Post on 21-Apr-2017
Cyber crime
-- Omkar .G.Walavalkar
Introduction.History of Cyber Crime.Definition.Categories of Cyber Crime.Types of Cyber Crime.Cyber Criminals.Cyber Crime In INDIA.Conclusion.References.
CONTENTS
Introduction
- Activity done using computers & Internet.
Cyber crime - Criminal Activity
There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
CYBER CRIME !!
History of Cyber Crime
First recorded cyber crime in 1820.
Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom.
It’s an unlawful act wherein the computer is either a tool or a target or both. Acts that are punishable by the Information Technology Act.
Defining Cyber Crime
• Cybercrime is second only to asset misappropriation amongeconomic crimes affecting companies in the financial services
sector- PwC Survey 2011
• India has suffered losses of approximately $8 billion due to cybercrime in 2011 and an estimated 14,392 websites in
the country were hacked in 2012, according to Cert-In.- Deccan Chronicle
Categories of Cyber Crime
• CYBER CRIMES AGAINST PERSONS
• CYBER CRIMES AGAINST PROPERTY
• CYBER CRIMES AGAINST GOVERNMENT (CYBER TERRORISM)
Types of Cyber Crime
(Insiders & Intruders)
Cyber Criminals
Kids (age group 9-16 etc.)
Organized hacktivists
Disgruntled employees
Professional hackers (corporate espionage)
India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the
Global Cyber Crime.
Cyber Crime In India
Why India?
A rapidly growing online user base
121 Million Internet Users 46+ Million Social Network Users 50 Million users shop online on Ecommerce and Online
Shopping Sites
Conclusion
Within the law enforcement agencies, a set of rules must be developed to address the various categories of computer crime.
As such, investigators will know what and which materials to search and seize, the electronic evidence to recover, and the chain of custody to maintain .
References Fraud and related activity in connection with access devices
18 U.S. Code Sec. 1029.
Fraud and related activity in connection with computers 18 U.S. Code Sec. 1030.
Theft of criminal trade secrets 18 U.S. Code, pp. 1831 -1839.
K. G. Allred, , R. J. Bies, R. J. Lewicki, and B. H. Sheppard, Eds., “Anger driven retaliation: Toward an understanding of impassioned conflict in organizations,” in Research on Negotiations in Organizations. Greenwich, CT: JAI Press, 1999, vol. 7.
THANK YOU…