traditional crime vs cyber crime

15
TRADITIONAL CRIME VS CYBER CRIME TEAM MEMBERS : SANTOSH CHIPPA 69 DIVYA DAVE 72 BHAGYASHREE HAMAND 78 VIKAS SARNOBAT 102 SWAPNIL TURAKANE 117

Upload: bhagyashree-hamand

Post on 24-Oct-2014

47 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Traditional Crime vs Cyber Crime

TRADITIONAL CRIME VS CYBER CRIME

TEAM MEMBERS:

SANTOSH CHIPPA 69DIVYA DAVE 72BHAGYASHREE HAMAND 78VIKAS SARNOBAT 102SWAPNIL TURAKANE 117

Page 2: Traditional Crime vs Cyber Crime

WHAT IS CRIME? Crime is an integral part of the risks we face in

everyday life.

In both scholarly and public opinion crime is associated with harm and violence; harm to individuals, destruction of property, and the denial of respect to people and institutions.

Crime is an act forbidden by law and which is at the same time revolting to the moral sentiments of the society.

Page 3: Traditional Crime vs Cyber Crime

TRADITIONAL CRIME

Those acts upon which criminal justice agencies have typically focused their energies- such as interpersonal violence, theft, burglary, the use and distribution of illegal substances, public order offences, and so on; also frequently referred to as ‘conventional’ crime.

Page 4: Traditional Crime vs Cyber Crime

TRADITIONAL CRIME

Types of Traditional Crimes:1) Recorded property crimes2) Rape and Assaults3) Robberies4) Kidnapping5) Murder or attempt to murder6) Smuggling

Page 5: Traditional Crime vs Cyber Crime

CYBER CRIME

Criminal activities which take place in ‘virtual’ space using networked technologies. They cut across national boundaries, which has implications for law enforcement and punishment.

Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code.

The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.

We can categorize Cyber crimes in two ways:

1) The Computer as a Target :- using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc.

2) The computer as a weapon :- using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography.

Page 6: Traditional Crime vs Cyber Crime

TYPES OF CYBER CRIME

1) Unauthorized access & Hacking: Access means gaining entry into, instructing or

communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network.

Every act committed towards breaking into a computer and/or network is hacking.

2)  Trojan Attack: The program that act like something useful but do the

things that are quiet damping. The programs of this kind are called as Trojans.

Page 7: Traditional Crime vs Cyber Crime

TYPES OF CYBER CRIME

 3) Email spoofing: Email spoofing refers to email that appears to have been

originated from one source when it was actually sent from

another source.4)  Email Spamming: Email "spamming" refers to sending email to thousands and

thousands of users - similar to a chain letter.

5) Sending malicious codes through email: E-mails are used to send viruses, Trojans etc through emails

as an attachment or by sending a link of website which on visiting downloads malicious code.

Page 8: Traditional Crime vs Cyber Crime

TYPES OF CYBER CRIME

6) Denial of Service attacks: Flooding a computer resource with more requests than it can

handle. This causes the resource to crash thereby denying access of

service to authorized users.

7) Pornography: This would include pornographic websites; pornographic material

produced using computers and use of internet to download and transmit pornographic videos, pictures, photos, writings etc.

8)  Forgery: Counterfeit currency notes, postage and revenue stamps, mark

sheets etc can be forged using sophisticated computers, printers and scanners.

Page 9: Traditional Crime vs Cyber Crime

TYPES OF CYBER CRIME9) Cyber Stacking: Cyber stalking involves following a persons movements across

the Internet.

10)  Defamation: Defamation can be understood as the intentional infringement of

another person's right to his good name.

11) Banking/Credit card Related crimes: Internet hackers look for opportunities to compromise a

company’s security in order to gain access to confidential banking and financial information.

12)  IPR Violations: These include software piracy, copyright infringement,

trademarks violations, theft of computer source code, patent violations. etc.

Page 10: Traditional Crime vs Cyber Crime

CYBER CRIME CASES IN INDIA

OFFICIAL WEBSITE OF MAHARASTRA GOVERNMENT HACKED

IT experts were trying to restore the official website of the government of Maharashtra, which was hacked.

ACCUSESD IN RS 400 MILLION SMS SCAM ARRESTED IN MUMBAI

The alleged mastermind behind a Rs 400 million SMS fraud that duped at least 50,000 people has been arrested along with an associate more than two months after the scam was unearthed.

Page 11: Traditional Crime vs Cyber Crime

CYBER CRIME CASES IN INDIA UTI BANK HOOKED UP IN A PISHING

ATTACK

Fraudsters of cyberspace had reared its ugly head, the first of its kind, by launching a phishing attack on the website of Ahmadabad-based UTI Bank, a leading private bank promoted by India' s largest financial institution, Unit Trust of India (UTI). 

ONLINE CREDIT CARD FRAUD ON E-BAY

 Rourkela police busted a racket involving an online fraud worth Rs 12.5 lakh. The modus operandi of the accused was to hack into the eBay India website and make purchases in the names of credit cardholders.

Page 12: Traditional Crime vs Cyber Crime

THE INFORMATION TECHNOLOGY ACT, 2000

This Act aims to provide the legal infrastructure for e-commerce and e-business in India

The IT Act attempts to change outdated laws and provides ways to deal with cyber crimes

The Act offers the much-needed legal framework so that information is not denied legal effect

Page 13: Traditional Crime vs Cyber Crime

SAFETY TIPS

Are you a safe cyber surfer ?

Take a test before opening e-mail attachment

Protect your personal computer

Use Strong Password

Page 14: Traditional Crime vs Cyber Crime

SOURCE

http://www.oup.com/uk/orc/bin/9780199227297/01student/glossary/online/

http://cyberlawsindia.net/

Page 15: Traditional Crime vs Cyber Crime