SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Cyber Laws
& Cyber
Crimes
-
B.V.Raghunandan
Rosario College,
Mangalore
Feb 21, 2015
Cybercrime- a Definition
• "Offences that are committed
against individuals or groups of
individuals with a criminal motive
to intentionally harm the
reputation of the victim or cause
physical or mental harm to the
victim directly or indirectly, using
modern telecommunication
networks such as Internet (Chat
rooms, emails, notice boards and
groups) and mobile phones
(SMS/MMS)“
- Dr. Debarati Halder and Dr.
K. Jaishankar.
A Broader Definition
• A cyber crime is an
offence punishable
under law committed
using computer,
internet, or any
electronic mobile
device in which the
computer, internet or
the device is a tool or
the target
Cyber Offences
• Offences attracting penal
action and committed using
1) Computers-Computer
Crime
2) Internet - Internet Crimes
3) Mobile Phones/ Mobile
Devices-Mobile Crimes
Perpetrators/Victims
• Individuals
• Groups of Individuals
• Companies
• Drug Traffic Gangs
• Governments
Individuals: Motives
• Proving Smartness
• Sadistic in Nature
• Stealing Money
• Vengeance
• Power
• For Excitement
• Learning Exercise
• Service Providers
• Fantasies
• Publicity
Groups of Individuals
• Peddlers of Pornography
• Party Affiliation
• Caste Hatred
• Social/Environmental
Groups
• Rebel Groups in Small
Countries
• Regional Hatred
Companies
• Computer Manufacturing Companies
• Software Companies
• Industrial Espionage
• Bidding Companies
• Cos Seeking Access to Government Records
• Companies providing Anti-Virus Software
• Defence Industries
Drug Traffic Gangs: Motive
• Securing Data of Potential Customers
• Hacking into the systems of their
distributors
• Gaining access to systems of police
and intelligence establishments
• Access to government sites
• Entry into logistics providers
Governments
• Developing cyber warfare
• Spying into the systems of enemy
countries
• International Policing by the USA
• Police Establishments
• Intelligence Establishments
• Military Intelligence
• Personal Interests of People in
power
Types of Cybercrimes
• Financial Crime
• Data Theft
• Copyright Infringement
• Cyber Terrorism
• Computer
Vandalism
• Child
Grooming/Pornog
raphy
• Cyber Warfare
• Cyber Stalking
• Cyber Suicides
• Identity Theft
• Drug Trafficking
• Active
Attack/Passive
Attack
• Cyber Terrorism
• Computer
Vandalism
Techniques of Cyber Crimes
• Wired/Wireless Tapping
• Hacking
• Phishing
• Spoofing/Masquerading
• Social Engineering
• Software Piracy
• Trap Doors/Back Doors • Malware:
1) Viruses
2) Worms
3) Trojan Horses
4) Spyware
Characteristics of Cyber Crimes
• Policeman and thief are
the same
• Perpetrators and victims
are the people
• Each programme can be
used positively or
negatively
• Perpetrators are young
within the age of 16-26
• Huge Profits made
effortlessly
• Reckless Criminals
• Total Ignorance of Cyber
Crime and Laws
• Widespread Opposition to
Cyberlaws
Cyber- laws in India
• Information Technology Act, 2000
• Information Technology Amendment Act, 2008
• Information Technology Rules, 2011
Contributions of the Act
• Providing for Digital Signature
• Creating E’Governance
• Compliance by Companies receiving, storing, or
transmitting data of others
• Creation of Controllers and Certifying Authorities
• Establishment of Cyber Appellate Tribunal
• Offences and Penalties
Offences and
Penalties
1) Non-Compliance-7 years imprisonment
2) Damage to Computer/Systems-Compensation by the
offender
3) Tampering with Source Documents-Sec 65-3 years of
imprisonment/Rs. 2 lakh/both
4) Sending Offensive Messages-Sec 66-3 Years with fine
5) Identity Theft-3 years/plus Rs. 2 lakh
Offences & Penalties-continued
• Cheating by personation
• Violation of privacy
• Cyber terrorism
• Publishing or transmitting obscene material
• Depicting children in sexually explicit form
Future
Agenda
• Educating the Society
• Anti-Piracy Movement
• Discouraging Offences by parents, teachers,
employers etc
• No concealment of offences
• Exposure to Consequences of offences
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Montilla K32 - DEEP WEB
Montilla K32 - DEEP WEBMontilla K32 - DEEP WEB
Montilla K32 - DEEP WEBPoch Montilla
 
Lim Jus394 Sea Censorship
Lim Jus394 Sea CensorshipLim Jus394 Sea Censorship
Lim Jus394 Sea Censorshipmerlyna
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianDamar Juniarto
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Zohaib Arshid
 
Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology AlyssaSingleterry
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime008_Anuj
 
Digital law
Digital lawDigital law
Digital lawmakylahh
 
Digital law
Digital lawDigital law
Digital lawCAQUES01
 
Cybercrime | IT Secutiry
Cybercrime | IT SecutiryCybercrime | IT Secutiry
Cybercrime | IT SecutiryGranthamEdu
 
Cyber space & critical information infrastructure
Cyber space & critical information infrastructureCyber space & critical information infrastructure
Cyber space & critical information infrastructureNarayan Joshi
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
A brief look at Cyber security
A brief look at Cyber securityA brief look at Cyber security
A brief look at Cyber securityNabarun Sarkar
 
Digital rights & responsibilities
Digital rights & responsibilitiesDigital rights & responsibilities
Digital rights & responsibilitiesZachmclovin16
 

Was ist angesagt? (20)

Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
Digital law
Digital lawDigital law
Digital law
 
Montilla K32 - DEEP WEB
Montilla K32 - DEEP WEBMontilla K32 - DEEP WEB
Montilla K32 - DEEP WEB
 
Lim Jus394 Sea Censorship
Lim Jus394 Sea CensorshipLim Jus394 Sea Censorship
Lim Jus394 Sea Censorship
 
At The Brink of Digital Authoritarian
At The Brink of Digital AuthoritarianAt The Brink of Digital Authoritarian
At The Brink of Digital Authoritarian
 
Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016 Analysis of cyber crime bill 2016
Analysis of cyber crime bill 2016
 
Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology
 
A Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information TechnologyA Case Study on Issues and Violations on Information Technology
A Case Study on Issues and Violations on Information Technology
 
Digital law
Digital lawDigital law
Digital law
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Cybercrime | IT Secutiry
Cybercrime | IT SecutiryCybercrime | IT Secutiry
Cybercrime | IT Secutiry
 
Cyber space & critical information infrastructure
Cyber space & critical information infrastructureCyber space & critical information infrastructure
Cyber space & critical information infrastructure
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
A brief look at Cyber security
A brief look at Cyber securityA brief look at Cyber security
A brief look at Cyber security
 
cybercrime landscape for moldova
cybercrime landscape for moldovacybercrime landscape for moldova
cybercrime landscape for moldova
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Digital rights & responsibilities
Digital rights & responsibilitiesDigital rights & responsibilities
Digital rights & responsibilities
 

Andere mochten auch

Right to information and consumer protection act
Right to information and consumer protection actRight to information and consumer protection act
Right to information and consumer protection actSonia Verma
 
Monograph Psychospiritual Foundation Of Personality Disorders 2009
Monograph  Psychospiritual Foundation Of Personality Disorders 2009Monograph  Psychospiritual Foundation Of Personality Disorders 2009
Monograph Psychospiritual Foundation Of Personality Disorders 2009psydoclewis
 
Texas S Ta R Chart
Texas S Ta R ChartTexas S Ta R Chart
Texas S Ta R Chartpurrfection
 
Rejuvenating indian manufacturing industries b.v.raghunandan
Rejuvenating indian manufacturing industries b.v.raghunandanRejuvenating indian manufacturing industries b.v.raghunandan
Rejuvenating indian manufacturing industries b.v.raghunandanSVS College
 
Budaya melayu adat perkahwinan 1
Budaya melayu adat perkahwinan 1Budaya melayu adat perkahwinan 1
Budaya melayu adat perkahwinan 1bmamirah
 
Bridging the gap between b schools and industry-b.v.raghunandan
Bridging the gap between b schools and industry-b.v.raghunandanBridging the gap between b schools and industry-b.v.raghunandan
Bridging the gap between b schools and industry-b.v.raghunandanSVS College
 
Longterm Profitability of Banks -B.V.Raghunandan
Longterm Profitability of Banks -B.V.RaghunandanLongterm Profitability of Banks -B.V.Raghunandan
Longterm Profitability of Banks -B.V.RaghunandanSVS College
 
Informative
InformativeInformative
Informativerowlett1
 
LifeCollege: Moulding Champions
LifeCollege: Moulding ChampionsLifeCollege: Moulding Champions
LifeCollege: Moulding ChampionsLifeCollege
 
LifeCollege SY2015-2016 InfoBulletin
LifeCollege SY2015-2016 InfoBulletinLifeCollege SY2015-2016 InfoBulletin
LifeCollege SY2015-2016 InfoBulletinLifeCollege
 
Idea Generation-B.V.Raghunandan
Idea Generation-B.V.RaghunandanIdea Generation-B.V.Raghunandan
Idea Generation-B.V.RaghunandanSVS College
 
The 4 Blue Difference
The 4 Blue DifferenceThe 4 Blue Difference
The 4 Blue Differencejamieloft
 
Fdi in indian retailing industry b.v.raghunandan
Fdi in indian retailing industry  b.v.raghunandanFdi in indian retailing industry  b.v.raghunandan
Fdi in indian retailing industry b.v.raghunandanSVS College
 
Working Capital Management-B.V.Raghunandan
Working Capital Management-B.V.RaghunandanWorking Capital Management-B.V.Raghunandan
Working Capital Management-B.V.RaghunandanSVS College
 
powerpoint,persentase,blog
powerpoint,persentase,blogpowerpoint,persentase,blog
powerpoint,persentase,blogguestaec05c4
 
Capital Market and Investment Avenues-B.V.Raghunandan
Capital Market and Investment Avenues-B.V.RaghunandanCapital Market and Investment Avenues-B.V.Raghunandan
Capital Market and Investment Avenues-B.V.RaghunandanSVS College
 

Andere mochten auch (20)

Right to information and consumer protection act
Right to information and consumer protection actRight to information and consumer protection act
Right to information and consumer protection act
 
Sebi Penalty
Sebi Penalty    Sebi Penalty
Sebi Penalty
 
Monograph Psychospiritual Foundation Of Personality Disorders 2009
Monograph  Psychospiritual Foundation Of Personality Disorders 2009Monograph  Psychospiritual Foundation Of Personality Disorders 2009
Monograph Psychospiritual Foundation Of Personality Disorders 2009
 
Talent Reach Company Profile
Talent Reach Company ProfileTalent Reach Company Profile
Talent Reach Company Profile
 
Texas S Ta R Chart
Texas S Ta R ChartTexas S Ta R Chart
Texas S Ta R Chart
 
Rejuvenating indian manufacturing industries b.v.raghunandan
Rejuvenating indian manufacturing industries b.v.raghunandanRejuvenating indian manufacturing industries b.v.raghunandan
Rejuvenating indian manufacturing industries b.v.raghunandan
 
Budaya melayu adat perkahwinan 1
Budaya melayu adat perkahwinan 1Budaya melayu adat perkahwinan 1
Budaya melayu adat perkahwinan 1
 
Bridging the gap between b schools and industry-b.v.raghunandan
Bridging the gap between b schools and industry-b.v.raghunandanBridging the gap between b schools and industry-b.v.raghunandan
Bridging the gap between b schools and industry-b.v.raghunandan
 
Longterm Profitability of Banks -B.V.Raghunandan
Longterm Profitability of Banks -B.V.RaghunandanLongterm Profitability of Banks -B.V.Raghunandan
Longterm Profitability of Banks -B.V.Raghunandan
 
Informative
InformativeInformative
Informative
 
賽斯說 找信念
賽斯說  找信念賽斯說  找信念
賽斯說 找信念
 
LifeCollege: Moulding Champions
LifeCollege: Moulding ChampionsLifeCollege: Moulding Champions
LifeCollege: Moulding Champions
 
LifeCollege SY2015-2016 InfoBulletin
LifeCollege SY2015-2016 InfoBulletinLifeCollege SY2015-2016 InfoBulletin
LifeCollege SY2015-2016 InfoBulletin
 
Idea Generation-B.V.Raghunandan
Idea Generation-B.V.RaghunandanIdea Generation-B.V.Raghunandan
Idea Generation-B.V.Raghunandan
 
The 4 Blue Difference
The 4 Blue DifferenceThe 4 Blue Difference
The 4 Blue Difference
 
Fdi in indian retailing industry b.v.raghunandan
Fdi in indian retailing industry  b.v.raghunandanFdi in indian retailing industry  b.v.raghunandan
Fdi in indian retailing industry b.v.raghunandan
 
Working Capital Management-B.V.Raghunandan
Working Capital Management-B.V.RaghunandanWorking Capital Management-B.V.Raghunandan
Working Capital Management-B.V.Raghunandan
 
powerpoint,persentase,blog
powerpoint,persentase,blogpowerpoint,persentase,blog
powerpoint,persentase,blog
 
Capital Market and Investment Avenues-B.V.Raghunandan
Capital Market and Investment Avenues-B.V.RaghunandanCapital Market and Investment Avenues-B.V.Raghunandan
Capital Market and Investment Avenues-B.V.Raghunandan
 
Bm 1 thn 3
Bm 1 thn 3Bm 1 thn 3
Bm 1 thn 3
 

Ähnlich wie Cyer crimes and cyber laws b.v.raghunandan

Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxAshwini831102
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan projectSyed Bokhari
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan projectSyed Bokhari
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.pptJiaJunWang17
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Deepam Aggarwal
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diplomaDrPraveenKumar37
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrimeOnline
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 

Ähnlich wie Cyer crimes and cyber laws b.v.raghunandan (20)

Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptxCyber Criminals,Classifications of Cybercrimes aat.pptx
Cyber Criminals,Classifications of Cybercrimes aat.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
 
cyber crime
 cyber crime  cyber crime
cyber crime
 
Cybercrime_PPT.ppt
Cybercrime_PPT.pptCybercrime_PPT.ppt
Cybercrime_PPT.ppt
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 

Mehr von SVS College

Entrepreneurship b.v.raghunandan
Entrepreneurship b.v.raghunandanEntrepreneurship b.v.raghunandan
Entrepreneurship b.v.raghunandanSVS College
 
Case study for Class Room Teaching- B.V.Raghunandan
Case study for Class Room Teaching- B.V.Raghunandan Case study for Class Room Teaching- B.V.Raghunandan
Case study for Class Room Teaching- B.V.Raghunandan SVS College
 
Finance sector reforms development finance-b.v.raghunandan
Finance sector reforms development finance-b.v.raghunandanFinance sector reforms development finance-b.v.raghunandan
Finance sector reforms development finance-b.v.raghunandanSVS College
 
Financial leverage as the balance sheet polluter b.v.raghunandan
Financial leverage as the balance sheet polluter b.v.raghunandanFinancial leverage as the balance sheet polluter b.v.raghunandan
Financial leverage as the balance sheet polluter b.v.raghunandanSVS College
 
Indian banking and financial inclusion b.v.raghunandan
Indian banking and financial inclusion b.v.raghunandanIndian banking and financial inclusion b.v.raghunandan
Indian banking and financial inclusion b.v.raghunandanSVS College
 
Professional ethics b.v.raghunandan
Professional ethics b.v.raghunandanProfessional ethics b.v.raghunandan
Professional ethics b.v.raghunandanSVS College
 
Ugc choice based common curriculum b.v.raghunandan-ugc
Ugc choice based common curriculum b.v.raghunandan-ugcUgc choice based common curriculum b.v.raghunandan-ugc
Ugc choice based common curriculum b.v.raghunandan-ugcSVS College
 
Budget 2015 16 and fundamentals of union budget-b.v.raghunandan
Budget 2015 16 and fundamentals of union budget-b.v.raghunandanBudget 2015 16 and fundamentals of union budget-b.v.raghunandan
Budget 2015 16 and fundamentals of union budget-b.v.raghunandanSVS College
 
Capital structure b.v.raghunandan
Capital structure b.v.raghunandanCapital structure b.v.raghunandan
Capital structure b.v.raghunandanSVS College
 
Entrepreneurship in the it era b.v.raghunandan
Entrepreneurship in the it era b.v.raghunandanEntrepreneurship in the it era b.v.raghunandan
Entrepreneurship in the it era b.v.raghunandanSVS College
 
Analysis of society vis a vis advertising-b.v.raghunandan
Analysis of society vis a vis advertising-b.v.raghunandanAnalysis of society vis a vis advertising-b.v.raghunandan
Analysis of society vis a vis advertising-b.v.raghunandanSVS College
 
Training hr for rural marketing copy
Training hr for rural marketing   copyTraining hr for rural marketing   copy
Training hr for rural marketing copySVS College
 
Campus agenda for career plannning mba- b.v.raghunandan
Campus agenda for career plannning  mba- b.v.raghunandanCampus agenda for career plannning  mba- b.v.raghunandan
Campus agenda for career plannning mba- b.v.raghunandanSVS College
 
Mentoring b.v.raghunandan
Mentoring b.v.raghunandanMentoring b.v.raghunandan
Mentoring b.v.raghunandanSVS College
 
Student empowerment through mentoring and reverese mentoring b.v.raghunandan
Student empowerment through mentoring and reverese mentoring b.v.raghunandanStudent empowerment through mentoring and reverese mentoring b.v.raghunandan
Student empowerment through mentoring and reverese mentoring b.v.raghunandanSVS College
 
Fdi in retail business b.v.raghunandan
Fdi in  retail business  b.v.raghunandanFdi in  retail business  b.v.raghunandan
Fdi in retail business b.v.raghunandanSVS College
 
Book building-b.v.raghunandan
Book building-b.v.raghunandanBook building-b.v.raghunandan
Book building-b.v.raghunandanSVS College
 
Ipo and retail investors b.v.raghunandan
Ipo and retail investors b.v.raghunandanIpo and retail investors b.v.raghunandan
Ipo and retail investors b.v.raghunandanSVS College
 
Leverage as a financial perversion b.v.raghunandan
Leverage as a financial perversion b.v.raghunandanLeverage as a financial perversion b.v.raghunandan
Leverage as a financial perversion b.v.raghunandanSVS College
 
Emerging trends in indian marketing b.v.raghunandan
Emerging trends in indian marketing b.v.raghunandanEmerging trends in indian marketing b.v.raghunandan
Emerging trends in indian marketing b.v.raghunandanSVS College
 

Mehr von SVS College (20)

Entrepreneurship b.v.raghunandan
Entrepreneurship b.v.raghunandanEntrepreneurship b.v.raghunandan
Entrepreneurship b.v.raghunandan
 
Case study for Class Room Teaching- B.V.Raghunandan
Case study for Class Room Teaching- B.V.Raghunandan Case study for Class Room Teaching- B.V.Raghunandan
Case study for Class Room Teaching- B.V.Raghunandan
 
Finance sector reforms development finance-b.v.raghunandan
Finance sector reforms development finance-b.v.raghunandanFinance sector reforms development finance-b.v.raghunandan
Finance sector reforms development finance-b.v.raghunandan
 
Financial leverage as the balance sheet polluter b.v.raghunandan
Financial leverage as the balance sheet polluter b.v.raghunandanFinancial leverage as the balance sheet polluter b.v.raghunandan
Financial leverage as the balance sheet polluter b.v.raghunandan
 
Indian banking and financial inclusion b.v.raghunandan
Indian banking and financial inclusion b.v.raghunandanIndian banking and financial inclusion b.v.raghunandan
Indian banking and financial inclusion b.v.raghunandan
 
Professional ethics b.v.raghunandan
Professional ethics b.v.raghunandanProfessional ethics b.v.raghunandan
Professional ethics b.v.raghunandan
 
Ugc choice based common curriculum b.v.raghunandan-ugc
Ugc choice based common curriculum b.v.raghunandan-ugcUgc choice based common curriculum b.v.raghunandan-ugc
Ugc choice based common curriculum b.v.raghunandan-ugc
 
Budget 2015 16 and fundamentals of union budget-b.v.raghunandan
Budget 2015 16 and fundamentals of union budget-b.v.raghunandanBudget 2015 16 and fundamentals of union budget-b.v.raghunandan
Budget 2015 16 and fundamentals of union budget-b.v.raghunandan
 
Capital structure b.v.raghunandan
Capital structure b.v.raghunandanCapital structure b.v.raghunandan
Capital structure b.v.raghunandan
 
Entrepreneurship in the it era b.v.raghunandan
Entrepreneurship in the it era b.v.raghunandanEntrepreneurship in the it era b.v.raghunandan
Entrepreneurship in the it era b.v.raghunandan
 
Analysis of society vis a vis advertising-b.v.raghunandan
Analysis of society vis a vis advertising-b.v.raghunandanAnalysis of society vis a vis advertising-b.v.raghunandan
Analysis of society vis a vis advertising-b.v.raghunandan
 
Training hr for rural marketing copy
Training hr for rural marketing   copyTraining hr for rural marketing   copy
Training hr for rural marketing copy
 
Campus agenda for career plannning mba- b.v.raghunandan
Campus agenda for career plannning  mba- b.v.raghunandanCampus agenda for career plannning  mba- b.v.raghunandan
Campus agenda for career plannning mba- b.v.raghunandan
 
Mentoring b.v.raghunandan
Mentoring b.v.raghunandanMentoring b.v.raghunandan
Mentoring b.v.raghunandan
 
Student empowerment through mentoring and reverese mentoring b.v.raghunandan
Student empowerment through mentoring and reverese mentoring b.v.raghunandanStudent empowerment through mentoring and reverese mentoring b.v.raghunandan
Student empowerment through mentoring and reverese mentoring b.v.raghunandan
 
Fdi in retail business b.v.raghunandan
Fdi in  retail business  b.v.raghunandanFdi in  retail business  b.v.raghunandan
Fdi in retail business b.v.raghunandan
 
Book building-b.v.raghunandan
Book building-b.v.raghunandanBook building-b.v.raghunandan
Book building-b.v.raghunandan
 
Ipo and retail investors b.v.raghunandan
Ipo and retail investors b.v.raghunandanIpo and retail investors b.v.raghunandan
Ipo and retail investors b.v.raghunandan
 
Leverage as a financial perversion b.v.raghunandan
Leverage as a financial perversion b.v.raghunandanLeverage as a financial perversion b.v.raghunandan
Leverage as a financial perversion b.v.raghunandan
 
Emerging trends in indian marketing b.v.raghunandan
Emerging trends in indian marketing b.v.raghunandanEmerging trends in indian marketing b.v.raghunandan
Emerging trends in indian marketing b.v.raghunandan
 

Cyer crimes and cyber laws b.v.raghunandan

  • 1. Cyber Laws & Cyber Crimes - B.V.Raghunandan Rosario College, Mangalore Feb 21, 2015
  • 2. Cybercrime- a Definition • "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)“ - Dr. Debarati Halder and Dr. K. Jaishankar.
  • 3. A Broader Definition • A cyber crime is an offence punishable under law committed using computer, internet, or any electronic mobile device in which the computer, internet or the device is a tool or the target
  • 4. Cyber Offences • Offences attracting penal action and committed using 1) Computers-Computer Crime 2) Internet - Internet Crimes 3) Mobile Phones/ Mobile Devices-Mobile Crimes
  • 5. Perpetrators/Victims • Individuals • Groups of Individuals • Companies • Drug Traffic Gangs • Governments
  • 6. Individuals: Motives • Proving Smartness • Sadistic in Nature • Stealing Money • Vengeance • Power • For Excitement • Learning Exercise • Service Providers • Fantasies • Publicity
  • 7. Groups of Individuals • Peddlers of Pornography • Party Affiliation • Caste Hatred • Social/Environmental Groups • Rebel Groups in Small Countries • Regional Hatred
  • 8. Companies • Computer Manufacturing Companies • Software Companies • Industrial Espionage • Bidding Companies • Cos Seeking Access to Government Records • Companies providing Anti-Virus Software • Defence Industries
  • 9. Drug Traffic Gangs: Motive • Securing Data of Potential Customers • Hacking into the systems of their distributors • Gaining access to systems of police and intelligence establishments • Access to government sites • Entry into logistics providers
  • 10. Governments • Developing cyber warfare • Spying into the systems of enemy countries • International Policing by the USA • Police Establishments • Intelligence Establishments • Military Intelligence • Personal Interests of People in power
  • 11. Types of Cybercrimes • Financial Crime • Data Theft • Copyright Infringement • Cyber Terrorism • Computer Vandalism • Child Grooming/Pornog raphy • Cyber Warfare • Cyber Stalking • Cyber Suicides • Identity Theft • Drug Trafficking • Active Attack/Passive Attack • Cyber Terrorism • Computer Vandalism
  • 12. Techniques of Cyber Crimes • Wired/Wireless Tapping • Hacking • Phishing • Spoofing/Masquerading • Social Engineering • Software Piracy • Trap Doors/Back Doors • Malware: 1) Viruses 2) Worms 3) Trojan Horses 4) Spyware
  • 13. Characteristics of Cyber Crimes • Policeman and thief are the same • Perpetrators and victims are the people • Each programme can be used positively or negatively • Perpetrators are young within the age of 16-26 • Huge Profits made effortlessly • Reckless Criminals • Total Ignorance of Cyber Crime and Laws • Widespread Opposition to Cyberlaws
  • 14. Cyber- laws in India • Information Technology Act, 2000 • Information Technology Amendment Act, 2008 • Information Technology Rules, 2011
  • 15. Contributions of the Act • Providing for Digital Signature • Creating E’Governance • Compliance by Companies receiving, storing, or transmitting data of others • Creation of Controllers and Certifying Authorities • Establishment of Cyber Appellate Tribunal • Offences and Penalties
  • 16. Offences and Penalties 1) Non-Compliance-7 years imprisonment 2) Damage to Computer/Systems-Compensation by the offender 3) Tampering with Source Documents-Sec 65-3 years of imprisonment/Rs. 2 lakh/both 4) Sending Offensive Messages-Sec 66-3 Years with fine 5) Identity Theft-3 years/plus Rs. 2 lakh
  • 17. Offences & Penalties-continued • Cheating by personation • Violation of privacy • Cyber terrorism • Publishing or transmitting obscene material • Depicting children in sexually explicit form
  • 18. Future Agenda • Educating the Society • Anti-Piracy Movement • Discouraging Offences by parents, teachers, employers etc • No concealment of offences • Exposure to Consequences of offences