You are on page 1of 19

PRESENTED BY

Cali Jeffreena and


Swetha
II BSc.Computer
Technology
Sri Krishna Arts and
Criminal activity involving
Information technology infrastructure
 Illegal access
Data interference
Misuse of devices
Forgery and
 Electronic fraud.

www.company.com
• Children and adolescents between the
age group of 6 – 18 years
• Organised hackers
• Professional hackers / crackers
• Discontented employees
• Unauthorized access to computer systems or networks /
Hacking
• Theft of information contained in electronic form
• Email bombing
• Data diddling
• Salami attacks
• Denial of Service attack
• Virus / worm attacks
• Logic bombs
• Trojan attacks
• Internet time thefts
• Web jacking
CLASSIFICATION
Against Individuals
 Against Individual Property
Against Organization
Against Society at large 
Harassment via e-mails.
Cyber-stalking.
Dissemination of obscene material.
Defamation. Unauthorized control/access over
computer system.
Indecent exposure
Email spoofing
Cheating & Fraud

www.company.com
• Computer vandalism.
• Transmitting virus.
• Unauthorized control/access over computer system.
• Intellectual Property crimes
• Internet time thefts
Unauthorized control/access over computer
system
Possession of unauthorized information.
Cyber terrorism against the government
organization.
Distribution of pirated software etc.
Pornography (basically child pornography).
 Polluting the youth through indecent
exposure.
 Trafficking
Financial crimes
Sale of illegal articles
Online gambling
Forgery
• The hurry in which the legislation was passed, without
sufficient public debate, did not  really serve the desired
purpose
• Cyber laws, in their very preamble and aim, state that they are
targeted at aiding e-commerce, and are not meant to regulate
cybercrime
• Cyber torts
• Cyber crime in the Act is neither comprehensive nor exhaustive
• Ambiguity in the definitions
• Uniform law
• Lack of awareness
• Jurisdiction issues
• Extra territorial application
• Raising a cyber army
• Hesitation to report offences
HOW TO DEAL WITH THIS
PROBLEM
International Agreements and Cooperation –Essential
due to the Worldwide Nature of the Internet
Software and Hardware defenses
(e.g., antispam, antivirus software, firewalls)
Other practical steps….
 Avoid disclosing any information pertaining to
oneself.
 Avoid sending any photograph online particularly
to strangers.
 Use latest and up date anti virus software.
 Keep back up volumes.
 Never send your credit card number to any site
that is not secured.
 Use of firewalls may be beneficial.
CONCLUSION
• The only possible step is to make people aware
of their rights and duties (to report crime as a
collective duty towards the society) and further
making the application of the laws more
stringent to check crime.

You might also like