What is Cyber Crime

advertisement
Cyber Crime
& Regualtion in Nepal
Mid Regional Police
Hetauda
Presented by :
Suresh Kumar Thapa
Inspector of Police
What is Cyber Crime ?
In general words, we can refer to cyber crime as a crime
performed using computers or a network.
Cybercrime is criminal activity done using computers and the
Internet. This includes anything from downloading illegal music
files to stealing millions of dollars from online bank accounts.
Cybercrime also includes non-monetary offenses, such as
creating and distributing viruses on other computers or posting
confidential business information on the Internet.
Types of Cyber Crime ?

Hacking

Software piracy

Harassment via e-mail

Cyber pornography

Defamation

Morphing

Phishing

Impostor
Hacking
Unauthorized access to a computer system or network without the permission of the
computer owner/user.
Software piracy
Theft of software through the iillegal
copying/cracking of genuine programs or the
counterfeiting and distribution of products
intended to pass for the original.
Harassment via e-mails :
Regular sending of harrassing/ Threatening/ Unneccessary emails to someone's email
account.
Cyber Pornography
Login into porno sites, publish, Print, download and transmit pornographic
pictures, photos, writings etc).
Defamation
The action of damaging the good reputation of someone; an abusive attack on a
person's character or good name
Morphing
Change or cause to change smoothly from one image to another by small gradual steps
using computer animation techniques
Phishing
Phishing is a way of attempting to acquire information such as usernames, passwords, and
credit card details by trustworthy entity in an electronic communication.
Impostor
A person who pretends to be someone else in order to deceive others, esp. for
fraudulent gain by creating others profile in social network sites like Facebook,
twitter, hi5 etc.
Electronic Transaction Act - 2006
To secure and make reliable electronice Transaction,
Electronic
Transaction Act 2006 was introduced, which states the types of cyber
crime in Chapter-9, Section 44-59 :
44. To Pirate, Destroy or Alter computer source code (sDKo'6/ >f]t ;Í]tsf] rf]]/L,
gi6 jf kl/jt{g ug{] )
45. Unauthorized Access in Computer Materials (sDKo'6/ ;fdu|Ldf cglws[t kx'Fr )
46. Damage to any Computer and Information System (sDKo'6/ / ;"rgf
k|0ffnLdf Iflt k'¥ofpg )
47. Publication of illegal materials in electronic form (ljB'tLo :j?kdf u}/sfg"gL
s'/f k|sfzg ug]{)
48. Confidentiality to Divulge (uf]kgLotf eË ug]{ )
52. To commit computer fraud (sDKo'6/ hfn;fhL ug]{ )
Legal Issues – Complaint, Investigation and Prosecution
Complaint :
The Electronic Transaction Act (ETA)(cyber law) 2006
dictates the limitation for complaint with in 35 days of first knowhow of crime or being victimized.
Prosecution :
District Police Office Or the Police Office that has authority to
prosecute will furnish initial investigation and forward the case to
respective District Court (right now, only Kathmandu District
Court )
Legal Issues – Complaint, Investigation and Prosecution
Punishment and Penalty :
In an attempt to discourage the cyber crime the prevailing law
ETA -2006 explains the punishment of at least 6 months to 5
years of jail term and fine of NRs.50,000 to NRs.2,00,000 or
both depending on the severity of the crime.
Efforts of Nepal Police to combat Cyber Crime

Installation of dedicated ICT Crime Investigation Cell

Establishment of Digital Forensic Lab at PHQ, Computer
Directorate

Public awareness programs

Deployment of IT police personnel (Cyber Cops)

Coordination with Cyber Cafe's to keep the details of the users

Networking with Interpol and other High-Tech Crime Control
Centers
Cyber Crimes Complaint Recorded In Crime Division

Many threat and extortion e-mails

Many renowned companies received spam mails from proxy hot
mails, yahoo, G-mail demanding money on the name of mainly
insurgents groups and so called armed groups.

Phishing

Hacking of newspaper's website by replacing the original content
with threat to attack.


Mutilation of a girl’s image and pasted on the porno site
Impostor or Impersonating Profile (Facebook)
Cyber security and ethics

Use anti-virus software and firewalls - keep them upto date

Keep your operating system up to date with critical security
updates and patches

Don't open emails or attachments from unknownsources

Use hard-to-guess passwords (use of symbolic and alpha numeric
letters). Don’t use words found in a dictionary.

Back-up your computer data on disks or CDs oftensources

Don't share access to your computers with strangers

If you have a wi-fi network, password protect it

Disconnect from the Internet when not in use
Sec_rity is not complete without 'U'
Online complaints and suggestions at mrpo@nepalpolice.gov.np
Mid Regional Police Office, Hetuada
Makwanpur
Office : 057-521499
Fax : 057-521498
e-mail : mrpo@nepalpolice.gov.np
Download