cyber crime faizan project

Post on 18-May-2015

983 Views

Category:

Education

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

PRESENTED BYPresented byFaizan Ahmad09-arid-1380M.Sc. Sociology 3rd

CRIMINAL ACTIVITY INVOLVINGINFORMATION TECHNOLOGY INFRASTRUCTURE ILLEGAL ACCESS DATA INTERFERENCE MISUSE OF DEVICESFORGERY AND ELECTRONIC FRAUD.

• Children and adolescents between the age group of 6 – 18 years

• Organised hackers• Professional hackers / crackers • Discontented employees

• Unauthorized access to computer systems or networks / Hacking

• Theft of information contained in electronic form

• Email bombing• Data diddling• Salami attacks• Denial of Service attack• Virus / worm attacks• Logic bombs• Trojan attacks• Internet time thefts• Web jacking

CLASSIFICATION

Against Individuals

 Against Individual Property

Against Organization

Against Society at large 

Harassment via e-mails.Cyber-stalking.Dissemination of obscene material.Defamation. Unauthorized control/access over computer system.Indecent exposureEmail spoofing Cheating & Fraud

• Computer vandalism.• Transmitting virus.• Unauthorized control/access over

computer system.• Intellectual Property crimes• Internet time thefts

Unauthorized control/access over computer systemPossession of unauthorized information.Cyber terrorism against the government organization.Distribution of pirated software etc.

Pornography (basically child pornography). Polluting the youth through indecent exposure. Trafficking Financial crimes Sale of illegal articles Online gambling Forgery

• The hurry in which the legislation was passed, without sufficient public debate, did not  really serve the desired purpose

• Cyber laws, in their very preamble and aim, state that they are targeted at aiding e-commerce, and are not meant to regulate cybercrime

• Cyber torts• Cyber crime in the Act is neither comprehensive nor exhaustive• Ambiguity in the definitions• Uniform law• Lack of awareness• Jurisdiction issues• Extra territorial application• Raising a cyber army• Hesitation to report offences

HOW TO DEAL WITH THIS PROBLEM

International Agreements and Cooperation –Essential due to the Worldwide Nature of the Internet

Software and Hardware defenses (e.g., antispam, antivirus software, firewalls)Other practical steps….

Avoid disclosing any information pertaining to oneself.

Avoid sending any photograph online particularly to strangers.

Use latest and up date anti virus software.Keep back up volumes.Never send your credit card number to any site

that is not secured.Use of firewalls may be beneficial.

CONCLUSIONCONCLUSION

• The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime.

top related