Cyberlaw

4,923 views
4,729 views

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
4,923
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
600
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Cyberlaw

  1. 1. A Study of Cyber Crime and The IT ACT in India Suhas Ambade Contact : ambadesuhas@yahoo.co.in
  2. 2. Success in any field of human activity leads to crime that needs mechanisms to control it. The law is as stringent as its enforcement. Crime is no longer limited to space, time or a group of people. In 1990 less than 100000 people log on to the internet worldwide. Now around 500 million people are hooked up to surf the net around the globe. Until recently due to lack of awareness of cyber crime phenomenon, old laws did not quite fit the crimes being committed.
  3. 3. The information technology act 2000 OBJECTIVE The main objective of ITA 2000 was to accord legal recognition to secure electronic records and secure digital signature. The ITA2000 provides authentication of electronic contract by means afixing digital signature. To provide legal recognition to electronic commerce to avoid paper based method of communication and storage of information. LEAGAL PROVISIONS The contract afixed with digital signature are valid and admissible as evidence in the court.
  4. 4. <ul><li>Some of the instances of Violation of Law </li></ul><ul><li>Tampering with Computer Source Code and hacking </li></ul><ul><li>Publishing of Obscene material </li></ul><ul><li>Breach of Confidentiality and privacy </li></ul><ul><li>…… .. Are punishable with imprisonment or fine or both. Legal action further includes confiscation of computer, related material and accessories. </li></ul><ul><li>Network service provider not liable under ITA2000 subject to exceptions. </li></ul>
  5. 5. Why learn about CYBER CRIME ? Because – – Everybody is using COMPUTERS.. – From white collar criminals to terrorist organizations And from Teenagers to Adults – Conventional crimes like Forgery, extortion, kidnapping etc. are being committed with the help of computers – New generation is growing up with computers – MOST IMPORTANT - Monetary transactions are moving on to the INTERNET
  6. 6. WHAT IS COMPUTER CRIME? All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system. COMPUTER CRIME is any crime where – • Computer is a target. • Computer is a tool of crime • Computer is incidental to crime
  7. 7. Profile of Cyber Criminal • Unsatisfied employees. • Teenagers. • Political Hacktivist. • Professional Hackers. • Business Rival. • Ex-Boy Friend /Ex-Girl Friend. • Divorced Husband / Wife. etc
  8. 8. Types of Cyber Crime (This is not exhaustive list of cyber crime) • HACKING • DENIAL OF SERVICE ATTACK • VIRUS Attack • SOFTWARE PIRACY • PORNOGRAPHY • IRC Crime • CREDIT CARD FRAUD • NET EXTORTION • PHISHING • SPOOFING • CYBER DEFAMATION • THREATENING
  9. 9. HACKING Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
  10. 10. DENIAL OF SERVICE ATTACK This is an act by the criminal, who floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or Provide.
  11. 11. VIRUS Attack • Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious softwares)
  12. 12. SOFTWARE PIRACY • Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. • Retail revenue losses worldwide are ever increasing due to this crime • Can be done in various ways- End user copying, Hard disk loading, Counterfeiting, Illegal downloads from the internet etc.
  13. 13. • Pornography is the first consistently successful ecommerce product. • Deceptive marketing tactics and mouse trapping technologies Pornography encourage customers to access their websites. • Anybody including children can log on to the internet and access websites with pornographic contents with a click of a mouse. • Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient interest is an offence under the provisions of section 67 of I.T. Act -2000. STOP PORN PORNOGRAPHY
  14. 14. Spoofing • Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges, so as to obtain access to the other computers on the network.
  15. 15. IRC CRIME Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other • Criminals use it for meeting. • Hackers use it for discussing their exploits / sharing the techniques • Use chat rooms to attract Sexually small children. • Cyber Stalking - In order to harass a woman her telephone number is given to others as if she wants to befriend males
  16. 16. CREDIT CARD FRAUD You simply have to type credit card number into www page of the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner
  17. 17. Is there an additional slot ? FALSE slot Fixed to the original card slot. (Same color and sticker ). Contains additional card reader to copy your card information ..and duplicate your card The micro camera at the side can view the KEYPAD and also the monitor to send wireless picture up to 200metres.
  18. 18. Copying the company’s confidential data in order to extort said company for huge amount.. NET EXTORTION
  19. 19. It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means PHISHING
  20. 20. Recent cases of Cyber crime
  21. 21. The Tejas Ahauja case <ul><li>Tejas Ahuja (22), an independent advisor dealing in shares, allegedly hacked into the demat account of Ali Hussain, a share trader. Tejas operated out of an Internet café. Ahuja then sold 10,800 shares belonging to Ali to as low as 5 paisa per share to himself and sells the same shares to Ali for Rs 57 each, causing him a huge loss. Using IP addresses of the transactions, the police trace and arrested Ahuja. </li></ul>
  22. 22. Ahmedabad Blast : Haywood <ul><li>Five minutes before the blast, an e-mails sent to national TV channels warning about blasts in Ahmedabad. The e-mail is traced to Kenneth Haywood’s computer, who stayed at Gunina apartment in Navi Mumbai. Haywood claimed that his computer was hacked. A technician associated with VSNL had asked him not to change the password of his wireless Internet network. Haywood’s laptop and computer was then sent to the forensic science laboratory at Kalina. </li></ul><ul><li>Wi-fy system used to hack haywood’s account to send the mail. </li></ul>
  23. 23. Parliament Attack Case The Laptop seized from the gunned down terrorist contained several evidences of terrorist’s motives. The sticker of the Ministry of home that they had made on the laptop and pasted on their ambassador car to gain entry into the parliament house and the fake ID card that one of the two terrorists was carrying with the Government of India emblem and seal.
  24. 24. Remidial Actions <ul><li>The Net Accounts should be properly secured by a password. </li></ul><ul><li>The Password should be frequently Changed. </li></ul><ul><li>Never revel the password, pin numbers to others. </li></ul><ul><li>Be cautious While operating ATM. </li></ul>
  25. 25. Thank You

×