Cybercrimelaw
Upcoming SlideShare
Loading in...5
×
 

Cybercrimelaw

on

  • 465 views

hi, friends the ppt is about indian cyber laws..

hi, friends the ppt is about indian cyber laws..

Statistics

Views

Total Views
465
Views on SlideShare
465
Embed Views
0

Actions

Likes
0
Downloads
18
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Cybercrimelaw Cybercrimelaw Presentation Transcript

    • Cyber Crime :An Indian Perspective Submitted By – Mihir Roat
    • Introduction to Cyber crime• Computer Crime, Hi-Tech Crime or Electronic Crime is where a computer is the target of a crime or is the means adopted to commit a crime.• Criminals undertake different ways to commit criminal activities such as fraud, theft, blackmail and forgery using the new medium, Internet.
    • Types of Cyber crimes Credit card frauds Crime Cyber pornography against Governm Sale of illegal articles- ent narcotics, weapons, wildlife Intellectual Property crimes- software piracy, copyright violation, trademarks Crime violations, theft of computer source code against property Phishing Forgery Crime Cyber terrorism against people
    • Cyber Law• The term ‘Cyber Law’ would mean law relating to the computer and computer network• Cyber law Sections 22 25 29 30 31 32 44 45 43 65 66 67 68 69 70 71 72 502A 419A 417A Laws Cr.P.C: Criminal I.P.C Indian I.T Act 2000 procedure court Penal Code
    • Cyber Law EnforcementSection 66: Hacking• Destruction, deletion, alteration, diminishing value or utility or injuriously affecting information residing in a computer resource• Punishment Imprisonment up to three years, and fine up to Rs.2 lakhSection 70: Protected System – Securing unauthorised access or attempting to secure unauthorised access to protected system – Punishment Imprisonment up to 10 years and fine
    • Sec. 67. Pornography – Publishing or transmitting or causing to be published in the electronic form, Obscene material• Punishment – On first conviction • imprisonment of either description up to five years and fine up to Rs. 1 lakh – On subsequent conviction • imprisonment of either description up to ten years and fine up to Rs. 2 lakh
    • Sending threatening messages by email Sec 503 IPCSending offensive messages by email Sec 499, 500 IPCForgery of electronic records Sec 463, 470, 471 IPCBogus websites, cyber frauds Sec 420 IPCEmail spoofing Sec 416, 417, 463 IPCOnline sale of Drugs NDPS ActWeb -Jacking Sec. 383 IPCOnline sale of Arms Arms Act
    • Cyber Engineers• Kevin Mitnick – Probably the most famous hacker of his generation, Mitnick has been described by the US Department of Justice as "the most wanted computer criminal in United States history.“ – After a highly publicised pursuit by the FBI, Mitnick was arrested in 1995 and after confessing to several charges as part of a plea-bargain agreement, he served a five year prison sentence. He was released on parole in 2000 and today runs a computer security consultancy
    • Cyber Engineers• Adrian Lamo – Adrian Lamo was named the homeless hacker for his penchant for using coffee shops, libraries and internet cafés as his bases for hacking – Most of his illicit activities involved breaking into computer networks and then reporting on their vulnerabilities to the companies that owned them – Lamos biggest claim to fame came when he broke into the intranet of the New York Times and added his name to their database of experts – Lamo currently works as a journalist in new york times
    • Cyber Engineers• Stephen Wozniak – Famous for being the co-founder of Apple, Stephen "Woz" Wozniak began his white- hat hacking career with phone phreaking – slang for bypassing the phone system. While studying at the University of California he made devices for his friends called blue boxes that allowed them to make free long distance phone calls
    • Cyber Engineers• Pranav Mistry – The famed 6th sense developer,Pranav Mistry is a research assistant and a PhD candidate at MIT Media Lab. SixthSense has recently attracted global attention
    • Cyber Engineers• Ankit Fadia• He started a website called HackingTruths. At the age of 15, his book on ethical hacking made him the youngest author to be published by Macmillan• he developed a certification program on computer security for corporations in alliance with Reliance Info. He was one of eight people named MTV Indias Youth Icon of the Year for the year 2008
    • Cyber Engineers communities
    • Protect your Computers!• Use anti-virus software and firewalls• Don’t share access to your computers with strangers• Disconnect from t he Internet when not in use• Don’t open emails or attachments from unknown sources• Back-up your computer data on disks or CDs often• Use hard-to-guess passwords. Don’tuse words found in a dictionary
    • Information sources• www.hacktree.in• http://www.telegraph.co.uk/technology/6670 127/Top-10-most-famous-hackers.html• http://www.amarjit.info/2011/04/real- hackers-of-india-indian-hackers.html The Glider A Universal Hacker Emblem