Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.


Cyber fraud Slide 1 Cyber fraud Slide 2 Cyber fraud Slide 3 Cyber fraud Slide 4 Cyber fraud Slide 5 Cyber fraud Slide 6 Cyber fraud Slide 7 Cyber fraud Slide 8 Cyber fraud Slide 9 Cyber fraud Slide 10 Cyber fraud Slide 11 Cyber fraud Slide 12 Cyber fraud Slide 13 Cyber fraud Slide 14 Cyber fraud Slide 15 Cyber fraud Slide 16 Cyber fraud Slide 17 Cyber fraud Slide 18 Cyber fraud Slide 19 Cyber fraud Slide 20 Cyber fraud Slide 21 Cyber fraud Slide 22 Cyber fraud Slide 23
Upcoming SlideShare
Information technology act 2000
Download to read offline and view in fullscreen.



Download to read offline

Cyber fraud

Download to read offline

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Cyber fraud

  1. 1. IT ACT AND CYBER CRIME Made by:
  2. 2. Introduction IT Act 2000 neither defines Cyber Crime nor uses this expression only provide definition and punishment for certain offences. Definitions 1)Narrowly defined ‘cyber crime ‘ consist of only those offences provided in the Information Technology Act 2000. 2)Broadly stated ,’cybercrime’ can be set to be an act of commission or omission ,committed on or through or with the help of or connected with the internet ,whether directly or indirectly ,which is prohibited by any law and for which punishment, monetary and /or corporal is provided.
  3. 3. Classification of Cyber Crimes • 1) Old Crimes , committed on or through the new medium of the Internet. • 2) New Crimes created with Internet Itself. • 3) New Crimes used for commission of old Crimes.
  4. 4. Classification by Nature of Usage of Computer • 1)Hacking – Computer & Network are essential • 2)Cyber Pornography – medium of net is used • 3)Cyber fraud – Only Computer is identical for commission
  5. 5. Information Technology Act 2000 • It shall extend to the whole of India and save as otherwise provided in this act , It applies also to any offence or contravention here under committed outside India by any person. • It shall come into force on such date as the Central Government may , by notification , appoint and different dates may be appointed for different provision of the act.
  6. 6. Definition of IT Act • Access • Addressee • Data • Digital Signature • Electronic form • Electronic Gazette • Electronic Record • Function • Information • License • Private key • Public key • Secure System
  7. 7. HACKING INTRODUCTION Programmable system Simple to execute Vulnerability of websites Biggest threats to internet & e-commerce
  8. 8. DEFINITION It refers to hobby or profession of working with computer Destroys or deletes or alters
  9. 9. TYPES •Code hackers •Phreakers •Cyber-punks •Crackers
  10. 10. TAMPERING WITH COMPUTER SOURCE DOCUMENTS MEANING • According to section 65 of the IT Act • Whoever knowingly or intentionally • conceals, destroys or alters or intentionally • or knowingly causes another to conceal, • destroy or alter any computer source code • used for a computer, computer programme, computer system or computer network, • when the computer source code is required • to be kept or maintained by law for the time • being in force
  11. 11. Tampering with Computer Source Code • Actions covered:- Knowingly or intentionally concealing, altering or destroying computer source code (or causing someone else to do so) • Penalty:- Imprisonment up to 3 years and / or fine up to Rs 2 lakh • Relevant authority :- Judicial Magistrate First Class • Appeal lies to:- Court of Session
  12. 12. Cyber Fraud & Cheating • Fraud on internet constitutes about one-third of all cyber crimes • It has increased by a substantial 29% over the past year. • It is the most profitable business on the Internet • Some of the major areas of fraud and cheating on the Internet include misuse of credit cards by obtaining passwords by hacking , bogus investment/get rich schemes , deceptive investment newsletters containing false information about companies , non delivery of goods purchased from online auctions and websites , misappropriation & transfer of funds , etc
  13. 13. IT Laws relating to Cyber Fraud & Cheating
  14. 14. Section in IPC Offence Punishment 403 Dishonest Imprisonment which misappropriation of may extend to two years property. , or with fine , or both. 405 , 406 Criminal breach of trust Imprisonment which may extend to three years , or with fine , or both. 468 Forgery for the purpose Imprisonment which of cheating. may extend to seven years and fine. 477 A Falsification of accounts Imprisonment which may extend to seven years , or with fine , or both. 482 Using a false property Imprisonment which mark. may extend to one year , or with fine , or both.
  15. 15. CYBER TERRORISM Government officials and Information Technology security specialists have documented a significant increase in Internet problems and server scans since early 2001. But there is a growing concern among federal officials that such intrusions are part of an organized effort by cyber terrorists, foreign intelligence services, or other groups to map potential security holes in critical systems. A cyber terrorist is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attack against computers, network, and the information stored on them. Cyber terrorism in general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources (Parker 1983). As such, a simple propaganda in the Internet, that there will be bomb attacks during the holidays can be considered cyber terrorism. As well there are also hacking activities directed towards individuals, families, organized by groups within networks, tending to cause fear among people, demonstrate power, collecting information relevant for ruining peoples' lives, robberies, blackmailing etc.
  16. 16. Cyber Pornography • There is no settled definition of pornography or obscenity. What is • considered simply sexually explicit but not obscene in USA may well be • considered obscene in India. There have been many attempts to limit the • availability of pornographic content on the Internet by governments and • law enforcement bodies all around the world but with little effect. • Pornography on the Internet is available in different formats. These range • from pictures and short animated movies, to sound files and stories. The • Internet also makes it possible to discuss sex, see live sex acts, and • arrange sexual activities from computer screens. Although the Indian • Constitution guarantees the fundamental right of freedom of speech and • expression, it has been held that a law against obscenity is constitutional. • The Supreme Court has defined obscene as “offensive to modesty or • decency; lewd, filthy, repulsive.
  17. 17. Section 67 of the IT Act is the most serious Indian law penalizing cybercrime
  18. 18. •According to Section 67 of the IT Act •Whoever publishes or transmits or causes •to be published in the electronic form, any •material which is lascivious or appeals to •the prurient interest or if its effect is such as •to tend to deprave and corrupt persons who •are likely, having regard to all relevant •circumstances, to read, see or hear the •matter contained or embodied in it, shall be •punished on first conviction with •imprisonment of either description for a •term which may extend to five years and •with fine which may extend to one lakh •rupees and in the event of a second or •subsequent conviction with imprisonment of •either description for a term which may •extend to ten years and also with fine which •may extend to two lakh rupees.
  19. 19. How to stop cyber crime Anti Virus Firewall
  20. 20. ON INDIVIDUAL LEVEL • Use hard to get password • Disconnect from internet when not in use • Don’t give your password to anyone. • Don’t give your personal information on “SOCIAL NETWORKING SITES”
  21. 21. On Organizational Level  Regular backup  Use comprehensive security software and keep your system updated  Secure your wireless network  Be suspicious
  22. 22. Thank You 
  • CarolCruz48

    Dec. 4, 2021
  • TiffanyLitherland

    Feb. 23, 2021
  • AmanKumar1125

    Oct. 21, 2019
  • HetaTrivedi1

    Aug. 8, 2019
  • NimitaShokeen

    Mar. 7, 2018
  • LuvitBuyit

    Jun. 8, 2017
  • TouqeerAhmad15

    May. 14, 2017
  • chourasiavinay

    May. 10, 2015
  • NaveenKaplas

    Apr. 2, 2014
  • akshathakamath2012

    Mar. 5, 2013


Total views


On Slideshare


From embeds


Number of embeds