Crime committed using a computer and the internet to steal a person‟s identity or illegal imports or malicious programs cybercrime is nothing but where the computer used as an object or subject of crime


C. has been around since 3500 B.The first recorded cyber crime took place in the year 1820 That is not surprising considering the fact that the abacus.  The first email spam took place in1978 when it was sent out over the ARPANET  The first virus was installed on Apple computer in 1982  3 . which is thought to be the earliest form of a computer.

 4 . The computer as a weapon : using a computer to commit real world crimes. The Computer as a Target : using a computer to attack other computers.


• Financial fraud: • Sabotage of data/networks: • Theft of proprietary information: • System penetration from the outside: • Denial of service: • Unauthorized access by insiders: • Employee abuse of internet privileges • Viruses: 11% 17% 20% 25% 27% 71% 79% 85% 6 .

7 .

detection. and response to different online attacks 8 . Involves protection of sensitive personal and business information through prevention.

Privacy Policy  Keep software up to date  Use good passwords  Disable remote connectivity  Use antivirus software‟s  Insert firewalls  Uninstall unnecessary software  Maintain backup  Stay anonymous .choose a genderless screen name  Never give your full name or address to strangers  9 .

10 . fraud. Cyber crimes can involve criminal activities that are traditional in nature. forgery. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act. such as theft. defamation and mischief. all of which are subject to the Indian Penal Code. 2000.

 Companies  Digital 11 . signatures have been given legal validity and sanction in the Act. Email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act.

12 . The Act now allows Government to issue notification on the web thus heralding egovernance  It shall now be possible for corporate to have a statutory remedy in case if anyone breaks into their computer systems or network and cause loss.

2000-came into force on 17 October 2000 Extends to whole of India and also applies to any offence or contravention there under committed outside India by any person {section 1 (2)} read with Section 75. computer system or network located in India Section 2 (1) (a) –”Access” means gaining entry into.5 of the IT Act. arithmetic or memory function resources of a computer. instructing or communicating with the logical.2000) 13 .     Information Technology Act. if such act involves a computer. computer resource or network IT Act confers legal recognition to electronic records and digital signatures (section 4.Act applies to offence or contravention committed outside India by any person irrespective of his nationality.

modify or rearrange  Change the format of a file • Disrupts or causes disruption of any computer resource 14 . Section 43 Whoever without permission of owner of the computer • Secures access  Not necessarily through a network • Downloads. extracts any data • Introduces or causes to be introduced any viruses or contaminant • Damages or causes to be damaged any computer resource  Destroy. delete. alter.  Chapter IX of IT Act. add. copies.

Internet time thefts • Liable to pay damages not exceeding Rs.• Denies or causes denial of access by any means  Denial of service attacks • Assists any person to do any thing above  Rogue Websites. Insiders providing vulnerabilities • Charges the services availed by a person to the account of another person by tampering or manipulating any computer resource  Credit card frauds. Search Engines. One crore to the affected party • Investigation by  AJUDICATING OFFICER  Powers of a civil court 15 .

destruction. design and layout  Ingredients • Knowledge or intention • Concealment. alteration • computer source code required to be kept or maintained by law  Punishment • imprisonment up to three years and / or • fine up to Rs. computer commands. 2 lakh 16 . Most important asset of software  “Computer Source Code" means companies the listing of programmes.

Section 66: Hacking • Ingredients – Intention or Knowledge to cause wrongful loss or damage to the public or any person – Destruction. Non Bail able. alteration. diminishing value or utility or injuriously affecting information residing in a computer resource • Punishment – imprisonment up to three years. deletion. and / or – fine up to Rs. 2 lakh • Cognizable (within the jurisdiction of a court). 17 .

• Pornographic websites  Cognizable. 1 lakh • On subsequent conviction  imprisonment of either description up to ten years and  fine up to Rs. JMIC/ Court of Sessions 18 . • Obscene material  Punishment • On first conviction  imprisonment of either description up to five years and  fine up to Rs. • Search engines.Bail able. Ingredients • Publishing or transmitting or causing to be published • in the electronic form. Non. 2 lakh  Section covers • Internet Service Providers.

 Ingredients • Securing unauthorised access or attempting to secure unauthorised access • to „protected system‟  Acts covered by this section: • • • • Switching computer on / off Using installed software / hardware Installing software / hardware Port scanning  Punishment • Imprisonment up to 10 years and fine  Cognizable. Non-Bail able. Court of Sessions 19 .

Computer Related Crimes under IPC and Special Laws Sending threatening messages by email Sec 503 IPC Sending defamatory messages by email Forgery of electronic records Bogus websites. cyber frauds Email spoofing Online sale of Drugs Sec 499. 383 IPC Arms Act 20 . 471 IPC Sec 420 IPC Sec 416. 500 IPC Sec 463. 417. 470. 463 IPC NDPS Act Web -Jacking Online sale of Arms Sec.

21 . buried in concrete bunker and is surrounded by nerve gas and very highly paid armed guards. locked in a titanium lined safe. The only system which is truly secure is one which is switched off and unplugged.

22 .

23 .

Sign up to vote on this title
UsefulNot useful