SlideShare a Scribd company logo
1 of 10
Salami
Attack
Hacking
Cracking
Cloud
Computing
DataBase
I.P.
Spoofing
E-Mail
Bombing
Online
Gambling
Data
Drilling
Cyber
Bullying
Mobile
Malware
E-
Commerce
Frauds
Money
Laundering
Cyber
Terrorism
Privacy
Violation
Porno-
graphy
Data
Theft
Cyber
Squatting
Tempering
Evidences
Cyber
Stalking
Phone
Phishing
Virus
Attack
ж Pat of evidence is crime scene issue.
ж In Cyber Crime there is NO Cyber Crime
ж Nothing can be seen as scene in cyber crime.
ж Evidences may lie in many computer system
than the host system.
ж Easily destruction of evidences by
formatting, reconfiguring , removing history
& cookies, changing registries.
ж PC history and log files are volatile in
nature.
Encryption
• converting plain text into coded language and then sharing it
Synchronised Passwords
• One Time Password for getting logged in to server
Firewalls
• permits access to the system to ones already registered
Digital Signatures
• Validate the authenticity of messages or digital documents
Others
•Install security system, software
•Limit personal info. sharing online
2nd
SPAM MAIL
AND FAKE APPS
FORWARDING
3rd DATA STEALING
MALWARE
4th MOBILE MALWARE
5th
ORGINATOR OF
INTERNET
THREAT
MOST CYBER
CRIME AFFECTED
COUNTRY
“The most startling aspect of the new amendments is that the
amendments seek to make Indian Cyber Law a crime friendly
legislation that goes externally soft on cyber criminals, with
a soft heart and that chooses to encourage cyber criminals by
lessening the quantum of punishment, a legislation which
makes a majority of cyber-crimes stipulated under the IT Act
as bailable offenses that is likely to pave way for India to
become the potential cyber-crime capital of the world…”
CYBER LAW EXPERT &
SUPREME COURT
ADVOCATE
Case Examples
C.A. Students Hacked Down Accounts (2013)
Google Inc. Spain vs. AEPD & Mario Costeja (2014)
Vulnerability in Samsung Galaxy phones (June,2015)
Northeast Blackout Of 2003 (U.S.)
Watchdogs Game by Ubisoft Montreal
The court of Justice of the European Union judgment states
that, Google's search activities involve the processing of
personal data, but Google does not thereby become a data
controller for the content of the material when the
processing is carried out in an indiscriminate and random
manner therefore Google has no right to violate right to
privacy and the right to be forgotten must be exercised on
regular basis in order to keep the data updated.
22 June: Salman Khan and Shah Rukh Khan
24 June: M.S. Dhoni account
26 June: Anil Ambani
04 July: Sachin Tendulkar
Hacking was done by just entering the PAN Number, Date
Of Birth and Mother’s Maiden name of these individuals on
e-filing website.
14 August 2003 software bug in alarm system at the
control room of Ohio overloaded the transmission lines
causing blackout in Northeast & Midwestern part of U.S.
Samsung phones come pre-installed with the Swift
keyboard which has a vulnerability that could allow an
attacker to remotely tap into sensors of GPS, camera and
microphone, eavesdrop on text messages and calls,
secretly install malicious app(s) & attempting to access
sensitive personal data.
 Crime free society is Utopian
 Law makers has to go extra mile to keep
fraudsters at bay
 Technology has always been a Double Edged
Sword
 Technologies falling in wrong hands with a
criminal intent, comes under gamut of cyber
crime and becomes a punishable offense
 Duty of law makers, internet service provider
and users to ensure compliance with law

More Related Content

What's hot

Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
Krishma Sandesra
 
Spoofing
SpoofingSpoofing
Spoofing
Sanjeev
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
Linda Barron
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
 

What's hot (19)

Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Phishing demo
Phishing demoPhishing demo
Phishing demo
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Spoofing
SpoofingSpoofing
Spoofing
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
PowerPoint Presentation: Hacking
PowerPoint Presentation: HackingPowerPoint Presentation: Hacking
PowerPoint Presentation: Hacking
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
My presentation
My presentationMy presentation
My presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 

Similar to Threats due to information technology icai

Casues of Cybercrime and Preventive Measures.pptx
Casues of Cybercrime and Preventive Measures.pptxCasues of Cybercrime and Preventive Measures.pptx
Casues of Cybercrime and Preventive Measures.pptx
JzendoCulbertson
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
anilinvns
 

Similar to Threats due to information technology icai (20)

A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Online Privacy: How to Protect Your Activity and Communications
Online Privacy: How to Protect Your Activity and CommunicationsOnline Privacy: How to Protect Your Activity and Communications
Online Privacy: How to Protect Your Activity and Communications
 
Casues of Cybercrime and Preventive Measures.pptx
Casues of Cybercrime and Preventive Measures.pptxCasues of Cybercrime and Preventive Measures.pptx
Casues of Cybercrime and Preventive Measures.pptx
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

More from Mayank Garg

Production and operational management
Production and operational managementProduction and operational management
Production and operational management
Mayank Garg
 
marketing of services of door step service
marketing of services of door step servicemarketing of services of door step service
marketing of services of door step service
Mayank Garg
 
RBI Banking Insurance Services PPT
RBI Banking Insurance Services PPTRBI Banking Insurance Services PPT
RBI Banking Insurance Services PPT
Mayank Garg
 
Project consistency check kendriya bhandar and super market
 Project consistency check kendriya bhandar and super market Project consistency check kendriya bhandar and super market
Project consistency check kendriya bhandar and super market
Mayank Garg
 
Organisational Behaviour case study conflict management
Organisational Behaviour  case study conflict managementOrganisational Behaviour  case study conflict management
Organisational Behaviour case study conflict management
Mayank Garg
 

More from Mayank Garg (20)

Production and operational management
Production and operational managementProduction and operational management
Production and operational management
 
marketing of services of door step service
marketing of services of door step servicemarketing of services of door step service
marketing of services of door step service
 
consumer behavior on alcohol
consumer behavior on alcohol consumer behavior on alcohol
consumer behavior on alcohol
 
GIWA Tashkent Expo report live project
GIWA Tashkent Expo report live projectGIWA Tashkent Expo report live project
GIWA Tashkent Expo report live project
 
Principles Of Banking Sector
Principles Of Banking Sector Principles Of Banking Sector
Principles Of Banking Sector
 
RBI Banking Insurance Services PPT
RBI Banking Insurance Services PPTRBI Banking Insurance Services PPT
RBI Banking Insurance Services PPT
 
Project consistency check kendriya bhandar and super market
 Project consistency check kendriya bhandar and super market Project consistency check kendriya bhandar and super market
Project consistency check kendriya bhandar and super market
 
Market plan store to door
Market plan store to doorMarket plan store to door
Market plan store to door
 
Global business communication
Global business communicationGlobal business communication
Global business communication
 
SWOT and BCG Matrix of ITC Company Competitive Marketing
SWOT and BCG Matrix of ITC Company Competitive MarketingSWOT and BCG Matrix of ITC Company Competitive Marketing
SWOT and BCG Matrix of ITC Company Competitive Marketing
 
Human resource management
Human resource managementHuman resource management
Human resource management
 
Roles of board of directors
Roles of board of directorsRoles of board of directors
Roles of board of directors
 
case study analysis hp and compaq
 case study analysis hp and compaq  case study analysis hp and compaq
case study analysis hp and compaq
 
Conflict management wrt to sales and distribution
Conflict management wrt to sales and distributionConflict management wrt to sales and distribution
Conflict management wrt to sales and distribution
 
ITT Project Information Technology Basic
ITT Project Information Technology BasicITT Project Information Technology Basic
ITT Project Information Technology Basic
 
Channel v India regenerating board meeting look
Channel v India regenerating board meeting lookChannel v India regenerating board meeting look
Channel v India regenerating board meeting look
 
Organisational Behaviour case study conflict management
Organisational Behaviour  case study conflict managementOrganisational Behaviour  case study conflict management
Organisational Behaviour case study conflict management
 
Market Survey Mutual Funds IIFT
Market Survey Mutual Funds  IIFTMarket Survey Mutual Funds  IIFT
Market Survey Mutual Funds IIFT
 
Air india srtike 2008
Air india srtike 2008Air india srtike 2008
Air india srtike 2008
 
Conflict sales
Conflict salesConflict sales
Conflict sales
 

Recently uploaded

Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
 

Recently uploaded (20)

Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 

Threats due to information technology icai

  • 1.
  • 2.
  • 3.
  • 5. ж Pat of evidence is crime scene issue. ж In Cyber Crime there is NO Cyber Crime ж Nothing can be seen as scene in cyber crime. ж Evidences may lie in many computer system than the host system. ж Easily destruction of evidences by formatting, reconfiguring , removing history & cookies, changing registries. ж PC history and log files are volatile in nature.
  • 6. Encryption • converting plain text into coded language and then sharing it Synchronised Passwords • One Time Password for getting logged in to server Firewalls • permits access to the system to ones already registered Digital Signatures • Validate the authenticity of messages or digital documents Others •Install security system, software •Limit personal info. sharing online
  • 7. 2nd SPAM MAIL AND FAKE APPS FORWARDING 3rd DATA STEALING MALWARE 4th MOBILE MALWARE 5th ORGINATOR OF INTERNET THREAT MOST CYBER CRIME AFFECTED COUNTRY
  • 8. “The most startling aspect of the new amendments is that the amendments seek to make Indian Cyber Law a crime friendly legislation that goes externally soft on cyber criminals, with a soft heart and that chooses to encourage cyber criminals by lessening the quantum of punishment, a legislation which makes a majority of cyber-crimes stipulated under the IT Act as bailable offenses that is likely to pave way for India to become the potential cyber-crime capital of the world…” CYBER LAW EXPERT & SUPREME COURT ADVOCATE
  • 9. Case Examples C.A. Students Hacked Down Accounts (2013) Google Inc. Spain vs. AEPD & Mario Costeja (2014) Vulnerability in Samsung Galaxy phones (June,2015) Northeast Blackout Of 2003 (U.S.) Watchdogs Game by Ubisoft Montreal The court of Justice of the European Union judgment states that, Google's search activities involve the processing of personal data, but Google does not thereby become a data controller for the content of the material when the processing is carried out in an indiscriminate and random manner therefore Google has no right to violate right to privacy and the right to be forgotten must be exercised on regular basis in order to keep the data updated. 22 June: Salman Khan and Shah Rukh Khan 24 June: M.S. Dhoni account 26 June: Anil Ambani 04 July: Sachin Tendulkar Hacking was done by just entering the PAN Number, Date Of Birth and Mother’s Maiden name of these individuals on e-filing website. 14 August 2003 software bug in alarm system at the control room of Ohio overloaded the transmission lines causing blackout in Northeast & Midwestern part of U.S. Samsung phones come pre-installed with the Swift keyboard which has a vulnerability that could allow an attacker to remotely tap into sensors of GPS, camera and microphone, eavesdrop on text messages and calls, secretly install malicious app(s) & attempting to access sensitive personal data.
  • 10.  Crime free society is Utopian  Law makers has to go extra mile to keep fraudsters at bay  Technology has always been a Double Edged Sword  Technologies falling in wrong hands with a criminal intent, comes under gamut of cyber crime and becomes a punishable offense  Duty of law makers, internet service provider and users to ensure compliance with law