Cyber crime:The Transformation Of Crime In The Information Age.

Post on 21-Apr-2017

126 views 4 download

Transcript of Cyber crime:The Transformation Of Crime In The Information Age.

Cyber crime

-- Omkar .G.Walavalkar

Introduction.History of Cyber Crime.Definition.Categories of Cyber Crime.Types of Cyber Crime.Cyber Criminals.Cyber Crime In INDIA.Conclusion.References.

CONTENTS

Introduction

- Activity done using computers & Internet.

Cyber crime - Criminal Activity

There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.

CYBER CRIME !!

History of Cyber Crime

First recorded cyber crime in 1820.

Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom.

It’s an unlawful act wherein the computer is either a tool or a target or both. Acts that are punishable by the Information Technology Act.

Defining Cyber Crime

• Cybercrime is second only to asset misappropriation amongeconomic crimes affecting companies in the financial services

sector- PwC Survey 2011

• India has suffered losses of approximately $8 billion due to cybercrime in 2011 and an estimated 14,392 websites in

the country were hacked in 2012, according to Cert-In.- Deccan Chronicle

Categories of Cyber Crime

• CYBER CRIMES AGAINST PERSONS

• CYBER CRIMES AGAINST PROPERTY

• CYBER CRIMES AGAINST GOVERNMENT (CYBER TERRORISM)

Types of Cyber Crime

(Insiders & Intruders)

Cyber Criminals

Kids (age group 9-16 etc.)

Organized hacktivists

Disgruntled employees

Professional hackers (corporate espionage)

India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the

Global Cyber Crime.

Cyber Crime In India

Why India?

A rapidly growing online user base

121 Million Internet Users 46+ Million Social Network Users 50 Million users shop online on Ecommerce and Online

Shopping Sites

Conclusion

Within the law enforcement agencies, a set of rules must be developed to address the various categories of computer crime.

As such, investigators will know what and which materials to search and seize, the electronic evidence to recover, and the chain of custody to maintain .

References Fraud and related activity in connection with access devices

18 U.S. Code Sec. 1029.

Fraud and related activity in connection with computers 18 U.S. Code Sec. 1030.

Theft of criminal trade secrets 18 U.S. Code, pp. 1831 -1839.

K. G. Allred, , R. J. Bies, R. J. Lewicki, and B. H. Sheppard, Eds., “Anger driven retaliation: Toward an understanding of impassioned conflict in organizations,” in Research on Negotiations in Organizations. Greenwich, CT: JAI Press, 1999, vol. 7.

THANK YOU…