Reasons for Cyber Crime
Download
Report
Transcript Reasons for Cyber Crime
Reasons for Cyber Crime
Date Storage in small space: Removal or deriving
information through physical or virtual medium makes it
much easier;
Easy to Access:
a. Computer System is difficult to guard from
unauthorised access;
b. A logic bomb could be secretly implanted and key
loggers can steal access codes;
c. Advance voice recorders, retina images etc., can fool
biometric systems and bypass firewalls to get past many a
security system
Reasons for Cyber Crime
Date Storage in small space: Removal or deriving
information through physical or virtual medium makes it
much easier;
Easy to Access:
a. Computer System is difficult to guard from
unauthorised access;
b. A logic bomb could be secretly implanted and key
loggers can steal access codes;
c. Advance voice recorders, retina images etc., can
fool biometric systems and bypass firewalls to get past
many a security system
Who are the Usual Cyber Criminals
Children and adolescents between the age group of 6-18 years –
Due to psychological or the thirst to prove themselves outstanding
among other children in their group;
Organised Hackers- In order to fulfil certain objectives like political
bias, fundamentalism etc;
Professional Hackers – These hackers are mostly employed to hack
the site of rivals and get credible, reliable and valuable information;
Discontented Employees- This group includes people who either
get sacked by their employer or are dissatisfied by their employer;
Mode and Manner of Committing Cyber Crime
Theft of Telecommunication ServicesBy gaining access to an organisations telephone switchboard
(PBX); unauthorised access to dial-in / dial-out circuits to make their
own calls or sell call time to third parties;
Communications in furtherance of Criminal Conspiracies- With
enhanced technology telecommunications systems- equipments
being used to facilitate organised drug trafficking, gambling, money
laundering and trade in weapons;
Telecommunications Piracy– This permits reproduction and easy
dissemination of print, graphics, sound and multi media
combinations and includes reproduction of copy righted material
for personal use;
Dissemination of Offensive Materials- This includes
Objectionable content in cyber space like racist propaganda /
instructions for fabrication of explosive devices etc.,
Classification Cyber Crime
CYBER CRIME IS EFFECTED THROUGH
Against Individualsa. Harassment via e-mails;
b. Cyber-Stalking- following a person’s movement across the
internet by posting messages with malafide intention
c. Dissemination of Obscene materials;
d. Un authorised control over computer system or Hacking;
e. E-mail Spooling- Misinterpretation of origin of e-mails;
Against PropertyThis includes computer vandalism or destruction of other’s
properties by transmission of harmful programmes
Against Government– Includes the Medium of Cyber space to
threaten international governments and also to terrorise the
citizens of a country;
Prevention of Cyber Crime
1. Passwords should be strictly guarded;
2. Use latest and update antivirus software to
guard against virus attacks;
3. Use of Cyber Cafe should be avoided;
4. Use of firewalls may be beneficial;
5. Web servers running public sites must be
physically separated and protected from
internal corporate network;
6. Use Security Programme- gives control over
the cookies etc.,;
Offences Covered under IPC & Special
laws
Nature of Offence
Section
Sending threatening messages by e-mail
Sec 503 IPC
Sending defamatory messages by e-mail
Sec 499 IPC
Forgery of electronic Records
Sec 463 IPC
Bogus Websites, Cyber Frauds
Sec 420 IPC
E-mail spoofing
Sec 463 IPC
Web-Jacking / Extortion
Sec 383 IPC
E-mail Abuse / Defamation
Sec 500 IPC
Piracy
Sec 53, 63, 63B of Copy Right Act
Obscenity
Sec 292, 293, 294 of IPC, Indecent
Representation of Women Act
Theft of Computer hardware
Sec 378, 379 of IPC
Offences Under IT Act-2000
Sec 78 of IT Act- 2000- empowers ‘Deputy Superintendent of Police’ to investigate
cases falling under this Act
Nature of Offence
Tampering
documents
with
Section under IT Act
Computer
Source Sec 65
Hacking with Computer Systems, Data Sec 66
Alteration
Publishing Obscene information
Sec 67
Un-authorised access to protected system
Sec 70
Breach of Confidentiality and Privacy
Sec 72
Publishing false digital signature certificates Sec 73
Offences by Company
Sec 85
Role of Legal
1. Ensure Compliance with Cyber laws and other
laws;
2. Advising on IT related IPR, if any;
3. Developing Management reports and
controls;
4. Maintaining statutory records in electronic
form;
5. E-filing of forms / documents under MCA-21,
DGFT and Trade Marks Act;