SlideShare a Scribd company logo
By
Aditya Gurav.
It is observed that because of global communication ,internet is
misused for criminal activities. Today many unethical things are
happening in Cyber space called cyber crime.
Cyber crime is refer to all activities done with the criminal
intent in Cyber space. People with intelligence and having bad
intention are misusing the aspect of internet to perpetuate criminal
activities in Cyber space.
The Criminal activities include various crime like Software
Piracy, Unauthorized Access, Transmission of
harmful software etc.
So there is need for cyber law.
The earliest forms of computer crimes
revolved around using computers to illegally
obtain free long distance phone calls, known
as phreaking. This required the computer
users to hack into phone company
computers. Hacking became more
predominant in the 1980s when personal
computers and home modems were first
becoming readily available. Unfortunately,
the term “hacking” is also synonymous with
computer programming so the term “cracking”
is also sometimes used.
 Cybercrime in a narrow sense
(computer crime):
Any illegal behavior directed
by means of electronic operations that targets the
security of computer systems and the data processed
by them.
 Cybercrime in a broader sense
(computer-related crime):
Any illegal behavior committed
by means of, or in relation to, a computer system or
network, including such crimes as illegal possession
[and] offering or distributing information by means of a
computer system or network.
Denial of service (DDOS) attack.
Phishing.
Cyber-Terrorism.
Pornography.
Copyright infringement.
Malicious software.
 Web servers are typically set up to handle a set number of
requests at a time
• For instance, a small web server might be set up to handle 20 requests
 Web servers also are set up to offer a certain time period
before a “time out” occurs
• Perhaps 2 minutes
 Now consider a single web server (1 machine) for a company
that is suddenly deluged with 10,000,000 requests
• Most of the requests get placed into a queue, waiting for attention by the
web server
• Most requests do not make it through the queue in time and are thus
timed out, so legitimate users get a denial of access to the web server (or
denial of service)
 This is a tactic of sheer sabotage (or cyber terrorism) –
someone writes a program to generate millions of requests
and floods the target web server(s).
 A web form is one of the few forms of input to a web page
• The web page is set up specifically so that a user (visitor) to that
web page can provide information or feedback
• Typically, forms use server side programs (scripts) to process the
data in the form
• This may include generating SQL queries to send to a database
• A clever user can fill in malicious SQL queries into a form and
thus, when submitted to the database, the SQL query is enacted
– this could be a query to overwrite previously stored data.
 Like the denial of service, this is another form of sabotage or
terrorism
• Proper mechanisms must be in place to safeguard against this.
 Jan 13, 2006 – Russian computer criminals broke into
Rhode Island government web site and stole credit card
data
 June 29, 2007 – a computer criminal used an SQL
injection to deface the Microsoft UK website
 Apr – Aug 2008, a number of attacks against various
computers using Microsoft’s IIS web server and SQL
Server database that, when successful, gives the user
(hacker) access to the entire computer system – an
estimated 500,000 web pages were exploited!
 Illegally attempting to gain sensitive information
from people for the purpose of computer-based
fraud, these attempts can include
• social engineering – calling or emailing someone
pretending to be “official” and asking for confidential
information such as password or social security #
• password cracking – attempting to break into an
account by guessing a password (possibly trying all
possible passwords, or guessing based on what you
know of the person)
• link manipulation for website spoofing – here, an
email has a link pretending to be to a page you visit
(e.g., paypal) but in fact the link is to a spoofed or
forged site
Cyber law or Internet law is a
term that encapsulates the legal issues
related to use of the Internet. It is less a
distinct field of law than intellectual
property or contract law, as it is a domain
covering many areas of law and regulation.
Some leading topics include internet
access and usage, privacy, freedom of
expression, and jurisdiction.
Cyber law refers to all legal aspect and
regulatory aspects of Internet, World Wide
Web (WWW), E-Commerce.
 Florida Electronic Security Act
 Illinois Electronic Commerce Security Act
 Texas Penal Code - Computer Crimes Statute
 Maine Criminal Code - Computer Crimes
 Singapore Electronic Transactions Act
 Malaysia Computer Crimes Act
 UNCITRAL Model Law on Electronic
Commerce
 Information Technology Act 2000 of India
 Thailand Computer Crimes Act B.E.2550
 IT ACT PASSED IN 2000
 The primary purpose of the Act is to provide legal
recognition to electronic commerce and to facilitate filing
of electronic records with the Government.
 The IT Act also penalizes various cyber crimes and
provides strict punishments (imprisonment terms upto
10years and compensation up to Rs 1 cr./-).
 The IT Act was amended by the Negotiable Instruments
(Amendments and Miscellaneous Provisions) Act,
2002. This introduced the concept of electronic cheques
and truncated cheques.
 Information Technology (Use of Electronic Records
and Digital Signatures) Rules, 2004 has provided the
necessary legal framework for filing of documents with
the Government as well as issue of licenses by the
Government.
 The Cyber Regulations Appellate Tribunal (Salary,
Allowances and other terms and conditions of service of
Presiding Officer) Rules, 2003 prescribe the salary,
allowances and other terms for the Presiding Officer of
the CRAT.
 Wikipedia (Wikimedia Foundation)
 Information Technology
(Nirali Prakashan)
 Hacking Exposed 5 (MacAfee ltd.)
---- THANK YOU ----

More Related Content

What's hot

Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Cyber law
Cyber lawCyber law
Cyber law
premarhea
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
rashidirazali
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
Shatakshi Goswami
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
Ambar Deo
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in Indiaamiable_indian
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
n|u - The Open Security Community
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
Sajeel Bhatti
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
mahrukh rafique
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Cyber law
Cyber lawCyber law
Cyber lawabiabel
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Cyber laws
Cyber lawsCyber laws
Cyber lawsmadhu190
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
mayur_ceh
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
Vikas Saw
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
Tushar Rajput
 

What's hot (20)

Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber law
Cyber lawCyber law
Cyber law
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 

Viewers also liked

Resultados Campeonato Colombiano Sub15 Femenino 2015
Resultados Campeonato Colombiano Sub15 Femenino 2015Resultados Campeonato Colombiano Sub15 Femenino 2015
Resultados Campeonato Colombiano Sub15 Femenino 2015
Federacion de Judo
 
Tabla de Medalleria Campeonato Colombiano Sub15 2015
Tabla de Medalleria Campeonato Colombiano Sub15 2015Tabla de Medalleria Campeonato Colombiano Sub15 2015
Tabla de Medalleria Campeonato Colombiano Sub15 2015
Federacion de Judo
 
Ascensos a grados dan en Pereira
Ascensos a grados dan  en PereiraAscensos a grados dan  en Pereira
Ascensos a grados dan en Pereira
Federacion de Judo
 
Resultados Campeonato Colombiano Sub15 Masculino 2015
Resultados Campeonato Colombiano Sub15 Masculino 2015Resultados Campeonato Colombiano Sub15 Masculino 2015
Resultados Campeonato Colombiano Sub15 Masculino 2015
Federacion de Judo
 
Updated%20ANC%20Press%20Release
Updated%20ANC%20Press%20ReleaseUpdated%20ANC%20Press%20Release
Updated%20ANC%20Press%20ReleaseCarolina Endara
 
Nvis
NvisNvis
Planillas Resultados Femenino Campeonato Colombiano Sub13
Planillas Resultados Femenino Campeonato Colombiano Sub13 Planillas Resultados Femenino Campeonato Colombiano Sub13
Planillas Resultados Femenino Campeonato Colombiano Sub13
Federacion de Judo
 
RPC_FAIRLAWN CG 2014
RPC_FAIRLAWN CG 2014RPC_FAIRLAWN CG 2014
RPC_FAIRLAWN CG 2014April Helms
 
11 niezmiennych-zasad-skutecznego-dzialania
11 niezmiennych-zasad-skutecznego-dzialania11 niezmiennych-zasad-skutecznego-dzialania
11 niezmiennych-zasad-skutecznego-dzialaniaGucio Silva
 
EXTRACURRICULAR ACTIVITIES - BEA LOREN LING TAN OCBA
EXTRACURRICULAR ACTIVITIES - BEA LOREN LING TAN OCBAEXTRACURRICULAR ACTIVITIES - BEA LOREN LING TAN OCBA
EXTRACURRICULAR ACTIVITIES - BEA LOREN LING TAN OCBABea Loren Ocba
 
ANC-Newsletter-Terrapin-NOCROP
ANC-Newsletter-Terrapin-NOCROPANC-Newsletter-Terrapin-NOCROP
ANC-Newsletter-Terrapin-NOCROPCarolina Endara
 
Especialista Europeo de Adhesivos (EAS)
Especialista Europeo de Adhesivos (EAS)Especialista Europeo de Adhesivos (EAS)
Especialista Europeo de Adhesivos (EAS)
ITCS - Institut Tècnic Català de la Soldadura
 
Power pointofsuestubbscrc
Power pointofsuestubbscrcPower pointofsuestubbscrc
Power pointofsuestubbscrc
Zulkarman Syafrin
 
Laparoscopic surgery. Intro. History of Armata manus laparoscopic simulators
Laparoscopic surgery. Intro. History of Armata manus laparoscopic simulatorsLaparoscopic surgery. Intro. History of Armata manus laparoscopic simulators
Laparoscopic surgery. Intro. History of Armata manus laparoscopic simulators
Dmitriy Shamrai
 
Inmarsat – Powering global connectivity
Inmarsat – Powering global connectivityInmarsat – Powering global connectivity
Inmarsat – Powering global connectivity
techUK
 
Neck Dissections
Neck Dissections Neck Dissections
Neck Dissections
Harmandeep Jabbal
 
Evolution & Ergonomics in Laparoscopy
Evolution & Ergonomics in LaparoscopyEvolution & Ergonomics in Laparoscopy
Evolution & Ergonomics in Laparoscopy
Harmandeep Jabbal
 
Resume_Rahul_Sumbrui_Vistex_Fico_Cs
Resume_Rahul_Sumbrui_Vistex_Fico_CsResume_Rahul_Sumbrui_Vistex_Fico_Cs
Resume_Rahul_Sumbrui_Vistex_Fico_CsRahul Sumbrui
 

Viewers also liked (20)

Resultados Campeonato Colombiano Sub15 Femenino 2015
Resultados Campeonato Colombiano Sub15 Femenino 2015Resultados Campeonato Colombiano Sub15 Femenino 2015
Resultados Campeonato Colombiano Sub15 Femenino 2015
 
Tabla de Medalleria Campeonato Colombiano Sub15 2015
Tabla de Medalleria Campeonato Colombiano Sub15 2015Tabla de Medalleria Campeonato Colombiano Sub15 2015
Tabla de Medalleria Campeonato Colombiano Sub15 2015
 
Ascensos a grados dan en Pereira
Ascensos a grados dan  en PereiraAscensos a grados dan  en Pereira
Ascensos a grados dan en Pereira
 
Resultados Campeonato Colombiano Sub15 Masculino 2015
Resultados Campeonato Colombiano Sub15 Masculino 2015Resultados Campeonato Colombiano Sub15 Masculino 2015
Resultados Campeonato Colombiano Sub15 Masculino 2015
 
AndrewSchellengerLetterofRec
AndrewSchellengerLetterofRecAndrewSchellengerLetterofRec
AndrewSchellengerLetterofRec
 
Updated%20ANC%20Press%20Release
Updated%20ANC%20Press%20ReleaseUpdated%20ANC%20Press%20Release
Updated%20ANC%20Press%20Release
 
Nvis
NvisNvis
Nvis
 
Planillas Resultados Femenino Campeonato Colombiano Sub13
Planillas Resultados Femenino Campeonato Colombiano Sub13 Planillas Resultados Femenino Campeonato Colombiano Sub13
Planillas Resultados Femenino Campeonato Colombiano Sub13
 
RPC_FAIRLAWN CG 2014
RPC_FAIRLAWN CG 2014RPC_FAIRLAWN CG 2014
RPC_FAIRLAWN CG 2014
 
11 niezmiennych-zasad-skutecznego-dzialania
11 niezmiennych-zasad-skutecznego-dzialania11 niezmiennych-zasad-skutecznego-dzialania
11 niezmiennych-zasad-skutecznego-dzialania
 
EXTRACURRICULAR ACTIVITIES - BEA LOREN LING TAN OCBA
EXTRACURRICULAR ACTIVITIES - BEA LOREN LING TAN OCBAEXTRACURRICULAR ACTIVITIES - BEA LOREN LING TAN OCBA
EXTRACURRICULAR ACTIVITIES - BEA LOREN LING TAN OCBA
 
ANC-Newsletter-Terrapin-NOCROP
ANC-Newsletter-Terrapin-NOCROPANC-Newsletter-Terrapin-NOCROP
ANC-Newsletter-Terrapin-NOCROP
 
Hf propagation
Hf propagationHf propagation
Hf propagation
 
Especialista Europeo de Adhesivos (EAS)
Especialista Europeo de Adhesivos (EAS)Especialista Europeo de Adhesivos (EAS)
Especialista Europeo de Adhesivos (EAS)
 
Power pointofsuestubbscrc
Power pointofsuestubbscrcPower pointofsuestubbscrc
Power pointofsuestubbscrc
 
Laparoscopic surgery. Intro. History of Armata manus laparoscopic simulators
Laparoscopic surgery. Intro. History of Armata manus laparoscopic simulatorsLaparoscopic surgery. Intro. History of Armata manus laparoscopic simulators
Laparoscopic surgery. Intro. History of Armata manus laparoscopic simulators
 
Inmarsat – Powering global connectivity
Inmarsat – Powering global connectivityInmarsat – Powering global connectivity
Inmarsat – Powering global connectivity
 
Neck Dissections
Neck Dissections Neck Dissections
Neck Dissections
 
Evolution & Ergonomics in Laparoscopy
Evolution & Ergonomics in LaparoscopyEvolution & Ergonomics in Laparoscopy
Evolution & Ergonomics in Laparoscopy
 
Resume_Rahul_Sumbrui_Vistex_Fico_Cs
Resume_Rahul_Sumbrui_Vistex_Fico_CsResume_Rahul_Sumbrui_Vistex_Fico_Cs
Resume_Rahul_Sumbrui_Vistex_Fico_Cs
 

Similar to Cyber crime

What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the countryUjjwal Tripathi
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Arnav Chowdhury
 
cyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testingcyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testing
akshayathetopper
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
ssuser24dae7
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
VivekanandaGN1
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
Praveen362297
 
Cyber law
Cyber lawCyber law
Cyber law
VishaliPandita
 
Cyber law
Cyber lawCyber law
Cyber law
Cyber lawCyber law
Cyber Security
Cyber SecurityCyber Security
Cyber Security
RP6997
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
India cyber
India cyberIndia cyber
India cybersabariss
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cybercloneseeyom
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
silas Sargunam
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
 

Similar to Cyber crime (20)

What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
English in written
English in writtenEnglish in written
English in written
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testingcyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testing
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
India cyber
India cyberIndia cyber
India cyber
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Recently uploaded

Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 

Recently uploaded (20)

Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 

Cyber crime

  • 2. It is observed that because of global communication ,internet is misused for criminal activities. Today many unethical things are happening in Cyber space called cyber crime. Cyber crime is refer to all activities done with the criminal intent in Cyber space. People with intelligence and having bad intention are misusing the aspect of internet to perpetuate criminal activities in Cyber space. The Criminal activities include various crime like Software Piracy, Unauthorized Access, Transmission of harmful software etc. So there is need for cyber law.
  • 3.
  • 4. The earliest forms of computer crimes revolved around using computers to illegally obtain free long distance phone calls, known as phreaking. This required the computer users to hack into phone company computers. Hacking became more predominant in the 1980s when personal computers and home modems were first becoming readily available. Unfortunately, the term “hacking” is also synonymous with computer programming so the term “cracking” is also sometimes used.
  • 5.  Cybercrime in a narrow sense (computer crime): Any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed by them.  Cybercrime in a broader sense (computer-related crime): Any illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession [and] offering or distributing information by means of a computer system or network.
  • 6. Denial of service (DDOS) attack. Phishing. Cyber-Terrorism. Pornography. Copyright infringement. Malicious software.
  • 7.  Web servers are typically set up to handle a set number of requests at a time • For instance, a small web server might be set up to handle 20 requests  Web servers also are set up to offer a certain time period before a “time out” occurs • Perhaps 2 minutes  Now consider a single web server (1 machine) for a company that is suddenly deluged with 10,000,000 requests • Most of the requests get placed into a queue, waiting for attention by the web server • Most requests do not make it through the queue in time and are thus timed out, so legitimate users get a denial of access to the web server (or denial of service)  This is a tactic of sheer sabotage (or cyber terrorism) – someone writes a program to generate millions of requests and floods the target web server(s).
  • 8.  A web form is one of the few forms of input to a web page • The web page is set up specifically so that a user (visitor) to that web page can provide information or feedback • Typically, forms use server side programs (scripts) to process the data in the form • This may include generating SQL queries to send to a database • A clever user can fill in malicious SQL queries into a form and thus, when submitted to the database, the SQL query is enacted – this could be a query to overwrite previously stored data.  Like the denial of service, this is another form of sabotage or terrorism • Proper mechanisms must be in place to safeguard against this.
  • 9.  Jan 13, 2006 – Russian computer criminals broke into Rhode Island government web site and stole credit card data  June 29, 2007 – a computer criminal used an SQL injection to deface the Microsoft UK website  Apr – Aug 2008, a number of attacks against various computers using Microsoft’s IIS web server and SQL Server database that, when successful, gives the user (hacker) access to the entire computer system – an estimated 500,000 web pages were exploited!
  • 10.  Illegally attempting to gain sensitive information from people for the purpose of computer-based fraud, these attempts can include • social engineering – calling or emailing someone pretending to be “official” and asking for confidential information such as password or social security # • password cracking – attempting to break into an account by guessing a password (possibly trying all possible passwords, or guessing based on what you know of the person) • link manipulation for website spoofing – here, an email has a link pretending to be to a page you visit (e.g., paypal) but in fact the link is to a spoofed or forged site
  • 11.
  • 12. Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet. It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include internet access and usage, privacy, freedom of expression, and jurisdiction.
  • 13. Cyber law refers to all legal aspect and regulatory aspects of Internet, World Wide Web (WWW), E-Commerce.
  • 14.  Florida Electronic Security Act  Illinois Electronic Commerce Security Act  Texas Penal Code - Computer Crimes Statute  Maine Criminal Code - Computer Crimes  Singapore Electronic Transactions Act  Malaysia Computer Crimes Act  UNCITRAL Model Law on Electronic Commerce  Information Technology Act 2000 of India  Thailand Computer Crimes Act B.E.2550
  • 15.  IT ACT PASSED IN 2000  The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government.  The IT Act also penalizes various cyber crimes and provides strict punishments (imprisonment terms upto 10years and compensation up to Rs 1 cr./-).  The IT Act was amended by the Negotiable Instruments (Amendments and Miscellaneous Provisions) Act, 2002. This introduced the concept of electronic cheques and truncated cheques.
  • 16.  Information Technology (Use of Electronic Records and Digital Signatures) Rules, 2004 has provided the necessary legal framework for filing of documents with the Government as well as issue of licenses by the Government.  The Cyber Regulations Appellate Tribunal (Salary, Allowances and other terms and conditions of service of Presiding Officer) Rules, 2003 prescribe the salary, allowances and other terms for the Presiding Officer of the CRAT.
  • 17.  Wikipedia (Wikimedia Foundation)  Information Technology (Nirali Prakashan)  Hacking Exposed 5 (MacAfee ltd.)