You are on page 1of 10

Chapter 1

Introduction to Cybercrime

Cyber Crime
Is any illegal behavior , directed by means of electronic operations that targets the security of computer system and the data processed by them Two types of attacks are prevalent :
1. Techno - Crime 2. Techno - vandalism

Cyber Criminals
1. Type I : Hungry for Recognition

1. Type II : Not interested in recognition

1. Type III : The insiders

Classification of Cybercrimes
1. E-mail spoofing 2. Spamming 3. Cyber defamation 4. Internet time theft 5. Salami attacks/Salami techniques 6. Data diddling 7. Forgery 8. Newsgroup spam 9. Industrial spying 10. Hacking 11. Online frauds

continue
12. Pornographic offence 13. Software piracy 14. Computer sabotage 15. Email bombing 16. Usenet newsgroup as the source of cybercrimes 17. Computer network intrusions 18. Password sniffing 19. Credit card frauds 20.Identity thefts

Cybercrimes and the Indian ITA 2000


Cybercrimes are punishable under two categories :
1.The ITA 200 2.The IPC

http://www.mit.gov.in/content/report-expertcommittee-amendments-it-act-2000-3
Section
43

Chapter
CHAPTER IX : PENALTIES AND ADJUDICATION CHAPTER XI: OFFENCES

Crime
for damage to computer

Punishment
compensation not exceeding one crore rupees

66

Computer related imprisonment upto offenses: one year or a fine which may extend up to two lacs or with both Encryption and other technologies for security of data to imprisonment for a term not exceeding three years or to a fine not exceeding two lakh rupees or to both

68A.

CHAPTER XI: OFFENCES

Section Chapter 73 CHAPTER XI: OFFENCES

Crime Penalty for publishing Electronic Signature Certificate false in certain particulars

Punishment punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both punished with imprisonment for a term which may extend to two years, or with fine which extend to one lakh rupees, or with both

74

CHAPTER XI: OFFENCES

Publication for fraudulent purpose

Terms
Cyberspace Cyber squatting Cyber terrorism Botnet

Self Study
1.6 1.7

You might also like