Community Service Project(Ramya)[1]
Community Service Project(Ramya)[1]
Technology
in
INFORMATION TECHNOLOGY
Submitted by : -
CHINTA LAKSHMI RAMYA KEERTHANA -21KE1A1215
V.SUDHAKAR
2021-2025
DEPARTMENT OF INFORMATION TECHNOLOGY
2021-2025
Vision of the Department
CERTIFICATE
This is to certify that the community service project report entitled “CYBER CRIMES” is being
submitted by
a record of bonafide work carried out by them under my guidance and supervision. The
results embodied in this project report have not been submitted to any other University or
Instituted for the award of any degree or diploma.
ACKNOWLEDGEMENT
We would like to express a deep sense of the gratitude and thanks
profusely to our guide Dr .K. SUNITHA without wise counsel and able
to guidance, it would have been impossible to complete the project
in this manner.
Special thanks to our friends for their co-operation during our course
of study.
Last but not least ,we wish to thank our parentsand family members
without whom it is impossible for us stay at this level.
CHINTA LAKSHMI RAMYA KEERTHANA(21KE1A1215)
DARAM POOJITHA (21KE1A1218)
PASALA MEGHANA (21KE1A1246)
Introduction :
Cyberlaws in world :
Analysis :
Outcomes :
Recommendations :
Suggestions :
Survey questions :
Conclusion :
ABSTRACT
Cyber crimes are a new class of crimes to India rapidly expanding due to extensive use of Internet.
Dishonest and greedy people take advantage of easy and free access to Internet and perform any
acts to satisfy their needs. The need could be physiological or psychological in nature.2 Online
shopping and wide use of “social media” are root cause of cyber crimes. Much awareness created
for cyber crimes and users were educated. But still people do not complain it to authorities. Even
somebody do it then also police or crime branch unable to clear such complains in reasonable time
period. Delay in justice will lead to NO registration of complain. This is not healthy situation in free
democratic INDIA. The law IT (Information Technology) Act 2000 and several sections of the IPC are
in place but in large population country like China and India, it is very difficult to control crime
caused by cyber world. We need to have self control for better society. We shall evaluate impact of
social media, trends towards shopping online and punishment for cyber attackers in this paper. We
shall also try to prepare road map for Indian and recommend approach suitable for young
generation of India.
INTRODUCTION
Activity in which computers or networks are a tool, target, or a place of criminal activity.
cyber crime is a subset of computer crime. In a cyber crime, the computer network can
be;
Offences that are committed against individuals or group of individuals with a criminal
motive to intentionally harm the reputation of the victim or cause physical or mental
harm to the victim directly or indirectly, using modern telecommunication networks such
as internet .
Cyber crime is a term for any illegal activity that uses a computer as its primary means of
communication. The U.S. department of Justice expands the definition of cyber crime
and includes any illegal activity that uses a computer for the storage of evidence.
Cyber crime also stated as any use of a computer as an instrument of further illegal
ends, such as;
Committing fraud
Stealing identities
SOCIO ECONOMIC OF CYBER CRIME
Offences that are committed against individuals or group of individuals with a criminal
motive to intentionally harm the reputation of the victim or cause physical or mental
harm to the victim directly or indirectly, using modern telecommunication networks
such a s internet.
Cyber crime is a term for any illegal activity that uses a computer as its primary means of
communication. The U.S. department of Justice expands the definition of cyber crime
and includes any illegal activity that uses a computer for the storage of evidence.
Cyber crime also stated as any use of a computer as an instrument of further illegal
ends, such as;
programs or other executable system software causing damage fo the files.
Spoofing : Spoofing is the creation of TCP/IP packets using somebody else’s IP address.
Netsplonage: Netsplonage occurs when perpetrators back into online systems or individual
PCs to obtain confidential information for the purpose of selling it to other parties.
India has enacted the first I.T. Act, 2000 based on the UNCIRAL model
recommended by the general assembly of the United Nations.
Offences under IT acts are:
• Tampering with computer source document
• Hacking with computer systems, data alterations
• Publishing obscene information
• Un-authorized access to protected systems
• Breach of confidentiality and privacy
• Publishing false digital signature certificates.
• India has entacted the first I.T Act ,2000 based on the UNCIRAL model
recommend by the general assembly of the United nations.
• India has entacted the first I.T Act ,2000 based on the UNCIRAL model
recommend by the general assembly of the United nations.
To put it simply, cyber law refers to the body of rules and regulations
governing the use of the internet and other forms of networking and
information technology in accordance with established norms of law, justice,
and ethics. It is relevant to the internet and associated technologies.
In today’s increasingly digital society, cybercrime is on the rise, necessitating
the development of cyber laws to combat it. Cyber laws outline guidelines for
how individuals and businesses should conduct themselves when engaging in
online or digital activities. In addition to reducing the effects of cybercrime,
prevention measures like securing data against hackers and other
unauthorized users can help keep sensitive information like emails, employee
records, and company files safe from prying eyes.
Users of the Internet need to be familiar with the cyber law of their country in
order to make informed decisions about what to do and what not to do online.
In 1986, Congress passed the Computer Fraud and Abuse Act (also known as
CCFA). This law is useful because it both discourages illegal behavior and holds
offenders accountable for their transgressions.
To put it simply, cyber law refers to the body of rules and regulations
governing the use of the internet and other forms of networking
and information technology in accordance with established
norms of law, justice, and ethics. It is relevant to the internet
and associated technologies.
In today’s increasingly digital society, cybercrime is on the rise,
necessitating the development of cyber laws to combat it. Cyber
laws outline guidelines for how individuals and businesses should
conduct themselves when engaging in online or digital activities.
In addition to reducing the effects of cybercrime, prevention
measures like securing data against hackers and other
unauthorized users can help keep sensitive information like
emails, employee records, and company files safe from prying
eyes.
Users of the Internet need to be familiar with the cyber law of
their country in order to make informed decisions about what
to do and what not to do online.
In 1986, Congress passed the Computer Fraud and Abuse Act (also known as
CCFA). This law is useful because it both discourages illegal behavior and holds
offenders accountable for their transgressions.
TYPES OF CIBER CRIME :-
1. Phishing
When a user receives spam emails that contain unauthorized
attachments or URLs luring them to open the same, it is called phishing. The
objective of this act is to gain personal information of users or organizations by
tricking them. Some of them may be flagged but most of them do not show
the signs of any malpractice on the face.
• The cyber criminal may not directly harm the device being used but may
cause financial loss to the user due to credentials shared, data loss due
to website access that results in identity theft, etc. If you are a victim of
phishing, lawyers for mail fraud may help with the legality and how to
proceed to safeguard confidential data in future.
2. Identity Theft
As the term itself suggests, identity theft happens when someone
else impersonates the original user. The cyber criminal steals personal
information of the users for fraudulent purposes.
The other day, someone posted on social media that she got an email
from her boss’ account seeking a handsome amount to be transferred in
a client’s account. Without verification, she transferred the amount and
succeeded as a target of identity theft causing financial fraud. This is an
instant example of identity theft.
3. Social Engineering
When malicious activities are committed through the internet with a
personal touch, it is termed as social engineering. They use
psychological manipulation tricks through calls impersonating an
official to defraud the users so that they share confidential information.
In India, credit card fraud is usually committed in a similar way when
someone calls the users, conveys to be a bank official and asks the users
to share the one time password received on their mobile to safeguard
their financial interests or bank accounts, etc.
4. Denial of Service (DoS)
• There are various websites that provide services online to their
customers. If the website has errors in proper functioning, the services
will be impacted. That is how denial of service (DoS) works. Fraudsters
overwhelm the website with more traffic affecting online networks and
thereby interrupting the services. Sometimes, the attack is distributed
using various compromised computer devices and thus, is termed as
Distributed Denial of Services (DDoS).
5.Ransomare
When someone takes into illegal custody a person or property to threaten
another and seeks financial benefits in return of saving such interests, it is
called ransom money. Among the types of cyber crime, when fraudsters steal
your confidential or personal information and threaten to misuse or delete the
same unless the users transfer a certain amount to safeguard or access such
information/ data, it is called ransomware. Cyber criminals usually extort users
through locking the information and seeking transfer of cryptocurrency.
6. Malware Attacks
People using smartphones with internet connection are sometimes
tracked for location, for their internet searches, the usernames and password
typed on their device, through web cameras, etc.. At times, it could be legal
and informed due to app permissions, but at other times, it may not
bconfidential data. Such an uninformed activity on devices which may sneak e
brought in the user’s knowledge and become a serious threat to personal
information resulting in bigger financial frauds or other threatening acts are
called malware attacks. The targets could be individuals or big organizations or
even the governmental departments.
8. Web Jacking
Digital marketing is the new normal which lured businesses into having
their own websites. More traffic on the website indicates more people
knowing about their goods/ services/ brand. But what if someone else steals
all the traffic from your website using some malware practice? That is how
webjacking works among the serious types of cybercrimes. It could be done by
gaining administrator access to the URL through malicious means thereby
tampering the Domain Name System (DNS) redirecting users to another
webpage.
9. Botnets
Networks from compromised computer devices which are under control
of an external group of remote hackers are known as botnets. It
becomes a tool for such hackers to attack other devices, or act as a
malware for performing malicious activities over the internet.
15.Computer Vandalism:
It is an act of physical destroying computing resources using
physical force or malicious code.
Thehackersmaybeclassifiedas:
• White Hat: white hat hackers are the persons who hack
the system to find the security vulnerabilities of a system
and notify to the organizations so that a preventive
action can be taken to protect the system from outside
hackers. White hat hackers may be paid employee of an
organization who is employed to find the security
loopholes, or may be a freelancer who just wants to
prove his mantle in this field. They are popular known as
ethical hackers.
18. Spamming:
Sending of unsolicited and commercial bulk message over the
internet is known as spamming. An email can be classified as
spam, if it meets following criteria:
19.Email Spoofing:
It is a process of changing the header information of an e-mail
so that its original source is not identified and it appears to an
individual at the receiving end that the email has been
originated from source other than the original source .
21.Salami Attack
It is an attack which proceeds with small increments and final
add up to lead to a major attack. The increments are so small
that they remain unnoticed. An example of salami attack is
gaining access to online banking of an individual and
withdrawing amount in such a small amounts that it remains
unnoticed by the owner. Often there is default trigger set in
the banking website and transactions below say, $1000
withdrawal are not reported to the owner of the account.
Withdrawing amount of $1000 over a period of time will lead
to total withdrawal of a large sum.
• a workshop in the village with the help volunteers and other supporting
members.
• carried out transactions via online banking. They also tried to hack
accounts of various
• wake-up call for all those individuals and companies who are still
vulnerable to cyber
• lakh rupees from different bank accounts. The number of victims was
over 50 and it was
• believed that they were holding the account details of more than 300
ATM users across
• Never believe anyone especially a stranger and don’t share your personal
information with them
RECOMMENDATIONS
Fostering Linkages:
With the increasing cyber crimes, the government has also set up cyber
crime police
Always beware about whom you share your bank details with. Never
entertain any calls
in the name banks and never share any of your information related to
the bank on
Suggestions
threats. It has become painfully clear that neither the government nor
the private sector can solve
the problem on its own. There must be a joint effort in protecting our
country‘s national interest