SlideShare ist ein Scribd-Unternehmen logo
1 von 10
IT ACT AND CYBER CRIME
IT Act 2000 – An Overview
• Information Technology Act, 2000 is India’s mother
legislation regulating the use of computers, computer
systems and computer networks as also data and
information in the electronic format.
• It is developed to promote the IT industry, regulate
ecommerce, facilitate e-governance and prevent
cybercrime
• Cyber law encompasses laws relating to –





Cyber crimes
Electronic and digital signatures
Intellectual property
Data protection and privacy
Cyber crime on the rise
• As per the cyber crime data maintained by the National Crime
Records Bureau (NCRB), following were the total Cyber Crime
cases registered under the Information Technology Act





2007- 217 cases
2008- 288 cases
2009- 420 cases
2010- 966 cases

• The age-wise profile of persons arrested in cyber crime cases
showed that 58.6% of the offenders were in the age group 18–30
years (695 out of 1184) and 31.7% of the offenders were in the
age group 30-45 years
• One in three adults online Indians (32%) have been either social or
mobile cybercrime victims.
Types of Cyber Crime being committed
• Email spoofing
It is one that appears to originate from one source
but actually has been sent from another false
source.
• Web jacking/ Hacking
This occurs when someone forcefully takes control
of a website (by cracking the password and later
changing it). The actual owner of the website does
not have any more control over what appears on
that website.
Types of Cyber Crime being committed
• Cyber Defamation
India’s first case of cyber defamation was reported when a
company’s employee started sending
derogatory, defamatory and obscene e-mails about its
Managing Director. The e-mails were anonymous and
frequent, and were sent to many of their business associates
to tarnish the image and goodwill of the company, Later he
was Identified and accordingly penalized.
• Cyber stalking
Cyber stalking involves following a person’s movements
across the Internet by posting messages (sometimes
threatening) on the bulletin boards frequented by the
victim, entering the chat-rooms and constantly bombarding
the victim with emails etc.
Types of Cyber Crime being committed
• Email bombing
Email bombing refers to sending a large number of emails to the
victim resulting in the victim’s email account or mail servers crashing.
Example: In one case, a foreigner who had been residing in Simla,
India for almost thirty years wanted to avail of a scheme introduced
by the Simla Housing Board to buy land at lower rates. When he
made an application it was rejected on the grounds that the scheme
was available only for citizens of India. He decided to take his
revenge. Consequently he sent thousands of mails to the Simla
Housing Board and repeatedly kept sending e-mails till their
servers crashed
• Virus / worm attacks
Viruses are programs that attach themselves to a computer or a file
and then circulate themselves to other files and to other computers
on a network. They usually affect the data on a computer, either by
altering or deleting it.
Cyber Pornography
Accessing pornography or sharing obscene
content is illegal and punishable under the
law
In pornography, the service
provider, misrepresents his identity and
dispatches a mail to a child user of
computer for sending photographs for a
carrier of fashion or modeling, with an
offer of incentive or money and
sometimes they assure their victims that
such pictures are for personal or
confidential use. When they receive such
pictures they interpolate the same
through graphic program and convert
them to pornographic pictures such as
putting the face of the victim on the nude
body of the person or convert them into
intimate postures and release through
Modem for hacking by users, with out the
knowledge of the victim.
Social Networking Sites- Source to
Cyber Crime
• The recent incident of a 17-year-old girl from
a south Delhi Public School alleging that she
was sexually assaulted by two MNC
employees , whom she had befriended on a
social networking website, is a reminder on
how the internet can be a source of danger
for young generation.
Emergency Contact
• Indian Computer Emergency Response Team
Department of Information Technology,
Ministry of Communications and Information
Technology, Government of India
Electronics Niketan, 6 CGO Complex, Lodhi Road,
New Delhi – 110003 ph. – 011-24368572

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityVivek Gupta
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the countryUjjwal Tripathi
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRAKrishnakant Mishra
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 
Cyber crime
Cyber crimeCyber crime
Cyber crimedixitas
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 

Was ist angesagt? (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
CYBER CRIME PPT
CYBER CRIME PPTCYBER CRIME PPT
CYBER CRIME PPT
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Andere mochten auch

Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111Yogendra Wagh
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Bankers evidence act
Bankers evidence actBankers evidence act
Bankers evidence actSSbm1
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
 
Revamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse ActRevamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse ActDavid Sweigert
 

Andere mochten auch (11)

Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
Workshop on Cyber Laws
Workshop on Cyber LawsWorkshop on Cyber Laws
Workshop on Cyber Laws
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Bankers evidence act
Bankers evidence actBankers evidence act
Bankers evidence act
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Revamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse ActRevamping the Computer Fraud and Abuse Act
Revamping the Computer Fraud and Abuse Act
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Ähnlich wie Cyber crime

Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaDr. Arun Verma
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxsainnrg
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptxClichesin
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineIRJET Journal
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 

Ähnlich wie Cyber crime (20)

Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 

Mehr von InterGlobe Enterprises (20)

World AIDS day 2014
World AIDS day 2014World AIDS day 2014
World AIDS day 2014
 
Merry Christmas articles
Merry Christmas articlesMerry Christmas articles
Merry Christmas articles
 
Merry Christmas
Merry ChristmasMerry Christmas
Merry Christmas
 
Happy Diwali 2014
Happy Diwali 2014Happy Diwali 2014
Happy Diwali 2014
 
World Food Day
World Food DayWorld Food Day
World Food Day
 
Worker's day 2014
Worker's day 2014Worker's day 2014
Worker's day 2014
 
Independence day INDIA
Independence day INDIAIndependence day INDIA
Independence day INDIA
 
Teacher's day 2014
Teacher's day 2014Teacher's day 2014
Teacher's day 2014
 
World tourism day 2014
World tourism day 2014World tourism day 2014
World tourism day 2014
 
World Environment Day
World Environment DayWorld Environment Day
World Environment Day
 
Professional Etiquettes
Professional EtiquettesProfessional Etiquettes
Professional Etiquettes
 
Soft skills development
Soft skills developmentSoft skills development
Soft skills development
 
Symbols of love
Symbols of loveSymbols of love
Symbols of love
 
Five mobile applications for women safety
Five mobile applications for women safetyFive mobile applications for women safety
Five mobile applications for women safety
 
10 legal rights a woman should know
10 legal rights a woman should know10 legal rights a woman should know
10 legal rights a woman should know
 
What women must know to stay safe
What women must know to stay safeWhat women must know to stay safe
What women must know to stay safe
 
Happy mother’s day
Happy mother’s dayHappy mother’s day
Happy mother’s day
 
International Worker's day 2014
International Worker's day 2014International Worker's day 2014
International Worker's day 2014
 
World earth day 2014
World earth day 2014World earth day 2014
World earth day 2014
 
Safety for girls
Safety for girlsSafety for girls
Safety for girls
 

Cyber crime

  • 1. IT ACT AND CYBER CRIME
  • 2. IT Act 2000 – An Overview • Information Technology Act, 2000 is India’s mother legislation regulating the use of computers, computer systems and computer networks as also data and information in the electronic format. • It is developed to promote the IT industry, regulate ecommerce, facilitate e-governance and prevent cybercrime • Cyber law encompasses laws relating to –     Cyber crimes Electronic and digital signatures Intellectual property Data protection and privacy
  • 3.
  • 4. Cyber crime on the rise • As per the cyber crime data maintained by the National Crime Records Bureau (NCRB), following were the total Cyber Crime cases registered under the Information Technology Act     2007- 217 cases 2008- 288 cases 2009- 420 cases 2010- 966 cases • The age-wise profile of persons arrested in cyber crime cases showed that 58.6% of the offenders were in the age group 18–30 years (695 out of 1184) and 31.7% of the offenders were in the age group 30-45 years • One in three adults online Indians (32%) have been either social or mobile cybercrime victims.
  • 5. Types of Cyber Crime being committed • Email spoofing It is one that appears to originate from one source but actually has been sent from another false source. • Web jacking/ Hacking This occurs when someone forcefully takes control of a website (by cracking the password and later changing it). The actual owner of the website does not have any more control over what appears on that website.
  • 6. Types of Cyber Crime being committed • Cyber Defamation India’s first case of cyber defamation was reported when a company’s employee started sending derogatory, defamatory and obscene e-mails about its Managing Director. The e-mails were anonymous and frequent, and were sent to many of their business associates to tarnish the image and goodwill of the company, Later he was Identified and accordingly penalized. • Cyber stalking Cyber stalking involves following a person’s movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms and constantly bombarding the victim with emails etc.
  • 7. Types of Cyber Crime being committed • Email bombing Email bombing refers to sending a large number of emails to the victim resulting in the victim’s email account or mail servers crashing. Example: In one case, a foreigner who had been residing in Simla, India for almost thirty years wanted to avail of a scheme introduced by the Simla Housing Board to buy land at lower rates. When he made an application it was rejected on the grounds that the scheme was available only for citizens of India. He decided to take his revenge. Consequently he sent thousands of mails to the Simla Housing Board and repeatedly kept sending e-mails till their servers crashed • Virus / worm attacks Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it.
  • 8. Cyber Pornography Accessing pornography or sharing obscene content is illegal and punishable under the law In pornography, the service provider, misrepresents his identity and dispatches a mail to a child user of computer for sending photographs for a carrier of fashion or modeling, with an offer of incentive or money and sometimes they assure their victims that such pictures are for personal or confidential use. When they receive such pictures they interpolate the same through graphic program and convert them to pornographic pictures such as putting the face of the victim on the nude body of the person or convert them into intimate postures and release through Modem for hacking by users, with out the knowledge of the victim.
  • 9. Social Networking Sites- Source to Cyber Crime • The recent incident of a 17-year-old girl from a south Delhi Public School alleging that she was sexually assaulted by two MNC employees , whom she had befriended on a social networking website, is a reminder on how the internet can be a source of danger for young generation.
  • 10. Emergency Contact • Indian Computer Emergency Response Team Department of Information Technology, Ministry of Communications and Information Technology, Government of India Electronics Niketan, 6 CGO Complex, Lodhi Road, New Delhi – 110003 ph. – 011-24368572