Your SlideShare is downloading. ×
Cyber crime
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Cyber crime

615
views

Published on

Published in: Education

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
615
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
49
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Cyber Laws (InformationTechnology Act,2000)
  • 2. Topic Overview Why we learn about cyber crimes. Security Policy Cyber Security Strategy – India Emergence of Information Technology Act,2000 Objectives of the Act,2000 Noteworthy Provisions under the Information Technology Act,2000 Types of Attacks by Hackers Cyber Threat Evolution Scope of the Act
  • 3. Why learn about CYBER CRIME ? Everybody is using COMPUTERS.. From white collar criminals to terrorist organizations And From Teenagers to Adults Conventional crimes like Forgery,, extortion,, kidnapping etc. are being committed with the help off computers New generation is growing up with computers MOST IMPORTANT - Monetary transactions are moving on to the INTERNET
  • 4. Cyber Security Strategy – India Cyber terrorists usually use the computer as a tool, target, or both for their unlawful act either to gain information which can result in heavy loss/damage to the owner of that intangible sensitive information.
  • 5. Security Policy, Compliance and Assurance –Legal Framework IT Act, 2000 IT (Amendment) Bill, 2006 – Data Protection & Computer crimes Best Practice ISO 27001 Security Assurance Framework- IT/ITES/BPO Companies
  • 6. Emergence of Information TechnologyAct,2000 In India, the Information Technology Act 2000 was enacted after the United Nation General Assembly Resolution A/RES/51/162,dated 30th January,1997 Adopting the Model Law on Electronic Commerce adopted by the United Nations Commission on International Trade Law. It was enacted taking into consideration UNICITRAL model of law on e-commerce 1996.
  • 7. Objectives of the Act,2000 To grant legal recognition means ‘electronic commerce’ Digital Signature for Authentication. To facilitate electronic filing of document. To facilitate electronic storage of data. To set up licensing, monitoring, authentication etc. To facilitate and give legal sanction to electronic and transfers b/w banks and financial institutions. To give legal recognition for keeping books of account by bankers in electronic form.
  • 8. Noteworthy Provisions under theInformation Technology Act,2000 Sec.431. Damage to Computer System etc.(compensation 1 crore) Sec.661. Hacking(Fine of 2 lakh rupees) Sec.671. Fine of 1 lakh, imprisonment of 5 years. Sec. 701. Securing access to computer (imprisonment upto 10 years) Sec.70, Sec72, Sec.73, Sec 74.
  • 9. Types of Attacks by Hackers Hacking Computer Viruses Phishing Spoofing Phone Phishing Internet Pharming Investment Newsletter Credit Card Fraud
  • 10. HACKING Hacking in simple terms means illegal Intrusion into a computer system without the permission of the computer owner/user. There are various methods used by hackers to gain unauthorized access to the computer apart from use of viruses like Trojans and worms etc.
  • 11. PHISHING It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means.
  • 12. Cyber Threat Evolution Malicious Identity Theft Virus Code (Phishing) (Melissa) Breaking Advanced Worm / Organised Crime Web Sites Trojan (I LOVE Data Theft, DoS / YOU) DDoS 1977 1995 2000 2003-04 2005-06 2007-08
  • 13. Measures To Curb The Crime1. Encryption2. Synchronized Passwords3. Firewalls4. Digital Signature
  • 14. Internet Infrastructure in INDIA 14
  • 15. Investigations & Search Procedures Sec 75 of I.T Act,2000 takes care of jurisdictional aspect of cyber crimes. Power of investigation is been given to police officer or any officer of the Central Govt. He may search & arrest without warrant person who is responsible.
  • 16. Problem Underlying Tracking ofoffence Identity is hard to be identified. Usually law enforcement agencies also don’t take crimes seriously. They have no importance of enforcement of cyber crimes. Most of Countries lack skilled law enforcement personnel to deal with computer.
  • 17. Information Security Management INFORMATION SECURITY Confidentiality Integrity Availability Authenticity Security Policy People Regulatory Compliance User Awareness Program Access Control Process Security Audit Incident Response Encryption, PKI Technology Firewall, IPS/IDS Antivirus 17
  • 18. How Efficient is InformationTechnology Act 2000? Copyright and trade mark violations do occur on the net but copyright Act 1976, or Trade Mark Act 1994 are silent. Therefore no enforcement machinery to ensure the protection of domain names on net. ISP is not made liable under the I.T Act,2000
  • 19. Scope of the Act Negotiable instrument. A power of Attorney. A trust as defined in sec 3 of the Indian Trusts Act,1882. A Will. Any contract for the sale or conveyance of immovable property or any interest in such property, section 17 of the Registration Act, 1908.
  • 20. Prepared By:Sukhwinder SinghB COM(Professional)