0% found this document useful (0 votes)
9 views

Module-4

The document outlines the definition and categories of cybercrime, including crimes targeting computer networks and those using networks for other criminal activities. It discusses various related terminologies such as phishing, illegal downloading, child pornography, and cyber scams, along with preventive measures. Additionally, it highlights the Indian IT Act of 2000, detailing specific offenses and penalties associated with cyber crimes.

Uploaded by

sourangshu2008
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Module-4

The document outlines the definition and categories of cybercrime, including crimes targeting computer networks and those using networks for other criminal activities. It discusses various related terminologies such as phishing, illegal downloading, child pornography, and cyber scams, along with preventive measures. Additionally, it highlights the Indian IT Act of 2000, detailing specific offenses and penalties associated with cyber crimes.

Uploaded by

sourangshu2008
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

SOCIETY, LAW AND ETHICS

Cyber Crimes and related terminologies:

Cybercrime is defined as the crime where a computer is the object of the crime or is used as
a tool to commit an offence. Cyber criminals may use computer technology to access or gain
personal information, business trade secrets and use these data for exploitation or malicious
purposes. Cybercrimes are broadly classfied into two categories:

a) Crimes that target computer network or devices. E.g. DOS attacks


b) Crimes that use computer networks to perform other criminal activities. E.g. Cyber
stalking, phishing, fraud, identity theft etc.

Some terminologies related to Cybercrimes are –

i) Phishing:
a) It is an attempt to acquire sensitive information such as usernames, passwords,
other login credentials, credit card details by masquerading as a legitimate entity
or by producing a fake website that looks identical to that of a trusted website.
Phishing emails may contain links to websites that spreads malware.
b) The following steps should be taken against phishing:
i) Never open or download file from an untrusted source.
ii) Keep your operating system up-to-date
iii) Use proper Internet security program.
iv) Confirm the authenticity of a website before entering login credentials.
v) Don’t browse or perform transaction through a website that has http
instead of https.

ii) Illegal Downloading:


a) It is the act of obtaining files that you don’t have the right to use from the internet.
Illegal downloading is the root cause of digital piracy.
b) It involves illegaly sharing copyrighted media such as games, movies, music etc.
c) To avoid illegal downloading-encourage people to obtain it from authenticate
dealers.

iii) Child Pornography:


a) It is the act of transmitting and publishing obscene material about children in
social media.
b) Cyber laws provide sever penalities for producers and distributors those who are
involved in these activities.

iv) Cyber Scams and Frauds:


a) It refers to any scheme that uses components of internet to perform fraudulent
transaction.
b) Different Cyber frauds are:
i) Credit/Debit Card Fraud: Involves the use of credit/debit card to
obtain money or bank information with inappropriate authorization.
ii) Non delivery of Goods/Services: It is a scam in which no product or
service is delivered to the customers even after the payment of
goods/services via a web portal.
iii) Snoofing/Phishing scam: It is a fraud where the imposter pretends as
another person by using the other person’s web identity to perform
business or hack personal information such as bank details or passwords.

v) Cyber Forensics:

a) It is an electronic technique used to determine and reveal technical criminal evidence.


b) It involves electronic data storage extraction for legal purpose.
c) The basic works of the Cyber Forensics are:
 Recover deleted files and where abouts of external devices attached to
a system.
 Recover webpages and emails.
 Recover chat logs and document’s hidden history.
 Recover phone records and SMS from mobile phones.
 Find malware, spyware or other harmful programs.

Indian Information Technology(IT) Act -2000:

The Indian IT ACT 2000 is an act of indian Parliament notified on 17 th October 2000. It is
the primary law to punish cyber criminals and protect data security. The original act contained 94 sections-
divided into 13 chapters and 4 schedules. Persons from other nationalities are also convicted under these
laws if the crimes involve a computer and are done in India. Some Cyber laws are discussed below:

Section Offence Penalty


66A Sending offensive messages via online mode Imprisonment up to 3 years with
fine.
67A Publishing images containing sexual contents Imprisonment up to 7 years.
Fine up to 1 Lakh.
67B Child Pornography 1st Conviction -
Imprisonment up to 5 years.
Fine up to 1 Lakh.
2nd Conviction-
Imprisonment up to 7 years.
Fine up to 1 Lakh.
70 Attempting to steal data from a secure network Imprisonment up to 10 years.
Fine up to 1 Lakh.

71 Misrepresentation or modifying data Imprisonment up to 3 years.


Fine up to 1 Lakh.
72A Disclosing other person’s private information Imprisonment up to 3 years.
Fine up to 5 Lakhs.

You might also like