You are on page 1of 25

SOCIAL IMMERSION PROJECT

“CYBER CRIMES AND CYBER LAW”

JETTAVENI RAMESHKUMAR

22MG201C11

Under the Supervision of

Assistant Professor

A.Rambabu.

Project submitted in partial fulfilment for the award of the degree of

MASTER OF BUSINESS ADMINISTRATION

Anurag University

Venkatapur (v) Ghatkesar (M),R.R.DIST.

2023

1
DECLARATION:

I, Jettaveni Rameshkumar here by declare that the project report entitled on “SOCIAL
IMMERSION PROJECT ON CYBER CRIMES AND CYBER LAW”, submitted by me
is my personal and is authentic work under the guidance of Assistant,prof, A.Rambabu.

Date:

Place:

J.Rameshkumar

22MG201C11

2
SUPERVISOR’S CERTIFICATE:

This is to certify that the project report titled “SOCIAL IMMERSION PROJECT ON
CYBER CRIMES AND CYBER LAW” Is a bonafide work of J.Rameshkumar, roll number
22MG201C11 undertaken for the partial fulfilment of MBA in Anurag University under my
guidance. This project work is original and has not been submitted to any other University or
institution for the award of any degree/certificate.

Signature of the Guide

Assistant,prof, A.Rambabu.

3
ACKNOWLEDGEMENT:

This project work would not have been complete without the mentioned following people. I
express my hearty gratitude to our H.O.D Dr.Vishnu Vandana for providing this
opportunityand platform to work on the project and mentor Assistant,prof, A.Rambabu.who
has supported and guided us throughout our project.

4
ABSTRACT:

5
Table of the content

6
CHAPTER-1
INTRODUCTON

7
BACKGROUND OF THE STUDY :
HISTORY OF CYBER CRIME :-

The first Cyber Crime was recorded within the year 1820. The primeval type of computer has been in
Japan, China and India since 3500 B.C, but Charles Babbagee’s analytical engine is considered as the
time of present day computers. In the year 1820, in France a textile manufacturer named Joseph-Marie
Jacquard created the loom. This device allowed a series of steps that was continual within the weaving
of special fabrics or materials. This resulted in an exceeding concern among the Jacquard's workers
that their livelihoods as well as their traditional employment were being threatened, and prefer to
sabotage so as to discourage Jacquard so that the new technology cannot be utilized in the future.

1.1. EVOLUTION OF CYBER CRIME

The cyber crime is evolved from Morris Worm to the ransomware. Many countries including India are
working to stop such crimes or attacks, but these attacks are continuously changing and affecting our
nation.

Table-1: Evolution of Cyber Crime

Years Types Of Attacks


1997 Cyber crimes and viruses initiated, that includes Morris Code worm and other.
2004 Malicious code, Torjan, Advanced worm etc.
2007 Identifying thief, Phishing etc.
2010 DNS Attack, Rise of Botnets, SQL attacks etc
2013 Social Engineering, DOS Attack,BotNets, Malicious Emails, Ransomware
attack etc.
Present Banking Malware, Keylogger, Bitcoin wallet, Phone hijacking, Anroid
hack,Cyber warfare etc.

8
LITERATURE REVIEW:
The following were the major efforts at research in the subject, which have been referred for the
research purpose.

Cyber-crimes and legal measures, MAanish Kumar Chaubey.

In this book, new trends of cyber-crimes and the legal measures to prevent them are also
described in detail. The book is very useful to aware people including students, lawyers,
bankers, police officers and other people who use computer for personal and trade purpose
about various facets of information technology and cyber-crimes.

Cyber law and crimes, Barkha and U.Rama Mohan, Third edition
13, March 2011

This book provides useful inputs to all sections of the people particularly parents, school
managements and those who are interested in building food character of children. In this
book, Authors put an effort to bring awareness among readers about the types of crimes
hovering over the information technology and to keep them vigilant in tackling such
problems, besides taking precautions while using the internet.

Judd Robbins,

Judd Robbins, an explanation of Computer Forensics, definition of computer forensics is as


follows: Computer forensics is simply the application of computer investigation and analysis
techniques in the interests of determining potential legal evidence. Evidence might be sought
in a wide range of computer crime or misuse, including but not limited to theft of trade
secrets, theft of or destruction of intellectual property, and fraud.

Judd Robbins,
Jerry Wegman, an Associate Professor of Business Law, states, Computer forensics has
developed as an indispensable tool for law enforcement. But in the digital world, as in the
physical l world, the goals of law enforcement are balanced with the goals of maintaining
personal liberty and privacy. Computer forensic investigators must be aware of the legal
environment in which they work, or they risk having the evidence they obtain being ruled
inadmissible.

9
Chapter-2
Problem of statement
Identified

10
NATIONAL SCENARIO:
CYBER SCENARIO IN INDIA (A FEW CASE STUDY) CRIME’S

The Bank NSP Case:-


In this case a management trainee of a bank got engaged to a marriage. The couple used to exchange
many emails using the company’s computers. After some time they had broken up their marriage and
the young lady created some fake email ids such as “Indian bar association” and sent mails to the
boy’s foreign clients. She used the bank computer to do this .the boy’s company lost a huge number of
clients and took the bank to court.the bank was held liable for the emails sent using the bank’s
systems

Bazee.com case
In December 2004 the Chief Executive Officer of Bazee.com was arrested because he was selling a
compact disk (CD) with offensive material on the website, and even CD was also conjointly sold-out
in the market of Delhi. The Delhi police and therefore the Mumbai Police got into action and later the
CEO was free on bail.

Parliament Attack Case


The Bureau of Police Research and Development, Hyderabad had handled this case. A laptop was
recovered from the terrorist who attacked the Parliament. The laptop which was detained from the two
terrorists, who were gunned down on 13th December 2001 when the Parliament was under siege, was
sent to Computer Forensics Division of BPRD. The laptop contained several proofs that affirmed the
two terrorist9s motives, mainly the sticker of the Ministry of Home that they had created on the laptop
and affixed on their ambassador car to achieve entry into Parliament House and the fake ID card that
one of the two terrorists was carrying with a Government of India emblem and seal. The emblems (of
the 3 lions) were carefully scanned and additionally the seal was also craftly created together with a
residential address of Jammu and Kashmir. However careful detection proved that it was all forged
and made on the laptop.

11
Andhra Pradesh Tax Case
The owner of the plastics firm in Andhra Pradesh was arrested and cash of Rs. 22 was recovered from
his house by the Vigilance Department. They wanted evidence from him concerning the unaccounted
cash. The suspected person submitted 6,000 vouchers to prove the legitimacy of trade, however when
careful scrutiny the vouchers and contents of his computers it unconcealed that every one of them
were made after the raids were conducted. It had been concealed that the suspect was running 5
businesses beneath the presence of 1 company and used fake and computerized vouchers to show
sales records and save tax. So the dubious techniques of the businessman from the state were exposed
when officials of the department got hold of computers utilized by the suspected person.

SONY.SAMBANDH.COM CASE
India saw its 1st cybercrime conviction. This is the case where Sony India Private Limited filed a
complaint that runs a website referred to as www.sony-sambandh.com targeting the NRIs. The
website allows NRIs to send Sony products to their friends and relatives in India after they pay for it
online. The company undertakes to deliver the products to the involved recipients. In May 2002,
somebody logged onto the web site underneath the identity of Barbara Campa and ordered a Sony
colour television set and a cordless head phone. She requested to deliver the product to Arif Azim in
Noida and gave the number of her credit card for payment. The payment was accordingly cleared by
the credit card agency and the transaction processed. After the related procedures of dues diligence
and checking, the items were delivered to Arif Azim by the company. When the product was
delivered, the company took digital pictures so as to indicate the delivery being accepted by Arif
Azim. The transaction closed at that, but after one and a half months the credit card agency informed
the company that this was an unauthorized transaction as the real owner had denied having made the
purchase. The company had filed a complaint for online cheating at the CBI that registered a case
under the Section 418, Section 419 and Section 420 of the IPC (Indian Penal Code). Arif Azim was
arrested after the matter was investigated. Investigations discovered that Arif Azim, whereas acting at
a call centre in Noida did gain access to the number of the credit card of an American national which
he misused on the company’s site.

12
INTERNATIONAL SCENARIO

(WORLD'S LARGEST CYBERATTACKS)

Here is Top 10 of the world's largest cyber attacks

 2011 PlayStation Network outage, 2011 attack resulting in stolen credentials and incidentally
causing network disruption

 Vestige (online store) in 2010, a band of anonymous hackers – has rooted the servers of the site and
leaked half a gigabyte's worth of its private data.

 IEEE in September 2012, it exposed user names, plaintext passwords, and website activity for
almost 100,000 of its members.

 LivingSocial in 2014, the company suffered a security breach – that has exposed names, e-mail
addresses and password data for up to 50 million of its users

.  Adobe in 2013, hackers obtained access to Adobe's networks and s – tole user information and
downloaded the source code for some of Adobe programs. It attacked 150 million customers.

 Rock You – in 2009, the company experienced a data breach resulting in the exposure of over 32
million user accounts.  Yahoo! in 2012, hackers posted login credentials for more than 453,000 user
accounts.[20] Again in January 2013 and in January 2014

 World Health Organization in March 2020, hackers leaked information on login credentials from the
staff members at WHO. In response to cyberattacks, they stated that” Ensuring the security of health
information for Member States and the privacy of users interacting with us a priority for WHO at all
times, but also particularly during the COVID-19 pandemic”

13
Chapter-3
Objectives of the study

14
OBJECTIVE OF THE STUDY :

MAIN OBJECTIVE OF THE RESEARCH


The principle target of our paper is to spread the knowledge of the crimes or offences that take place
through the internet or the cyberspace, along with the laws that are imposed against those crimes and
criminals. We are additionally trying to focus on the safety in cyberspace.

OTHER OBJECTIVES

 To know about Cyber crime and cyber Law;

 To know about Cyber Crime and Origin of Cyber Crime;

 To Describe the Cyber Crimes and Conventional Crimes;

 To Discuss the Distinction between Conventional & Cyber Crime;

 To Describe the Classification of Cyber Crime;

 To Explain the technology in cyber crime;

 To Discuss the Categories of Cyber Crimes;

 To Explain the Cyber Crime;

15
Chapter-4
Need of study

16
The study of cybercrime is crucial for several reasons:

Understanding the nature and scope of cybercrime:

Cybercrime encompasses a wide range of criminal activities, including hacking, identity


theft, online fraud, cyberbullying, and cyberstalking. A study of cybercrime helps in
understanding the nature and scope of these activities, the methods used by cybercriminals,
and the impact on individuals, businesses, and society.

Developing strategies to prevent cybercrime:

A study of cybercrime helps in identifying the vulnerabilities in computer systems, networks,


and software that cybercriminals exploit. This information is crucial in developing strategies
to prevent cybercrime, such as implementing security protocols, educating users on safe
online practices, and enforcing laws and regulations.

Investigating and prosecuting cybercrime:

Cybercrime is often complex and difficult to investigate and prosecute. A study of cybercrime
helps in developing the necessary skills and expertise to investigate and prosecute
cybercriminals successfully.

Protecting personal and sensitive data:

Cybercrime can result in the theft of personal and sensitive data, such as financial
information and medical records. A study of cybercrime helps in understanding the risks
associated with storing and transmitting such data and developing strategies to protect it.

Ensuring national security:

Cybercrime can pose a significant threat to national security by targeting critical


infrastructure, such as power grids and communication systems. A study of cybercrime helps
in developing strategies to protect such infrastructure and ensure national security.

17
In summary, a study of cybercrime is essential in developing effective strategies to prevent,
investigate, and prosecute cybercriminals, protecting personal and sensitive data, and
ensuring national security.

Chapter-5
Scope of study

18
The scope of studying cyber crimes is quite broad and constantly evolving as
technology advances and new types of cyber crimes emerge. Some of the areas
covered in the study of cyber crimes may include:

Cybercrime Laws: The study of cyber crimes involves understanding the laws and regulations that
govern the use of technology and the internet. This includes both national and international laws, such
as the Computer Fraud and Abuse Act in the United States, the Data Protection Act in the United
Kingdom, and the European Union's General Data Protection Regulation (GDPR).

Types of Cyber Crimes: Cyber crimes can take many forms, including hacking, identity theft, online
scams, phishing, cyberbullying, cyberstalking, and ransomware attacks. The study of cyber crimes
involves understanding these different types of crimes, how they are perpetrated, and how they can be
prevented.

Cybersecurity: The study of cyber crimes also involves learning about cybersecurity and the
different techniques and technologies that can be used to protect computer systems and networks from
attacks. This includes topics such as encryption, firewalls, intrusion detection systems, and security
policies.

Digital Forensics: Digital forensics is the process of collecting, analyzing, and preserving electronic
evidence for use in a court of law. The study of cyber crimes may also include digital forensics and
the tools and techniques used to investigate cyber crimes.

Cyber Ethics: Finally, the study of cyber crimes may also cover topics related to cyber ethics, such as
online privacy, digital citizenship, and responsible use of technology.

19
Overall, the scope of studying cyber crimes is quite broad and requires an interdisciplinary approach,
combining knowledge from computer science, law, criminology, and other fields.

Chapter-6
Research Methodology

20
1.Introduction

This part is about the methodological issues showing how, when and what was done during the whole
research processes. The part includes the area of the study, research design used to carrying out the
study, type of the study, sampling and sample size, sampling frame and sampling procedure, methods
of data collection and method for data analysis.

2. Research Design

The study methodology is qualitative. The data obtained through interview of legal staffs and
stakeholder to enable a suitable role in the study and analysed legislation documents to observed
obstacles facing cybercrime law.

3.Study Location

The study conducted in kolkata & Hyderabad

4. Study Population

The population selected for study were Local people, Legal officers and ICT officer and technician at
the different institutions available in kolkata & Howrah. The selected one were responsible to make
sure that daily activities performed through computer and related technology are safe.

5. Research Instrument

The research instrument used in the study is the different legal document and include structured and
unstructured interview. Interview was conducted to representative from the selected institutions
mentioned above and stakeholders.

21
6. Data Collection

Method For the purpose of this study, the data collected included secondary and primary data.
Secondary data were collected from different published and unpublished records and other materials
that were available through the internet and library such as textbooks, International and Regional
Conventions, Constitutions and other Acts of the House of Representatives of Zanzibar, journals,
periodicals, articles reports, newspapers and some other kinds of publications on matters relating to
the subject. Primary data I have collected the data through Questionnaire distributed to the local
people of Kolkata and Howrah.

SAMPLING METHOD

I have used simple random sampling method for my research

SAMPLE SIZE

I used 100 samples for my study

22
CHAPTER-7
FINDINGS

23
FINDINGS:

The findings of this research are as follows:

 Most of the respondents yes they have an antivirus software installed on your

PC / Mac.

 Most of the respondents said that they are aware are you about cyber crime.

 Most of the respondents agrees that they feel safe do you feel when you are

online.

 Most of the respondent feel it is essential to be safe online.

 Most of the respondent that they never lost money due to cyber crime.

 Most of the respondent that they experienced any of these situations.

 Most of the respondent that they stopped shopping online due to this issue.

 Most of the respondent that they have never been victim of a cyber crime.

 Most of the respondent agreed that the laws in effect are able to control cyber

criminals.

24
Chapter-8
Solution or remedy
offered

25

You might also like