Professional Documents
Culture Documents
JETTAVENI RAMESHKUMAR
22MG201C11
Assistant Professor
A.Rambabu.
Anurag University
2023
1
DECLARATION:
I, Jettaveni Rameshkumar here by declare that the project report entitled on “SOCIAL
IMMERSION PROJECT ON CYBER CRIMES AND CYBER LAW”, submitted by me
is my personal and is authentic work under the guidance of Assistant,prof, A.Rambabu.
Date:
Place:
J.Rameshkumar
22MG201C11
2
SUPERVISOR’S CERTIFICATE:
This is to certify that the project report titled “SOCIAL IMMERSION PROJECT ON
CYBER CRIMES AND CYBER LAW” Is a bonafide work of J.Rameshkumar, roll number
22MG201C11 undertaken for the partial fulfilment of MBA in Anurag University under my
guidance. This project work is original and has not been submitted to any other University or
institution for the award of any degree/certificate.
Assistant,prof, A.Rambabu.
3
ACKNOWLEDGEMENT:
This project work would not have been complete without the mentioned following people. I
express my hearty gratitude to our H.O.D Dr.Vishnu Vandana for providing this
opportunityand platform to work on the project and mentor Assistant,prof, A.Rambabu.who
has supported and guided us throughout our project.
4
ABSTRACT:
5
Table of the content
6
CHAPTER-1
INTRODUCTON
7
BACKGROUND OF THE STUDY :
HISTORY OF CYBER CRIME :-
The first Cyber Crime was recorded within the year 1820. The primeval type of computer has been in
Japan, China and India since 3500 B.C, but Charles Babbagee’s analytical engine is considered as the
time of present day computers. In the year 1820, in France a textile manufacturer named Joseph-Marie
Jacquard created the loom. This device allowed a series of steps that was continual within the weaving
of special fabrics or materials. This resulted in an exceeding concern among the Jacquard's workers
that their livelihoods as well as their traditional employment were being threatened, and prefer to
sabotage so as to discourage Jacquard so that the new technology cannot be utilized in the future.
The cyber crime is evolved from Morris Worm to the ransomware. Many countries including India are
working to stop such crimes or attacks, but these attacks are continuously changing and affecting our
nation.
8
LITERATURE REVIEW:
The following were the major efforts at research in the subject, which have been referred for the
research purpose.
In this book, new trends of cyber-crimes and the legal measures to prevent them are also
described in detail. The book is very useful to aware people including students, lawyers,
bankers, police officers and other people who use computer for personal and trade purpose
about various facets of information technology and cyber-crimes.
Cyber law and crimes, Barkha and U.Rama Mohan, Third edition
13, March 2011
This book provides useful inputs to all sections of the people particularly parents, school
managements and those who are interested in building food character of children. In this
book, Authors put an effort to bring awareness among readers about the types of crimes
hovering over the information technology and to keep them vigilant in tackling such
problems, besides taking precautions while using the internet.
Judd Robbins,
Judd Robbins,
Jerry Wegman, an Associate Professor of Business Law, states, Computer forensics has
developed as an indispensable tool for law enforcement. But in the digital world, as in the
physical l world, the goals of law enforcement are balanced with the goals of maintaining
personal liberty and privacy. Computer forensic investigators must be aware of the legal
environment in which they work, or they risk having the evidence they obtain being ruled
inadmissible.
9
Chapter-2
Problem of statement
Identified
10
NATIONAL SCENARIO:
CYBER SCENARIO IN INDIA (A FEW CASE STUDY) CRIME’S
Bazee.com case
In December 2004 the Chief Executive Officer of Bazee.com was arrested because he was selling a
compact disk (CD) with offensive material on the website, and even CD was also conjointly sold-out
in the market of Delhi. The Delhi police and therefore the Mumbai Police got into action and later the
CEO was free on bail.
11
Andhra Pradesh Tax Case
The owner of the plastics firm in Andhra Pradesh was arrested and cash of Rs. 22 was recovered from
his house by the Vigilance Department. They wanted evidence from him concerning the unaccounted
cash. The suspected person submitted 6,000 vouchers to prove the legitimacy of trade, however when
careful scrutiny the vouchers and contents of his computers it unconcealed that every one of them
were made after the raids were conducted. It had been concealed that the suspect was running 5
businesses beneath the presence of 1 company and used fake and computerized vouchers to show
sales records and save tax. So the dubious techniques of the businessman from the state were exposed
when officials of the department got hold of computers utilized by the suspected person.
SONY.SAMBANDH.COM CASE
India saw its 1st cybercrime conviction. This is the case where Sony India Private Limited filed a
complaint that runs a website referred to as www.sony-sambandh.com targeting the NRIs. The
website allows NRIs to send Sony products to their friends and relatives in India after they pay for it
online. The company undertakes to deliver the products to the involved recipients. In May 2002,
somebody logged onto the web site underneath the identity of Barbara Campa and ordered a Sony
colour television set and a cordless head phone. She requested to deliver the product to Arif Azim in
Noida and gave the number of her credit card for payment. The payment was accordingly cleared by
the credit card agency and the transaction processed. After the related procedures of dues diligence
and checking, the items were delivered to Arif Azim by the company. When the product was
delivered, the company took digital pictures so as to indicate the delivery being accepted by Arif
Azim. The transaction closed at that, but after one and a half months the credit card agency informed
the company that this was an unauthorized transaction as the real owner had denied having made the
purchase. The company had filed a complaint for online cheating at the CBI that registered a case
under the Section 418, Section 419 and Section 420 of the IPC (Indian Penal Code). Arif Azim was
arrested after the matter was investigated. Investigations discovered that Arif Azim, whereas acting at
a call centre in Noida did gain access to the number of the credit card of an American national which
he misused on the company’s site.
12
INTERNATIONAL SCENARIO
2011 PlayStation Network outage, 2011 attack resulting in stolen credentials and incidentally
causing network disruption
Vestige (online store) in 2010, a band of anonymous hackers – has rooted the servers of the site and
leaked half a gigabyte's worth of its private data.
IEEE in September 2012, it exposed user names, plaintext passwords, and website activity for
almost 100,000 of its members.
LivingSocial in 2014, the company suffered a security breach – that has exposed names, e-mail
addresses and password data for up to 50 million of its users
. Adobe in 2013, hackers obtained access to Adobe's networks and s – tole user information and
downloaded the source code for some of Adobe programs. It attacked 150 million customers.
Rock You – in 2009, the company experienced a data breach resulting in the exposure of over 32
million user accounts. Yahoo! in 2012, hackers posted login credentials for more than 453,000 user
accounts.[20] Again in January 2013 and in January 2014
World Health Organization in March 2020, hackers leaked information on login credentials from the
staff members at WHO. In response to cyberattacks, they stated that” Ensuring the security of health
information for Member States and the privacy of users interacting with us a priority for WHO at all
times, but also particularly during the COVID-19 pandemic”
13
Chapter-3
Objectives of the study
14
OBJECTIVE OF THE STUDY :
OTHER OBJECTIVES
15
Chapter-4
Need of study
16
The study of cybercrime is crucial for several reasons:
Cybercrime is often complex and difficult to investigate and prosecute. A study of cybercrime
helps in developing the necessary skills and expertise to investigate and prosecute
cybercriminals successfully.
Cybercrime can result in the theft of personal and sensitive data, such as financial
information and medical records. A study of cybercrime helps in understanding the risks
associated with storing and transmitting such data and developing strategies to protect it.
17
In summary, a study of cybercrime is essential in developing effective strategies to prevent,
investigate, and prosecute cybercriminals, protecting personal and sensitive data, and
ensuring national security.
Chapter-5
Scope of study
18
The scope of studying cyber crimes is quite broad and constantly evolving as
technology advances and new types of cyber crimes emerge. Some of the areas
covered in the study of cyber crimes may include:
Cybercrime Laws: The study of cyber crimes involves understanding the laws and regulations that
govern the use of technology and the internet. This includes both national and international laws, such
as the Computer Fraud and Abuse Act in the United States, the Data Protection Act in the United
Kingdom, and the European Union's General Data Protection Regulation (GDPR).
Types of Cyber Crimes: Cyber crimes can take many forms, including hacking, identity theft, online
scams, phishing, cyberbullying, cyberstalking, and ransomware attacks. The study of cyber crimes
involves understanding these different types of crimes, how they are perpetrated, and how they can be
prevented.
Cybersecurity: The study of cyber crimes also involves learning about cybersecurity and the
different techniques and technologies that can be used to protect computer systems and networks from
attacks. This includes topics such as encryption, firewalls, intrusion detection systems, and security
policies.
Digital Forensics: Digital forensics is the process of collecting, analyzing, and preserving electronic
evidence for use in a court of law. The study of cyber crimes may also include digital forensics and
the tools and techniques used to investigate cyber crimes.
Cyber Ethics: Finally, the study of cyber crimes may also cover topics related to cyber ethics, such as
online privacy, digital citizenship, and responsible use of technology.
19
Overall, the scope of studying cyber crimes is quite broad and requires an interdisciplinary approach,
combining knowledge from computer science, law, criminology, and other fields.
Chapter-6
Research Methodology
20
1.Introduction
This part is about the methodological issues showing how, when and what was done during the whole
research processes. The part includes the area of the study, research design used to carrying out the
study, type of the study, sampling and sample size, sampling frame and sampling procedure, methods
of data collection and method for data analysis.
2. Research Design
The study methodology is qualitative. The data obtained through interview of legal staffs and
stakeholder to enable a suitable role in the study and analysed legislation documents to observed
obstacles facing cybercrime law.
3.Study Location
4. Study Population
The population selected for study were Local people, Legal officers and ICT officer and technician at
the different institutions available in kolkata & Howrah. The selected one were responsible to make
sure that daily activities performed through computer and related technology are safe.
5. Research Instrument
The research instrument used in the study is the different legal document and include structured and
unstructured interview. Interview was conducted to representative from the selected institutions
mentioned above and stakeholders.
21
6. Data Collection
Method For the purpose of this study, the data collected included secondary and primary data.
Secondary data were collected from different published and unpublished records and other materials
that were available through the internet and library such as textbooks, International and Regional
Conventions, Constitutions and other Acts of the House of Representatives of Zanzibar, journals,
periodicals, articles reports, newspapers and some other kinds of publications on matters relating to
the subject. Primary data I have collected the data through Questionnaire distributed to the local
people of Kolkata and Howrah.
SAMPLING METHOD
SAMPLE SIZE
22
CHAPTER-7
FINDINGS
23
FINDINGS:
Most of the respondents yes they have an antivirus software installed on your
PC / Mac.
Most of the respondents said that they are aware are you about cyber crime.
Most of the respondents agrees that they feel safe do you feel when you are
online.
Most of the respondent that they never lost money due to cyber crime.
Most of the respondent that they stopped shopping online due to this issue.
Most of the respondent that they have never been victim of a cyber crime.
Most of the respondent agreed that the laws in effect are able to control cyber
criminals.
24
Chapter-8
Solution or remedy
offered
25