comes within the ambit of cyber-crimes.
The Internet is fast changing the lifestyle of every individuals whether be it students,
teachers, businessmen, doctors, lawyers, engineers, etc.
 It is becoming a way of life for millions of people. With this, the criminals are also not
lagging behind.
 Their area of operation has also widened with such technological progress.
 There are difficulties in providing a description of cybercrimes, as there is no uniform or
universally accepted definition of cybercrime.
 It is used as an umbrella term for a set of activities that have yet to be incorporated fully
into the national legal regimes around the world and is used interchangeably with
―computer crimes ―computer misuse, or ―IT crimes
 Despite the frequent use of the term, there is no commonly accepted definition.
 Cybercrimes is related to computers, however, there is no consensus on whether
those computers have to be interconnected or not.
a. The UN Manual on the Prevention and Control of Computer- Related
Crimes:
―Computer crime can involve activities that are traditional in nature, such as
theft, fraud, forgery and mischief, all of which are generally subject everywhere to
criminal sanctions. The computer has also created a host of potentially new misuses
or abuses that may, or should be criminal as well‖
b. UK National Criminal Intelligence Service:
―An offence in which a computer is directly and significantly instrumental in the
commission of the crime
c. Pavan Duggal
Cyber Crime refers to all the activities done with criminal intent in cyberspace or
using the medium of internet. These could either the criminal activities in the
conventional sense or activities, newly evolved with the growth of the new medium.
Any activity, which basically offends human sensibilities, can be included in the
ambit of cybercrimes.
 Difference Between Cyber Crime And Conventional
Crime
1. Cyber Crimes always involve use of computers and
technology.
2. Cyber Crimes can be committed in the jurisdiction without the
criminal being physically present in it, i.e. it knows no
geographical limitations, boundaries or distances.
3. Cyber Crimes is not always clearly illegal as compared to
conventional crimes. This is because of lack of law punishing
them.
4. It requires only small resources as compared to the resultant
damage caused by the commission of the crime.
 Punishments And Offences
The main aim of the act is to legalize the digital language so that
people can easily and without fear use the electronic devices for
their own purposes like doing business or for entertainment. It
prescribes certain offences and penalties to keep a check on the
cyber crime, the main of them are:
· Section 65: Tampering with Computer Source Documents
· Section 66: Hacking with Computer System
· Section 67: Publishing of obscene information which is obscene
in electronic form.
· Section 70: breach of confidentially and privacy.
 In addition to above, Section 77 of the Act states that “No penalty
imposed or confiscation made under this Act shall prevent the
imposition of any other punishment to which the person affected
thereby is liable under any other law for the time being in force.”
which means the civil crimes can also be made as Criminal Act, as
· Computer Network Breaking and Hacking: - S. 66(2) of I.T. Act
and S. 441 of IPC
· Child Pornography: - S. 67 of I.T. Act and S. 294 of IPC
· Email- bombing: - S. 43(e) of I.T. Act and S. 425-441 read with
S447 of IPC
· Password Sniffing: - S. 43(a), (g) of I.T. Act and S. 419 of IPC
· Credit Card Fraud: - I.T. Act and S. 443 (a) and (g) read with
426, 427 and 447 of IPC.
 Thank You… wait for next lecture.

More Related Content

What's hot

Cpc
CpcCpc
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
Adv Prashant Mali
 
Concept and object of limitation
Concept and object of limitationConcept and object of limitation
Concept and object of limitation
MADHUBALA SOLANKI
 
Copyright: Law of Copyrights and Infringement / A Presentation at NALSAR Hyde...
Copyright: Law of Copyrights and Infringement / A Presentation at NALSAR Hyde...Copyright: Law of Copyrights and Infringement / A Presentation at NALSAR Hyde...
Copyright: Law of Copyrights and Infringement / A Presentation at NALSAR Hyde...
BananaIP Counsels
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
PAYAL SINHA
 
Theories of corporate personality
Theories of corporate personality Theories of corporate personality
Theories of corporate personality
Nitish Nawsagaray
 
copyright (under indian cyber law)
copyright (under indian cyber law)copyright (under indian cyber law)
copyright (under indian cyber law)
ravindra sharma
 
Foreign Courts & Foreign Judgements under Civil Procedure Code in India.
Foreign Courts & Foreign Judgements under Civil Procedure Code in India.Foreign Courts & Foreign Judgements under Civil Procedure Code in India.
Foreign Courts & Foreign Judgements under Civil Procedure Code in India.
Sameer Rastogi
 
Scope & Objectives of IT Act 2000.pptx
Scope & Objectives of IT Act 2000.pptxScope & Objectives of IT Act 2000.pptx
Scope & Objectives of IT Act 2000.pptx
PokemonOriginals
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspace
Panjab University
 
UNCITRAL_BY_AVINASH_MURKUTE
UNCITRAL_BY_AVINASH_MURKUTEUNCITRAL_BY_AVINASH_MURKUTE
UNCITRAL_BY_AVINASH_MURKUTE
Galaxy4u Legal Consulting Pune
 
Copyright board
Copyright boardCopyright board
Copyright board
Altacit Global
 
Human rights 5th sem- Regional Conventions of HR; NHRC & SHRC
Human rights 5th sem- Regional Conventions of HR; NHRC & SHRCHuman rights 5th sem- Regional Conventions of HR; NHRC & SHRC
Human rights 5th sem- Regional Conventions of HR; NHRC & SHRC
Dr. SMITA SATAPATHY
 
Difference between vested and contingent interest
Difference between vested and contingent interestDifference between vested and contingent interest
Difference between vested and contingent interest
Gagan
 
Adversarial and inquisitorial_systems_2
Adversarial and inquisitorial_systems_2Adversarial and inquisitorial_systems_2
Adversarial and inquisitorial_systems_2
G. KRISHNASWAMY
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Dr. Prashant Vats
 
Introduction of ICT and legal research :
Introduction of ICT and legal research :Introduction of ICT and legal research :
Introduction of ICT and legal research :
Bharati Vidyapeeth New Law College,Pune
 
Jurisdiction and Immunities of the Sovereign
Jurisdiction and Immunities of the SovereignJurisdiction and Immunities of the Sovereign
Jurisdiction and Immunities of the Sovereign
carolineelias239
 
hierarchy of criminal Courts in india
hierarchy of criminal Courts in india hierarchy of criminal Courts in india
hierarchy of criminal Courts in india
gagan deep
 
INDIAN CIVIL PROCEDURE CODE
INDIAN CIVIL PROCEDURE CODEINDIAN CIVIL PROCEDURE CODE

What's hot (20)

Cpc
CpcCpc
Cpc
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Concept and object of limitation
Concept and object of limitationConcept and object of limitation
Concept and object of limitation
 
Copyright: Law of Copyrights and Infringement / A Presentation at NALSAR Hyde...
Copyright: Law of Copyrights and Infringement / A Presentation at NALSAR Hyde...Copyright: Law of Copyrights and Infringement / A Presentation at NALSAR Hyde...
Copyright: Law of Copyrights and Infringement / A Presentation at NALSAR Hyde...
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Theories of corporate personality
Theories of corporate personality Theories of corporate personality
Theories of corporate personality
 
copyright (under indian cyber law)
copyright (under indian cyber law)copyright (under indian cyber law)
copyright (under indian cyber law)
 
Foreign Courts & Foreign Judgements under Civil Procedure Code in India.
Foreign Courts & Foreign Judgements under Civil Procedure Code in India.Foreign Courts & Foreign Judgements under Civil Procedure Code in India.
Foreign Courts & Foreign Judgements under Civil Procedure Code in India.
 
Scope & Objectives of IT Act 2000.pptx
Scope & Objectives of IT Act 2000.pptxScope & Objectives of IT Act 2000.pptx
Scope & Objectives of IT Act 2000.pptx
 
trademark issues in cyberspace
 trademark issues in cyberspace trademark issues in cyberspace
trademark issues in cyberspace
 
UNCITRAL_BY_AVINASH_MURKUTE
UNCITRAL_BY_AVINASH_MURKUTEUNCITRAL_BY_AVINASH_MURKUTE
UNCITRAL_BY_AVINASH_MURKUTE
 
Copyright board
Copyright boardCopyright board
Copyright board
 
Human rights 5th sem- Regional Conventions of HR; NHRC & SHRC
Human rights 5th sem- Regional Conventions of HR; NHRC & SHRCHuman rights 5th sem- Regional Conventions of HR; NHRC & SHRC
Human rights 5th sem- Regional Conventions of HR; NHRC & SHRC
 
Difference between vested and contingent interest
Difference between vested and contingent interestDifference between vested and contingent interest
Difference between vested and contingent interest
 
Adversarial and inquisitorial_systems_2
Adversarial and inquisitorial_systems_2Adversarial and inquisitorial_systems_2
Adversarial and inquisitorial_systems_2
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
 
Introduction of ICT and legal research :
Introduction of ICT and legal research :Introduction of ICT and legal research :
Introduction of ICT and legal research :
 
Jurisdiction and Immunities of the Sovereign
Jurisdiction and Immunities of the SovereignJurisdiction and Immunities of the Sovereign
Jurisdiction and Immunities of the Sovereign
 
hierarchy of criminal Courts in india
hierarchy of criminal Courts in india hierarchy of criminal Courts in india
hierarchy of criminal Courts in india
 
INDIAN CIVIL PROCEDURE CODE
INDIAN CIVIL PROCEDURE CODEINDIAN CIVIL PROCEDURE CODE
INDIAN CIVIL PROCEDURE CODE
 

Similar to Cyber crime

Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
Vishni Ganepola
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Cyber crimeCyber crime
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
JIEMS Akkalkuwa
 
It security & crimes
It security & crimesIt security & crimes
It security & crimes
leodgard erasmus
 
Cyber Crimes.pdf
Cyber Crimes.pdfCyber Crimes.pdf
Cyber Crimes.pdf
SunilSaklani6
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
poulterbarbara
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
gertrudebellgrove
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
adkinspaige22
 
Cyber crime 4th may,2018
Cyber crime 4th may,2018Cyber crime 4th may,2018
Cyber crime 4th may,2018
senguptasouvik99
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
drennanmicah
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
alisondakintxt
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
ParasSehgal12
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
ijfcstjournal
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
ijfcstjournal
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
MehediHasan996
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
Talwant Singh
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
ijcisjournal
 

Similar to Cyber crime (20)

Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 
It security & crimes
It security & crimesIt security & crimes
It security & crimes
 
Cyber Crimes.pdf
Cyber Crimes.pdfCyber Crimes.pdf
Cyber Crimes.pdf
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 
Cyber crime 4th may,2018
Cyber crime 4th may,2018Cyber crime 4th may,2018
Cyber crime 4th may,2018
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0 Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 

More from Integral university, India

Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
Integral university, India
 
Cloud resilience, provisioning
Cloud resilience, provisioning Cloud resilience, provisioning
Cloud resilience, provisioning
Integral university, India
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
Integral university, India
 
Unit4 next
Unit4 nextUnit4 next
U nit 4
U nit 4U nit 4
Unit4 cry
Unit4 cryUnit4 cry
Unit4
Unit4Unit4
Unit5
Unit5Unit5
Unit5 Cloud Federation,
Unit5 Cloud Federation,Unit5 Cloud Federation,
Unit5 Cloud Federation,
Integral university, India
 
Unit3 MapReduce
Unit3 MapReduceUnit3 MapReduce
cloud Resilience
cloud Resilience cloud Resilience
cloud Resilience
Integral university, India
 
Software Security
Software SecuritySoftware Security
Software Security
Integral university, India
 
Block Level and File Level
Block Level and File LevelBlock Level and File Level
Block Level and File Level
Integral university, India
 
Software Security
Software SecuritySoftware Security
Software Security
Integral university, India
 
Security threats
Security threatsSecurity threats
Security threats
Integral university, India
 
Virtualization concepts in cloud computing
Virtualization concepts in cloud computingVirtualization concepts in cloud computing
Virtualization concepts in cloud computing
Integral university, India
 

More from Integral university, India (16)

Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
Cloud resilience, provisioning
Cloud resilience, provisioning Cloud resilience, provisioning
Cloud resilience, provisioning
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 
Unit4 next
Unit4 nextUnit4 next
Unit4 next
 
U nit 4
U nit 4U nit 4
U nit 4
 
Unit4 cry
Unit4 cryUnit4 cry
Unit4 cry
 
Unit4
Unit4Unit4
Unit4
 
Unit5
Unit5Unit5
Unit5
 
Unit5 Cloud Federation,
Unit5 Cloud Federation,Unit5 Cloud Federation,
Unit5 Cloud Federation,
 
Unit3 MapReduce
Unit3 MapReduceUnit3 MapReduce
Unit3 MapReduce
 
cloud Resilience
cloud Resilience cloud Resilience
cloud Resilience
 
Software Security
Software SecuritySoftware Security
Software Security
 
Block Level and File Level
Block Level and File LevelBlock Level and File Level
Block Level and File Level
 
Software Security
Software SecuritySoftware Security
Software Security
 
Security threats
Security threatsSecurity threats
Security threats
 
Virtualization concepts in cloud computing
Virtualization concepts in cloud computingVirtualization concepts in cloud computing
Virtualization concepts in cloud computing
 

Recently uploaded

Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
Kieran Kunhya
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Database Management Myths for Developers
Database Management Myths for DevelopersDatabase Management Myths for Developers
Database Management Myths for Developers
John Sterrett
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
Enterprise Knowledge
 
Chapter 6 - Test Tools Considerations V4.0
Chapter 6 - Test Tools Considerations V4.0Chapter 6 - Test Tools Considerations V4.0
Chapter 6 - Test Tools Considerations V4.0
Neeraj Kumar Singh
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
ThousandEyes
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
Brightwell ILC Futures workshop David Sinclair presentation
Brightwell ILC Futures workshop David Sinclair presentationBrightwell ILC Futures workshop David Sinclair presentation
Brightwell ILC Futures workshop David Sinclair presentation
ILC- UK
 
EverHost AI Review: Empowering Websites with Limitless Possibilities through ...
EverHost AI Review: Empowering Websites with Limitless Possibilities through ...EverHost AI Review: Empowering Websites with Limitless Possibilities through ...
EverHost AI Review: Empowering Websites with Limitless Possibilities through ...
SOFTTECHHUB
 
Supplier Sourcing Presentation - Gay De La Cruz.pdf
Supplier Sourcing Presentation - Gay De La Cruz.pdfSupplier Sourcing Presentation - Gay De La Cruz.pdf
Supplier Sourcing Presentation - Gay De La Cruz.pdf
gaydlc2513
 
Corporate Open Source Anti-Patterns: A Decade Later
Corporate Open Source Anti-Patterns: A Decade LaterCorporate Open Source Anti-Patterns: A Decade Later
Corporate Open Source Anti-Patterns: A Decade Later
ScyllaDB
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
DianaGray10
 
Leveraging AI for Software Developer Productivity.pptx
Leveraging AI for Software Developer Productivity.pptxLeveraging AI for Software Developer Productivity.pptx
Leveraging AI for Software Developer Productivity.pptx
petabridge
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Getting Started Using the National Research Platform
Getting Started Using the National Research PlatformGetting Started Using the National Research Platform
Getting Started Using the National Research Platform
Larry Smarr
 
An Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise IntegrationAn Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise Integration
Safe Software
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
ScyllaDB
 
Move Auth, Policy, and Resilience to the Platform
Move Auth, Policy, and Resilience to the PlatformMove Auth, Policy, and Resilience to the Platform
Move Auth, Policy, and Resilience to the Platform
Christian Posta
 

Recently uploaded (20)

Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 
Multivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back againMultivendor cloud production with VSF TR-11 - there and back again
Multivendor cloud production with VSF TR-11 - there and back again
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Database Management Myths for Developers
Database Management Myths for DevelopersDatabase Management Myths for Developers
Database Management Myths for Developers
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Building a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data PlatformBuilding a Semantic Layer of your Data Platform
Building a Semantic Layer of your Data Platform
 
Chapter 6 - Test Tools Considerations V4.0
Chapter 6 - Test Tools Considerations V4.0Chapter 6 - Test Tools Considerations V4.0
Chapter 6 - Test Tools Considerations V4.0
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
 
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to SuccessDynamoDB to ScyllaDB: Technical Comparison and the Path to Success
DynamoDB to ScyllaDB: Technical Comparison and the Path to Success
 
Brightwell ILC Futures workshop David Sinclair presentation
Brightwell ILC Futures workshop David Sinclair presentationBrightwell ILC Futures workshop David Sinclair presentation
Brightwell ILC Futures workshop David Sinclair presentation
 
EverHost AI Review: Empowering Websites with Limitless Possibilities through ...
EverHost AI Review: Empowering Websites with Limitless Possibilities through ...EverHost AI Review: Empowering Websites with Limitless Possibilities through ...
EverHost AI Review: Empowering Websites with Limitless Possibilities through ...
 
Supplier Sourcing Presentation - Gay De La Cruz.pdf
Supplier Sourcing Presentation - Gay De La Cruz.pdfSupplier Sourcing Presentation - Gay De La Cruz.pdf
Supplier Sourcing Presentation - Gay De La Cruz.pdf
 
Corporate Open Source Anti-Patterns: A Decade Later
Corporate Open Source Anti-Patterns: A Decade LaterCorporate Open Source Anti-Patterns: A Decade Later
Corporate Open Source Anti-Patterns: A Decade Later
 
Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2Communications Mining Series - Zero to Hero - Session 2
Communications Mining Series - Zero to Hero - Session 2
 
Leveraging AI for Software Developer Productivity.pptx
Leveraging AI for Software Developer Productivity.pptxLeveraging AI for Software Developer Productivity.pptx
Leveraging AI for Software Developer Productivity.pptx
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Getting Started Using the National Research Platform
Getting Started Using the National Research PlatformGetting Started Using the National Research Platform
Getting Started Using the National Research Platform
 
An Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise IntegrationAn Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise Integration
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
 
Move Auth, Policy, and Resilience to the Platform
Move Auth, Policy, and Resilience to the PlatformMove Auth, Policy, and Resilience to the Platform
Move Auth, Policy, and Resilience to the Platform
 

Cyber crime

  • 1. B Y D R M O H A M M A D Z U N N U N K H A N Cyber Crime
  • 2. Cyber Crime  Cyber Crime is the use of computers and other electronic devices and Internet by criminals to execute fraud and other crimes against companies, consumers and other individuals.  It is a broad term which is used to describe criminal activity committed on computers or on the internet.
  • 3. Definition And Nature of Cyber Crime  A General definition of cyber-crime may be ―unlawful act wherein the consumer is used, either as a tool or a target or both.  Any criminal activity that uses a computer either as an instrumentality, target or a means for enabling further crimes comes within the ambit of cyber-crimes. The Internet is fast changing the lifestyle of every individuals whether be it students, teachers, businessmen, doctors, lawyers, engineers, etc.  It is becoming a way of life for millions of people. With this, the criminals are also not lagging behind.  Their area of operation has also widened with such technological progress.  There are difficulties in providing a description of cybercrimes, as there is no uniform or universally accepted definition of cybercrime.  It is used as an umbrella term for a set of activities that have yet to be incorporated fully into the national legal regimes around the world and is used interchangeably with ―computer crimes ―computer misuse, or ―IT crimes
  • 4.  Despite the frequent use of the term, there is no commonly accepted definition.  Cybercrimes is related to computers, however, there is no consensus on whether those computers have to be interconnected or not. a. The UN Manual on the Prevention and Control of Computer- Related Crimes: ―Computer crime can involve activities that are traditional in nature, such as theft, fraud, forgery and mischief, all of which are generally subject everywhere to criminal sanctions. The computer has also created a host of potentially new misuses or abuses that may, or should be criminal as well‖ b. UK National Criminal Intelligence Service: ―An offence in which a computer is directly and significantly instrumental in the commission of the crime c. Pavan Duggal Cyber Crime refers to all the activities done with criminal intent in cyberspace or using the medium of internet. These could either the criminal activities in the conventional sense or activities, newly evolved with the growth of the new medium. Any activity, which basically offends human sensibilities, can be included in the ambit of cybercrimes.
  • 5.  Difference Between Cyber Crime And Conventional Crime 1. Cyber Crimes always involve use of computers and technology. 2. Cyber Crimes can be committed in the jurisdiction without the criminal being physically present in it, i.e. it knows no geographical limitations, boundaries or distances. 3. Cyber Crimes is not always clearly illegal as compared to conventional crimes. This is because of lack of law punishing them. 4. It requires only small resources as compared to the resultant damage caused by the commission of the crime.
  • 6.  Punishments And Offences The main aim of the act is to legalize the digital language so that people can easily and without fear use the electronic devices for their own purposes like doing business or for entertainment. It prescribes certain offences and penalties to keep a check on the cyber crime, the main of them are: · Section 65: Tampering with Computer Source Documents · Section 66: Hacking with Computer System · Section 67: Publishing of obscene information which is obscene in electronic form. · Section 70: breach of confidentially and privacy.
  • 7.  In addition to above, Section 77 of the Act states that “No penalty imposed or confiscation made under this Act shall prevent the imposition of any other punishment to which the person affected thereby is liable under any other law for the time being in force.” which means the civil crimes can also be made as Criminal Act, as · Computer Network Breaking and Hacking: - S. 66(2) of I.T. Act and S. 441 of IPC · Child Pornography: - S. 67 of I.T. Act and S. 294 of IPC · Email- bombing: - S. 43(e) of I.T. Act and S. 425-441 read with S447 of IPC · Password Sniffing: - S. 43(a), (g) of I.T. Act and S. 419 of IPC · Credit Card Fraud: - I.T. Act and S. 443 (a) and (g) read with 426, 427 and 447 of IPC.
  • 8.  Thank You… wait for next lecture.
  翻译: