5. ж Pat of evidence is crime scene issue.
ж In Cyber Crime there is NO Cyber Crime
ж Nothing can be seen as scene in cyber crime.
ж Evidences may lie in many computer system
than the host system.
ж Easily destruction of evidences by
formatting, reconfiguring , removing history
& cookies, changing registries.
ж PC history and log files are volatile in
nature.
6. Encryption
• converting plain text into coded language and then sharing it
Synchronised Passwords
• One Time Password for getting logged in to server
Firewalls
• permits access to the system to ones already registered
Digital Signatures
• Validate the authenticity of messages or digital documents
Others
•Install security system, software
•Limit personal info. sharing online
7. 2nd
SPAM MAIL
AND FAKE APPS
FORWARDING
3rd DATA STEALING
MALWARE
4th MOBILE MALWARE
5th
ORGINATOR OF
INTERNET
THREAT
MOST CYBER
CRIME AFFECTED
COUNTRY
8. “The most startling aspect of the new amendments is that the
amendments seek to make Indian Cyber Law a crime friendly
legislation that goes externally soft on cyber criminals, with
a soft heart and that chooses to encourage cyber criminals by
lessening the quantum of punishment, a legislation which
makes a majority of cyber-crimes stipulated under the IT Act
as bailable offenses that is likely to pave way for India to
become the potential cyber-crime capital of the world…”
CYBER LAW EXPERT &
SUPREME COURT
ADVOCATE
9. Case Examples
C.A. Students Hacked Down Accounts (2013)
Google Inc. Spain vs. AEPD & Mario Costeja (2014)
Vulnerability in Samsung Galaxy phones (June,2015)
Northeast Blackout Of 2003 (U.S.)
Watchdogs Game by Ubisoft Montreal
The court of Justice of the European Union judgment states
that, Google's search activities involve the processing of
personal data, but Google does not thereby become a data
controller for the content of the material when the
processing is carried out in an indiscriminate and random
manner therefore Google has no right to violate right to
privacy and the right to be forgotten must be exercised on
regular basis in order to keep the data updated.
22 June: Salman Khan and Shah Rukh Khan
24 June: M.S. Dhoni account
26 June: Anil Ambani
04 July: Sachin Tendulkar
Hacking was done by just entering the PAN Number, Date
Of Birth and Mother’s Maiden name of these individuals on
e-filing website.
14 August 2003 software bug in alarm system at the
control room of Ohio overloaded the transmission lines
causing blackout in Northeast & Midwestern part of U.S.
Samsung phones come pre-installed with the Swift
keyboard which has a vulnerability that could allow an
attacker to remotely tap into sensors of GPS, camera and
microphone, eavesdrop on text messages and calls,
secretly install malicious app(s) & attempting to access
sensitive personal data.
10. Crime free society is Utopian
Law makers has to go extra mile to keep
fraudsters at bay
Technology has always been a Double Edged
Sword
Technologies falling in wrong hands with a
criminal intent, comes under gamut of cyber
crime and becomes a punishable offense
Duty of law makers, internet service provider
and users to ensure compliance with law