Mid Regional Police Hetauda - PowerPoint PPT Presentation

slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Mid Regional Police Hetauda PowerPoint Presentation
Download Presentation
Mid Regional Police Hetauda

play fullscreen
1 / 19
Mid Regional Police Hetauda
258 Views
Download Presentation
cirila
Download Presentation

Mid Regional Police Hetauda

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Cyber Crime & Regualtion in Nepal Mid Regional Police Hetauda Presented by : Suresh Kumar Thapa Inspector of Police

  2. What is Cyber Crime ? In general words, we can refer to cyber crime as a crime performed using computers or a network. Cybercrime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet.

  3. Types of Cyber Crime ? • Hacking • Software piracy • Harassment via e-mail • Cyber pornography • Defamation • Morphing • Phishing • Impostor

  4. Hacking Unauthorized access to a computer system or network without the permission of the computer owner/user.

  5. Software piracy Theft of software through the iillegal copying/cracking of genuine programs or the counterfeiting and distribution of products intended to pass for the original.

  6. Harassment via e-mails : Regular sending of harrassing/ Threatening/ Unneccessary emails to someone's email account.

  7. Cyber Pornography Login into porno sites, publish, Print, download and transmit pornographic pictures, photos, writings etc).

  8. Defamation The action of damaging the good reputation of someone; an abusive attack on a person's character or good name

  9. Morphing Change or cause to change smoothly from one image to another by small gradual steps using computer animation techniques

  10. Phishing Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by trustworthy entity in an electronic communication.

  11. Impostor A person who pretends to be someone else in order to deceive others, esp. for fraudulent gain by creating others profile in social network sites like Facebook, twitter, hi5 etc.

  12. Electronic Transaction Act - 2006 To secure and make reliable electronice Transaction, Electronic Transaction Act 2006 was introduced, which states the types of cyber crime in Chapter-9, Section 44-59 : 44. To Pirate, Destroy or Alter computer source code(sDKo'6/ >f]t ;Í]tsf] rf]]/L, gi6 jf kl/jt{g ug{] ) 45. Unauthorized Access in Computer Materials (sDKo'6/ ;fdu|Ldf cglws[t kx'Fr ) 46. Damage to any Computer and Information System(sDKo'6/ / ;"rgf k|0ffnLdf Iflt k'¥ofpg ) 47. Publication of illegal materials in electronic form (ljB'tLo :j?kdf u}/sfg"gL s'/f k|sfzg ug]{) 48. Confidentiality to Divulge (uf]kgLotf eË ug]{) 52. To commit computer fraud (sDKo'6/ hfn;fhL ug]{ )

  13. Legal Issues – Complaint, Investigation and Prosecution Complaint : The Electronic Transaction Act (ETA)(cyber law) 2006 dictates the limitation for complaint with in 35 days of first know-how of crime or being victimized. Prosecution : District Police Office Or the Police Office that has authority to prosecute will furnish initial investigation and forward the case to respective District Court (right now, only Kathmandu District Court )

  14. Legal Issues – Complaint, Investigation and Prosecution Punishment and Penalty : In an attempt to discourage the cyber crime the prevailing law ETA -2006 explains the punishment of at least 6 months to 5 years of jail term and fine of NRs.50,000 to NRs.2,00,000 or both depending on the severity of the crime.

  15. Efforts of Nepal Police to combat Cyber Crime • Installation of dedicated ICT Crime Investigation Cell • Establishment of Digital Forensic Lab at PHQ, Computer Directorate • Public awareness programs • Deployment of IT police personnel (Cyber Cops) • Coordination with Cyber Cafe's to keep the details of the users • Networking with Interpol and other High-Tech Crime Control Centers

  16. Cyber Crimes Complaint Recorded In Crime Division • Many threat and extortion e-mails • Many renowned companies received spam mails from proxy hot mails, yahoo, G-mail demanding money on the name of mainly insurgents groups and so called armed groups. • Phishing • Hacking of newspaper's website by replacing the original content with threat to attack. • Mutilation of a girl’s image and pasted on the porno site • Impostor or Impersonating Profile (Facebook)

  17. Cyber security and ethics • Use anti-virus software and firewalls - keep them upto date • Keep your operating system up to date with critical security updates and patches • Don't open emails or attachments from unknownsources • Use hard-to-guess passwords (use of symbolic and alpha numeric letters). Don’t use words found in a dictionary. • Back-up your computer data on disks or CDs oftensources • Don't share access to your computers with strangers • If you have a wi-fi network, password protect it • Disconnect from the Internet when not in use

  18. Sec_rity is not complete without 'U' Online complaints and suggestions at mrpo@nepalpolice.gov.np Mid Regional Police Office, Hetuada Makwanpur Office : 057-521499 Fax : 057-521498 e-mail : mrpo@nepalpolice.gov.np