This document discusses various types of cyber crimes such as phishing, hacking, cyber stalking, child pornography, and credit card fraud. It provides examples of cases related to these crimes and discusses relevant sections of the Information Technology Act that pertain to computer-related offenses, identity theft, cheating by personation, violation of privacy, and penalties for damaging computer systems. The document also covers topics like e-governance initiatives in India, emerging trends in cyber law, and the use of digital signatures.
Cyber crime refers to criminal activity involving computers or networks, where they are tools, targets, or places of crime. Common cyber crimes in India include phishing, fraud, and intellectual property theft. The document outlines several types of cyber crimes such as hacking, cyber stalking, and phishing. It also discusses Indian cyber laws and prevention methods. Overall, the document provides an overview of cyber crimes in India, the relevant laws, and importance of prevention through security measures and awareness.
This document provides an overview of cyber crime laws and cases in India. It defines cyber crime as crimes directly related to computers and the internet. The Information Technology Act of 2000 is discussed as the primary law governing cyber crimes in India. Three key cyber crime cases in India are summarized: 1) the 2004 case of State of Tamil Nadu vs Suhas Katti, the first conviction under Section 67 of the IT Act for posting obscene messages online; 2) the 2002 Sony India fraud case, showing the IPC can apply to some cyber crimes; and 3) the 2005 Pune Citibank call center fraud case involving unauthorized access of customer accounts. The conclusion emphasizes the importance of cyber laws and protecting networks and data from abuse
The document discusses the Information Technology Act of 2000 and its objectives of promoting e-commerce, facilitating e-governance, and preventing cybercrime. It provides 6 key objectives of the act, which include giving legal recognition to electronic transactions and digital signatures, and authorizing electronic document filing and storage of records. The act has 13 chapters and 90 sections dealing with amendments to related acts and authentication of electronic records. Common cybercrime scenarios are also discussed along with the applicable sections of the IT Act or other laws.
Cyber crime is a growing issue in India due to the country's rapidly growing internet user base. Common cyber crimes in India include phishing, fraud, and data theft. The document discusses the types of cyber crimes, relevant laws and prevention methods. It emphasizes the need for greater public awareness, law enforcement training, and coordination between authorities to combat cyber crime in India.
Cyber crime is a growing issue in India due to the country's rapidly growing internet user base. Common cyber crimes in India include phishing, fraud, and data theft. The document discusses the types of cyber crimes, relevant laws and prevention methods. It emphasizes the need for greater public awareness, law enforcement training, and coordination between authorities to address cyber crime challenges in India.
This document provides an overview of online financial fraud, cyber laws in India, and how to file a cybercrime complaint. It discusses common types of online financial fraud like phishing and lottery scams. It also summarizes key aspects of cyber laws in India like the Information Technology Act and sections of the Indian Penal Code related to cybercrimes. Regarding filing complaints, it outlines steps to register complaints with local police or online through the National Cybercrime Reporting Portal and types of information and documents required.
The document discusses the Information Technology Act of 2000 in India. It provides an introduction to the objectives of the act, including providing legal recognition for electronic transactions and facilitating e-filing and payments with government agencies. It also covers amendments to the act and defines various cyber crimes like hacking, phishing, and cyber terrorism. Specific examples of cyber attacks in India, such as SIM swap fraud and the 2018 attack on Cosmos Bank, are outlined. The roles of organizations like CERT-IN and NASSCOM in promoting cyber security are also summarized.
This document discusses cyber crimes and relevant cases in India related to sections of the Information Technology Act 2000. It begins by explaining that cyber crime is not officially defined but refers to illegal behavior using electronic means that targets computer security or data. The document then presents several case studies corresponding to specific sections of the IT Act, including cases related to unauthorized access, tampering with source code, computer hacking, identity theft, cheating by impersonation, privacy violations, and cyber terrorism.
Cyber crime refers to criminal activity involving computers or networks, where they are tools, targets, or places of crime. Common cyber crimes in India include phishing, fraud, and intellectual property theft. The document outlines several types of cyber crimes such as hacking, cyber stalking, and phishing. It also discusses Indian cyber laws and prevention methods. Overall, the document provides an overview of cyber crimes in India, the relevant laws, and importance of prevention through security measures and awareness.
This document provides an overview of cyber crime laws and cases in India. It defines cyber crime as crimes directly related to computers and the internet. The Information Technology Act of 2000 is discussed as the primary law governing cyber crimes in India. Three key cyber crime cases in India are summarized: 1) the 2004 case of State of Tamil Nadu vs Suhas Katti, the first conviction under Section 67 of the IT Act for posting obscene messages online; 2) the 2002 Sony India fraud case, showing the IPC can apply to some cyber crimes; and 3) the 2005 Pune Citibank call center fraud case involving unauthorized access of customer accounts. The conclusion emphasizes the importance of cyber laws and protecting networks and data from abuse
The document discusses the Information Technology Act of 2000 and its objectives of promoting e-commerce, facilitating e-governance, and preventing cybercrime. It provides 6 key objectives of the act, which include giving legal recognition to electronic transactions and digital signatures, and authorizing electronic document filing and storage of records. The act has 13 chapters and 90 sections dealing with amendments to related acts and authentication of electronic records. Common cybercrime scenarios are also discussed along with the applicable sections of the IT Act or other laws.
Cyber crime is a growing issue in India due to the country's rapidly growing internet user base. Common cyber crimes in India include phishing, fraud, and data theft. The document discusses the types of cyber crimes, relevant laws and prevention methods. It emphasizes the need for greater public awareness, law enforcement training, and coordination between authorities to combat cyber crime in India.
Cyber crime is a growing issue in India due to the country's rapidly growing internet user base. Common cyber crimes in India include phishing, fraud, and data theft. The document discusses the types of cyber crimes, relevant laws and prevention methods. It emphasizes the need for greater public awareness, law enforcement training, and coordination between authorities to address cyber crime challenges in India.
This document provides an overview of online financial fraud, cyber laws in India, and how to file a cybercrime complaint. It discusses common types of online financial fraud like phishing and lottery scams. It also summarizes key aspects of cyber laws in India like the Information Technology Act and sections of the Indian Penal Code related to cybercrimes. Regarding filing complaints, it outlines steps to register complaints with local police or online through the National Cybercrime Reporting Portal and types of information and documents required.
The document discusses the Information Technology Act of 2000 in India. It provides an introduction to the objectives of the act, including providing legal recognition for electronic transactions and facilitating e-filing and payments with government agencies. It also covers amendments to the act and defines various cyber crimes like hacking, phishing, and cyber terrorism. Specific examples of cyber attacks in India, such as SIM swap fraud and the 2018 attack on Cosmos Bank, are outlined. The roles of organizations like CERT-IN and NASSCOM in promoting cyber security are also summarized.
This document discusses cyber crimes and relevant cases in India related to sections of the Information Technology Act 2000. It begins by explaining that cyber crime is not officially defined but refers to illegal behavior using electronic means that targets computer security or data. The document then presents several case studies corresponding to specific sections of the IT Act, including cases related to unauthorized access, tampering with source code, computer hacking, identity theft, cheating by impersonation, privacy violations, and cyber terrorism.
Our team presenting Cyber laws in India in brief and and what are the penalties and fines under different sections applicable under IT Act 2000 and IPC act.
This document summarizes cybercrime offenses and relevant cases under the Information Technology Act 2000 of India. It begins by defining cybercrime and outlining the Act's penalties and offenses. It then discusses 10 case studies related to sections 43, 65, 66, 66A-F, 67, 67B, 69 of the Act. Common cybercrime scenarios are also mapped to their applicable legal sections. The document aims to provide clarity on cybercrime and the IT Act through real examples.
The document discusses the benefits and risks of internet usage and e-banking. It outlines how the internet has changed communication and access to information. However, it has also led to increased cybercrime like hacking, phishing, and identity theft. E-banking provides convenience but lacks security. Users must be aware of threats and protect their personal information. Overall, the internet and e-banking are useful if used properly and with adequate security measures.
This document provides an overview of cyber crimes and relevant cases in India. It defines cyber crimes as illegal acts conducted using electronic means, targeting computer security or data. Several cases are described that demonstrate the application of sections of the Indian Penal Code and Information Technology Act related to unauthorized access, data tampering, identity theft, offensive online messages, privacy violations, and cyber terrorism. Penalties for convicted individuals have included imprisonment and fines.
Cybercrime involves any illegal activity carried out through computers or online. This document discusses several sections of the Indian Penal Code related to cybercrime and provides case studies to illustrate how the courts have applied each section. Several cases involved unauthorized access to steal financial information, creating fake online profiles, sending hoax emails about bombs, and circulating private videos without consent. The courts interpreted these acts as violating sections around unauthorized access, tampering with data, computer-related offenses, identity theft, privacy violations, and the new section related to cyber terrorism.
Cybercrime involves illegal activities conducted through electronic means. The document discusses several cases related to sections of the Indian Penal Code dealing with cybercrime. These include cases of identity theft, sending offensive messages, hacking, and tampering with computer systems or data. The cases illustrate how various cybercrimes have been prosecuted under the relevant sections of the Indian Penal Code.
This document provides an overview of cyber crimes and security awareness. It begins by defining cyber crimes and cyber security. It then discusses the common motivations for cyber crimes, trends showing an increase, and that they are no longer just seen as fun. The document outlines many specific types of cyber crimes like ATM card fraud, harassment on social media, hate communities, and data theft. It provides the applicable laws for each type. Finally, it concludes with security awareness tips, emphasizing the importance of strong passwords, privacy settings, and caution on social media and mobile devices.
This document outlines the objectives, outcomes, and content of a computer security course. The objectives are to provide students with knowledge of computer security essentials, security algorithms and protocols, authentication and authorization systems, and IP-based web security standards. The outcomes are for students to understand computer security structures, security techniques and functions, in-depth network security algorithms, security threats, and firewall concepts. The content includes topics like cyber crimes, hackers, security principles, types of attacks, computer viruses, phishing, spoofing, fraud, and the Information Technology Act of 2000. It also provides security tips to help prevent cyber crimes.
The document discusses various sections and cases related to the Information Technology Act of India. Section 70 allows the government to declare any computer system as "protected" and authorize access. Section 71 deals with penalties for misrepresentation to authorities for licenses or certificates. Several cases are described related to hacking, credit card fraud, data theft, tampering with source code, and the "ILOVEYOU" computer virus from 2000. The amendments to the IT Act in 2006 are also summarized, changing terms to be technology neutral and exempting certain legal documents.
The document discusses various sections and cases related to the Information Technology Act of India. Section 70 allows the government to declare any computer system as "protected" and authorize access. Section 71 deals with penalties for misrepresentation to authorities for licenses or certificates. Several cases are described related to hacking, credit card fraud, data theft, tampering with source code, and the "ILOVEYOU" computer virus from 2000. The amendments to the IT Act in 2006 are also summarized, changing terms to be technology neutral and exempting certain legal documents.
Mobile security issues & frauds in IndiaYogesh Lolge
Mobile security issues and frauds in India are discussed. Several cases of fraud through SMS phishing, hacking of government websites, SMS scams collecting hundreds of millions of rupees, online credit card fraud on eBay, fake Orkut profiles, and MMS porn scams are described. Authentication, data encryption, firewalls, and intrusion prevention systems are recommended for better mobile security and cybercrime control. The conclusion emphasizes applying strong security concepts without backdoors to protect e-commerce and information technology in India.
Kandarp Shah has over 10 years of experience in information security consulting. The presentation aims to educate students about technology, internet, and cyber crimes as well as preventative measures. Cyber crime refers to criminal acts using computers and the internet. Motivations for cyber crimes include money, curiosity, revenge, and praise. Cyber crimes are increasing due to greater internet and smartphone use. Common cyber crimes discussed include cyber pornography, identity theft, email spoofing, intellectual property crimes, and cyber defamation.
This document summarizes penalties and offenses under the IT Act 2000 in India with case studies. It discusses sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, 67, and 69 of the Act and associated cases. One case study describes a credit card fraud where victims' computers were infected to make unauthorized online transactions. Another case found an individual guilty under sections 66 and 420 of tampering with broadband internet accounts and hacking sites across cities. The document concludes with an example of web defacement where a government site was altered on a symbolic day.
This document summarizes several cases related to cybercrime laws in India. It discusses cases involving online credit card fraud on eBay, an SMS scam that defrauded 50,000 people of 400 million rupees, the first conviction in an Indian cybercrime case involving the website Sony-sambandh.com, a call center fraud targeting Citibank customers, and India's first ATM card fraud case. The document provides details on the nature of the crimes and outcomes like arrests in these landmark cybercrime cases in India.
The document provides an overview of cyber crime, including its history, categories, types, and prevention. It discusses how the first recorded cyber crime took place in 1820 involving sabotage of new textile manufacturing technology. Cyber crimes are categorized as those against persons, property, government, and society. Common types of cyber crimes include hacking, phishing, viruses, and intellectual property theft. The document also provides cyber crime statistics and discusses cyber laws and prevention best practices like using antivirus software and firewalls.
Cybercrime refers to criminal activity that targets or uses computers, networks or devices. It can be carried out by individuals or organized criminal groups. Common cybercrimes include hacking, phishing, identity theft, and spreading malware. Cybercriminals use techniques like botnets, zombie computers and denial of service attacks. The majority of cyber attacks come from system insiders, viruses and theft of proprietary information. It is important for individuals and organizations to protect themselves by keeping software updated, using strong passwords, cybersecurity awareness and purchasing cyber insurance.
Cyber law governs criminal activities online and aims to protect individuals and organizations from cybercrimes like hacking and theft of intellectual property. The document discusses the types of cybercrimes, including those against persons, property, government, and society. It also covers India's cyber law act of 2002 and the need to educate law enforcement on investigating cybercrimes. Landmark cybercrime cases are mentioned to demonstrate the growth of these crimes and importance of prevention.
This document provides an overview of cyber law and cyber crimes in India. It begins by defining cyber crime and outlining the relevant sections of the Information Technology Act 2000. It then provides case studies to illustrate the application of sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, 67, 67B, 69 of the IT Act. It concludes by summarizing common cyber crime scenarios and the applicable legal sections, such as hacking, credit card fraud, cyber terrorism, and online harassment.
Our team presenting Cyber laws in India in brief and and what are the penalties and fines under different sections applicable under IT Act 2000 and IPC act.
This document summarizes cybercrime offenses and relevant cases under the Information Technology Act 2000 of India. It begins by defining cybercrime and outlining the Act's penalties and offenses. It then discusses 10 case studies related to sections 43, 65, 66, 66A-F, 67, 67B, 69 of the Act. Common cybercrime scenarios are also mapped to their applicable legal sections. The document aims to provide clarity on cybercrime and the IT Act through real examples.
The document discusses the benefits and risks of internet usage and e-banking. It outlines how the internet has changed communication and access to information. However, it has also led to increased cybercrime like hacking, phishing, and identity theft. E-banking provides convenience but lacks security. Users must be aware of threats and protect their personal information. Overall, the internet and e-banking are useful if used properly and with adequate security measures.
This document provides an overview of cyber crimes and relevant cases in India. It defines cyber crimes as illegal acts conducted using electronic means, targeting computer security or data. Several cases are described that demonstrate the application of sections of the Indian Penal Code and Information Technology Act related to unauthorized access, data tampering, identity theft, offensive online messages, privacy violations, and cyber terrorism. Penalties for convicted individuals have included imprisonment and fines.
Cybercrime involves any illegal activity carried out through computers or online. This document discusses several sections of the Indian Penal Code related to cybercrime and provides case studies to illustrate how the courts have applied each section. Several cases involved unauthorized access to steal financial information, creating fake online profiles, sending hoax emails about bombs, and circulating private videos without consent. The courts interpreted these acts as violating sections around unauthorized access, tampering with data, computer-related offenses, identity theft, privacy violations, and the new section related to cyber terrorism.
Cybercrime involves illegal activities conducted through electronic means. The document discusses several cases related to sections of the Indian Penal Code dealing with cybercrime. These include cases of identity theft, sending offensive messages, hacking, and tampering with computer systems or data. The cases illustrate how various cybercrimes have been prosecuted under the relevant sections of the Indian Penal Code.
This document provides an overview of cyber crimes and security awareness. It begins by defining cyber crimes and cyber security. It then discusses the common motivations for cyber crimes, trends showing an increase, and that they are no longer just seen as fun. The document outlines many specific types of cyber crimes like ATM card fraud, harassment on social media, hate communities, and data theft. It provides the applicable laws for each type. Finally, it concludes with security awareness tips, emphasizing the importance of strong passwords, privacy settings, and caution on social media and mobile devices.
This document outlines the objectives, outcomes, and content of a computer security course. The objectives are to provide students with knowledge of computer security essentials, security algorithms and protocols, authentication and authorization systems, and IP-based web security standards. The outcomes are for students to understand computer security structures, security techniques and functions, in-depth network security algorithms, security threats, and firewall concepts. The content includes topics like cyber crimes, hackers, security principles, types of attacks, computer viruses, phishing, spoofing, fraud, and the Information Technology Act of 2000. It also provides security tips to help prevent cyber crimes.
The document discusses various sections and cases related to the Information Technology Act of India. Section 70 allows the government to declare any computer system as "protected" and authorize access. Section 71 deals with penalties for misrepresentation to authorities for licenses or certificates. Several cases are described related to hacking, credit card fraud, data theft, tampering with source code, and the "ILOVEYOU" computer virus from 2000. The amendments to the IT Act in 2006 are also summarized, changing terms to be technology neutral and exempting certain legal documents.
The document discusses various sections and cases related to the Information Technology Act of India. Section 70 allows the government to declare any computer system as "protected" and authorize access. Section 71 deals with penalties for misrepresentation to authorities for licenses or certificates. Several cases are described related to hacking, credit card fraud, data theft, tampering with source code, and the "ILOVEYOU" computer virus from 2000. The amendments to the IT Act in 2006 are also summarized, changing terms to be technology neutral and exempting certain legal documents.
Mobile security issues & frauds in IndiaYogesh Lolge
Mobile security issues and frauds in India are discussed. Several cases of fraud through SMS phishing, hacking of government websites, SMS scams collecting hundreds of millions of rupees, online credit card fraud on eBay, fake Orkut profiles, and MMS porn scams are described. Authentication, data encryption, firewalls, and intrusion prevention systems are recommended for better mobile security and cybercrime control. The conclusion emphasizes applying strong security concepts without backdoors to protect e-commerce and information technology in India.
Kandarp Shah has over 10 years of experience in information security consulting. The presentation aims to educate students about technology, internet, and cyber crimes as well as preventative measures. Cyber crime refers to criminal acts using computers and the internet. Motivations for cyber crimes include money, curiosity, revenge, and praise. Cyber crimes are increasing due to greater internet and smartphone use. Common cyber crimes discussed include cyber pornography, identity theft, email spoofing, intellectual property crimes, and cyber defamation.
This document summarizes penalties and offenses under the IT Act 2000 in India with case studies. It discusses sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, 67, and 69 of the Act and associated cases. One case study describes a credit card fraud where victims' computers were infected to make unauthorized online transactions. Another case found an individual guilty under sections 66 and 420 of tampering with broadband internet accounts and hacking sites across cities. The document concludes with an example of web defacement where a government site was altered on a symbolic day.
This document summarizes several cases related to cybercrime laws in India. It discusses cases involving online credit card fraud on eBay, an SMS scam that defrauded 50,000 people of 400 million rupees, the first conviction in an Indian cybercrime case involving the website Sony-sambandh.com, a call center fraud targeting Citibank customers, and India's first ATM card fraud case. The document provides details on the nature of the crimes and outcomes like arrests in these landmark cybercrime cases in India.
The document provides an overview of cyber crime, including its history, categories, types, and prevention. It discusses how the first recorded cyber crime took place in 1820 involving sabotage of new textile manufacturing technology. Cyber crimes are categorized as those against persons, property, government, and society. Common types of cyber crimes include hacking, phishing, viruses, and intellectual property theft. The document also provides cyber crime statistics and discusses cyber laws and prevention best practices like using antivirus software and firewalls.
Cybercrime refers to criminal activity that targets or uses computers, networks or devices. It can be carried out by individuals or organized criminal groups. Common cybercrimes include hacking, phishing, identity theft, and spreading malware. Cybercriminals use techniques like botnets, zombie computers and denial of service attacks. The majority of cyber attacks come from system insiders, viruses and theft of proprietary information. It is important for individuals and organizations to protect themselves by keeping software updated, using strong passwords, cybersecurity awareness and purchasing cyber insurance.
Cyber law governs criminal activities online and aims to protect individuals and organizations from cybercrimes like hacking and theft of intellectual property. The document discusses the types of cybercrimes, including those against persons, property, government, and society. It also covers India's cyber law act of 2002 and the need to educate law enforcement on investigating cybercrimes. Landmark cybercrime cases are mentioned to demonstrate the growth of these crimes and importance of prevention.
This document provides an overview of cyber law and cyber crimes in India. It begins by defining cyber crime and outlining the relevant sections of the Information Technology Act 2000. It then provides case studies to illustrate the application of sections 43, 65, 66, 66A, 66C, 66D, 66E, 66F, 67, 67B, 69 of the IT Act. It concludes by summarizing common cyber crime scenarios and the applicable legal sections, such as hacking, credit card fraud, cyber terrorism, and online harassment.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
Ready to Unlock the Power of Blockchain!Toptal Tech
Imagine a world where data flows freely, yet remains secure. A world where trust is built into the fabric of every transaction. This is the promise of blockchain, a revolutionary technology poised to reshape our digital landscape.
Toptal Tech is at the forefront of this innovation, connecting you with the brightest minds in blockchain development. Together, we can unlock the potential of this transformative technology, building a future of transparency, security, and endless possibilities.
1. Cyber Crime
• Various Types of Cyber Crime:
• Phishing : By using e-mail messages which completely
resembles the original mail messages of customers,
hackers can ask for verification of certain information,
like account numbers or passwords etc. here customer
might not have knowledge that the e-mail messages
are deceiving and would fail to identify the originality
of the messages, this results in huge financial loss
when the hackers use that information for fraudulent
acts like withdrawing money from customers account
without him having knowledge of it
2. Role of IT Act in Ecommerce
• The IT Act 2000 empowers the government
departments to accept filing, creating and retention
of official documents in the digital format
• From the perspective of e-commerce in India, the IT
Act 2000 and its provisions contain many positive
aspects. Firstly, the implications of these provisions for
the e-businesses would be that email would now be a
valid and legal form of communication in our country
that can be duly produced and approved in a court of
law.
3. • Case: Techie’s wife loses Rs.11 lakh to
phishing, ends life.
• In January 2016, in what is said to be the first
case of its kind, a phishing scam has claimed
the life of a 44-year-old woman in the city's
police limits.
4. • Hacking: Basically it’s trying to get into
computer systems in order to steal , corrupt,
or illegitimately view data. Hacking in simple
terms means an illegal intrusion into a
computer system and/or network. Hackers
write or use ready-made computer programs
to attack the target computer. They possess
the desire to destruct and they get the kick
out of such destruction.
5. • Case : Former Air India employee arrested for
hacking the airlines website, illegally selling
tickets
• July 2016, Anitesh Goswami, a former employee
hacked the airline’s website and obtained tickets
by redeeming miles of members of the Flying
Returns programme. He has been booked under
the IT Act. He is an IT expert and was well versed
with the functioning of the intranet and internet
based systems of Air India.
6. • Cyber Stalking : Cyberstalking is a crime in
which the attacker harasses a victim using
electronic communication, such as e-
mail or instant messaging (IM), or messages
posted to a Web site or a discussion group.
7. • Case: Cyber stalker accused of sending
obscene messages to over 2000 women
arrested
• July 7, 2016 Delhi Police arrested a 31-year-
old named Mohammad Khalid on charges of
sending obscene messages and pornographic
video clips to over 2000 women in New Delhi
following a complaint from a woman residing
at Ashok Vihar
8. • Child Pornography: Cyber pornography is
believed to be one of the largest businesses
on the Internet today. The millions of
pornographic websites that flourish on the
Internet are testimony to this. The Internet is
being highly used by its abusers to reach and
abuse children sexually, worldwide.
9. • Virus Dissemination: Viruses stop the normal
function of the system programs and also to
the whole computer system. They can also
ruin/mess up your system and render it
unusable without reinstallation of the
operating system
10. • Salami attacks : These attacks are used for the
commission of financial crimes. The key here is to
make the alteration so insignificant that in a
single case it would go completely unnoticed. E.g.
a bank employee inserts a program, into the
bank’s servers, that deducts a small amount of
money (say Rs. 5 a month) from the account of
every customer. No account holder will probably
notice this unauthorized debit, but the bank
employee will make a sizable amount of money
every month.
11. • Sale of illegal articles : This category of cyber
crimes includes sale of narcotics, weapons and
wildlife etc., by posting information on
websites, auction websites, and bulletin
boards or simply by using email
communication.
• Online gambling : There are millions of
websites; all hosted on servers abroad, that
offer online gambling.
12. • Forgery : Computers, printers and scanners are
used to forge counterfeit currency notes, postage
and revenue stamps, mark sheets etc. These are
made using computers, and high quality scanners
and printers.
• Credit Card Fraud: Credit card frauds are the
scams committed using others’ card in a
fraudulent way. It is the case where one’s card is
used without their knowledge or authorization to
purchase goods or services
13. • Case: 50 year old duped twice in credit card
fraud.
• July 10, 2016. A 50 year old man was duped
twice by unidentified suspects. After learning
about an unknown transaction worth over Rs
12,250 on his credit card, was done by some
unidentified suspects, he contacted the bank
requesting to block his card. But to his dismay, a
few days later he got another message regarding
a transaction made on his credit card was used
for shopping worth Rs 89,899.
14. Emerging Trends of Cyber Law
• Stringent regulatory rules are put in place by
many countries to prevent unauthorized
access to networks. Such acts are declared as
penal offences.
• Stakeholders of the mobile companies will call
upon the governments of the world to
reinforce cyber-legal systems and
administrations to regulate the emerging
mobile threats and crimes
15. • Cloud computing is another major growing
trend. With more advances in the technology,
huge volumes of data will flow into the cloud
which is not completely immune to cyber-
crimes.
• The growth of Bitcoins and other virtual
currency is yet another trend to watch out for.
Bitcoin crimes are likely to multiply in the near
future.
17. E- Governance
• e-Governance is basically associated with
carrying out the functions and achieving the
results of governance through the utilization
of ICT (Information and Communications
Technology).
Through e-governance, government services
will be made available to citizens in a
convenient, efficient and transparent manner.
18. • Government to Citizen:
• Computerization of Land Records : Ensuring
landowners get computerized copies of
ownership, crop and tenancy and updated
copies of Record of Rights on demand
19. • Government to Business:
• MCA 21 : By the Ministry of Corporate Affairs,
the project aims at providing easy and secure
online access to all registry related services
provided by the Union Ministry of Corporate
Affairs
20. • No clear provision for handling of domain name issues.
• It is covered into the civil procedure.
• There are not any clear provision.
• CASE : 2012: First PIL filed by a law student Shreya
Singhal seeking amendent in section 66A, after two
girls Shaheen Dhada and Rinu Shrinivasan were
arrested in Palghar in Thane district as one of them
posted a commect against the shut down in Mumbai
following the Shiv Sena Leader Bal Thackery’s death
and the other “liked” it.
21. • Section 43: Penalty and Compensation for Damage to
Computer, computer system etc.
• If any person without permission of the owner or any
other person who is in-charge of a computer, computer
system or computer network
• accesses or secures access to such computer, computer
system or computer network or computer resource
(ITAA2008)
• downloads, copies or extracts any data, computer data
base or information from such computer, computer
system or computer network including information or
data held or stored in any removable storage medium
22. • Case: Mphasis BPO Fraud, 2005.
• In December 2004, four call centre employees
working at an outsourcing facility operated by
MphasiS in India obtained PIN codes of 4
customers of Mphasis’ client, CitiGroup. They
were not authorised and yet they opened
accounts at Indian banks using false identities.
They transferred money from the bank accounts
of CitiGroup customers to their new accounts
with the Indian Banks. April 2005, they were
caught by the police on the basis of a tip off.
23. • Section 66 : Computer Related Offences
amended vide Information Technology
Amendment Act 2008 reads as under:
• If any person, dishonestly, or fraudulently,
does any act referred to in section 43, he shall
be punishable with imprisonment for a term
which may extend to two three years or with
fine which may extend to five lakh rupees or
with both.
24. • Section 66C – Punishment of Identity Theft
• Whoever, fraudulently or dishonestly make
use of the electronic signature, password or
any other unique identification feature of any
other person, shall be punished with
imprisonment of either description for a term
which may extend to three years and shall also
be liable to fine which may extend to rupees
one lakh
25. • Case: Man posing as actor held for Blackmailing
aspiring models:
• June 29, 2016. The cyber cell of the local police
arrested a man for allegedly luring aspiring models by
posing as renowned Punjabi actor Darshan Aulakh. The
accused was also allegedly blackmailing the models
and minting money from them on the pretext of giving
them roles in movies and music albums. The actor
lodged a complaint alleging that somebody was
misusing his name and misleading models by using the
name of Darshan Aulakh Productions.
26. • Section 66 D - Punishment for cheating by
personation by using computer resource
• Whoever, by means of any communication
device or computer resource cheats by
personation, shall be punished with
imprisonment of either description for a term
which may extend to three years and shall also
be liable to fine which may extend to one lakh
rupees
27. • Section 66E : Punishment for violation of privacy
• Whoever, intentionally or knowingly captures,
publishes or transmits the image of a private area
of any person without his or her consent, under
circumstances violating the privacy of that
person, shall be punished with imprisonment
which may extend to three years or with fine not
exceeding two lakh rupees, or with both
28. • Case: Man held for taking nude photos of aunt.
• July 18, 2016. Colaba police arrested a 32-year old man for
allegedly forcing his aunt to establish physical relationship
with him, clicking her nude photograph and threatening to
make her photograph viral if she did not comply to his
demands. The accused sent the victim's nude photograph
to her husband's mobile phone. When the husband
confronted her, she narrated her entire ordeal to him. The
husband complained to the Police and the accused was
caught while he was on the run by Immigration Authorities
and was booked under sections 66E (punishment for
violation of privacy) and 67A (punishment for publishing or
transmitting of material containing sexually explicit act in
electronic form) of the Information Technology Act.
29. • Section 66F : Punishment for cyber terrorism:
• Whoever,-
• (A) with intent to threaten the unity, integrity,
security or sovereignty of India or to strike
terror in the people or any section of the
people