This presentation is delivered at Income tax department on Information & Technology Act 2000 in India + Online threats to India by various terrorist organisations + Bitcoins + Ransom-ware + How dangerous it could be if we use smart phone and provide our data to Google.
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...manumelwin
In discharge of its international responsibility, the Government of India enacted a Law in 2000 known as Information Technology Act 2000. The Act extends to the whole of India and it applies also to any offence or contravention thereon committed outside India by any person.
• IT Act is based on the model of electronic commerce
adopted by UN Commission on international trade
law in 1996.
• It provides legal recognition to electronic commerce
transactions, allows electronic filing of documents
and penalizes computer related crimes.
• The cyber law is law relating to computers,
communications and internet and referred as ICT
law.
• ICT law covers e-commerce, e-governance,
Intellectual property, data security, cyber crimes and
issues of privacy.
Cyber law - Legal Environment of Business - Business Law - Commercial Law - M...manumelwin
In discharge of its international responsibility, the Government of India enacted a Law in 2000 known as Information Technology Act 2000. The Act extends to the whole of India and it applies also to any offence or contravention thereon committed outside India by any person.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
Important section of IT Act 2000 & IPC sections related to cyber law. these will help each one of us and give us details about these which are very important in our life.
History
Introduction
Introduce and finalized by Atal bhirai Bajpai
Parts of the Act
Amendments to I.T. ACT 2000
Offences of I.T ACT 2000
What works
What doesn’t work
Section of I.T. ACT 2000
The advantage of I.T. ACT 2000
The disadvantage of I.T ACT 2000
Conclusion
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
This presentation breifs about the Information Technology Act and Cyber Law in India 2000. The various acts involved in it, case studies and some recent amendments are also mentioned.
P.S: Refer the slides for educational purpose only.
This material is for PGPSE / CSE students of AFTERSCHOOOL. PGPSE / CSE are free online programme - open for all - free for all - to promote entrepreneurship and social entrepreneurship PGPSE is for those who want to transform the world. It is different from MBA, BBA, CFA, CA,CS,ICWA and other traditional programmes. It is based on self certification and based on self learning and guidance by mentors. It is for those who want to be entrepreneurs and social changers. Let us work together. Our basic idea is that KNOWLEDGE IS FREE & AND SHARE IT WITH THE WORLD
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
Important section of IT Act 2000 & IPC sections related to cyber law. these will help each one of us and give us details about these which are very important in our life.
History
Introduction
Introduce and finalized by Atal bhirai Bajpai
Parts of the Act
Amendments to I.T. ACT 2000
Offences of I.T ACT 2000
What works
What doesn’t work
Section of I.T. ACT 2000
The advantage of I.T. ACT 2000
The disadvantage of I.T ACT 2000
Conclusion
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
This presentation breifs about the Information Technology Act and Cyber Law in India 2000. The various acts involved in it, case studies and some recent amendments are also mentioned.
P.S: Refer the slides for educational purpose only.
This material is for PGPSE / CSE students of AFTERSCHOOOL. PGPSE / CSE are free online programme - open for all - free for all - to promote entrepreneurship and social entrepreneurship PGPSE is for those who want to transform the world. It is different from MBA, BBA, CFA, CA,CS,ICWA and other traditional programmes. It is based on self certification and based on self learning and guidance by mentors. It is for those who want to be entrepreneurs and social changers. Let us work together. Our basic idea is that KNOWLEDGE IS FREE & AND SHARE IT WITH THE WORLD
It provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication. Introduced by Pramod Mahajan, Minister of
Communications and Information Technology.
This PPt is very useful for any students , Law enforcement agencies, Cyber Forensic Experts. It includes Overview of Cyber Law in India which includes cyber offences and penalties. This ppt will help for the public to aware about cyber crime. This ppt covers Information Technology Act, 2000 and highlights on IT (Amendment) Act, 2008. This PPt also covers applicability of IT Act and Other Act's sections to Cyber crimes.
Similar to Information Technology act 2000 & Threats to India using Google (20)
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
Italy Agriculture Equipment Market Outlook to 2027harveenkaur52
Agriculture and Animal Care
Ken Research has an expertise in Agriculture and Animal Care sector and offer vast collection of information related to all major aspects such as Agriculture equipment, Crop Protection, Seed, Agriculture Chemical, Fertilizers, Protected Cultivators, Palm Oil, Hybrid Seed, Animal Feed additives and many more.
Our continuous study and findings in agriculture sector provide better insights to companies dealing with related product and services, government and agriculture associations, researchers and students to well understand the present and expected scenario.
Our Animal care category provides solutions on Animal Healthcare and related products and services, including, animal feed additives, vaccination
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...JeyaPerumal1
A cellular network, frequently referred to as a mobile network, is a type of communication system that enables wireless communication between mobile devices. The final stage of connectivity is achieved by segmenting the comprehensive service area into several compact zones, each called a cell.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
Instagram has become one of the most popular social media platforms, allowing people to share photos, videos, and stories with their followers. Sometimes, though, you might want to view someone's story without them knowing.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Information Technology act 2000 & Threats to India using Google
1. Information Technology
Act 2000
& illegal payment
Mechanism
Presented by :-
Hemraj Singh Chouhan
facebook.com/hschouhan
www.LinuxAcademy.org
2. “The Modern thief can steal more with a computer
than with a gun.
Tomorrow’s terrorist may be able to do more damage
with a keyboard than with a bomb”
- National Research Council, USA, “Computers at Risk” (1991)
3. We believe that they are Dangerous !!!
Ku Klux Klan
26/11 Attack Head
ISIS Head
4. Yes… Using Side effects of
Cashless India, they just need to Hack
only 1000 bank ACCOUNTS and let this
news spread via Indian Media and will create
Chaos...
5. I am here to explain
Information Technology
Act 2000
But being IT Security Specialist
I also want to discuss some
important security measures
6. Objectives of Information Technology
Act 2000
Legal Recognition for E-Commerce
Digital Signatures and Regulatory Regime
Electronic Documents at par with paper
documents
E-Governance
Electronic Filing of Documents
Amend certain Acts
Define Civil wrongs, Offences,
punishments
Investigation, Adjudication
Appellate Regime
7. Definitions (Section 2)
"computer" means electronic, magnetic, optical or
other high-speed date processing device or system
which performs logical, arithmetic and memory
functions by manipulations of electronic, magnetic
or optical impulses, and includes all input, output,
processing, storage, computer software or
communication facilities which are connected or
relates to the computer in a computer system or
computer network;
"computer network" means the inter-connection of
one or more computers through-
(i) the use of satellite, microwave, terrestrial lime or
other communication media; and
(ii) terminals or a complex consisting of two or more
interconnected computers whether or not the
interconnection is continuously maintained;
8. REGULATION OF CERTIFYING AUTHORITIES
Govt. Of IndiaGovt. Of India
Controller of
Certifying
Authorities
Controller of
Certifying
Authorities
Deputy
Controllers
Deputy
Controllers
Assistant
Controllers
Assistant
Controllers
Supreme CourtSupreme Court
High CourtHigh Court
Cyber
Regulations
Appellate
Tribunal.
Cyber
Regulations
Appellate
Tribunal.
OfficerOfficer
Regulation StructureRegulation Structure
J
U
D
I
C
I
A
L
S
T
R
U
C
T
U
R
E
J
U
D
I
C
I
A
L
S
T
R
U
C
T
U
R
E
9. Civil offenses under the IT Act 2000
Sec Offence Punishment
43 Damage to Computer, Computer system etc. Compensation to the tune of Rs.1 crore to the affected person.
44(a) For failing to furnish any document, return on report
to the Controller or the Certifying Authority.
Penalty not exceeding one lakh and fifty thousand rupees for each
such failure.
44(b) For failing to file any return or furnish any information
or other document within the prescribed time.
Penalty not exceeding five thousand rupees for every day during
which such failure continues.
44(c) For not maintaining books of account or records. Penalty not exceeding ten thousand rupees for every day during which
the failure continues.
45 Offences for which no penalty is separately provided. Compensation not exceeding twenty five thousand rupees to the
affected person or a penalty not exceeding twenty five thousand
rupees.
65 Tampering with computer source documents. Imprisonment upto three years, or with fine which may extend upto
two lakh rupees, or with both.
66 Hacking with computer system with the intent or
knowledge to cause wrongful loss.
Imprisonment upto three years, or with fine which may extend upto
two lakh rupees, or with both.
66A For sending offensive messages through
communication service etc.
Imprisonment for a term which may extend to three years and with
fine.
66B For dishonestly receiving stolen computer resource or
communication device.
Imprisonment of either description for a term which may extend to
three years or with fine which may extend to rupees one lakh or with
both.
10. Sec Offence Punishment
66D For cheating by personation by using computer
resource.
Imprisonment of either description for a term which may extend to
three years and shall also be liable to fine which may extend to one
lakh rupees.
66D For cheating by personation by using computer
resource.
Imprisonment of either description for a term which may extend to
three years and shall also be liable to fine which may extend to one
lakh rupees.
66E. For violation of privacy Imprisonment which may extend to three years or with fine not
exceeding two lakh rupees, or with both.
66F For cyber terrorism Imprisonment which may extend to imprisonment for life.
67 Publication of obscene material in an electronic form. Imprisonment upto 5 years and with fine which may extend to one lakh
rupees on first conviction and its double punishment for second and
subsequent convictions.
67A For publishing or transmitting of material containing
sexually explicit act etc. in electronic form.
Imprisonment upto 5 years and with fine which may extend to ten lakh
rupees and in the event of second or subsequent conviction with
imprisonment of either description for a term which may extend to
seven years and also with fine which may extend to ten lakh rupees.
67B For publishing or transmitting of material depicting
children in sexually explicit act etc. in electronic form.
Imprisonment upto five years and with fine which may extend to ten
lakh rupees and in the event of second or subsequent conviction with
imprisonment of seven years and also with fine which may extend to
ten lakh rupees.
67C For preserving and retention of information by
Intermediaries.
Imprisonment upto three years and also liable to fine.
68 For failing to comply with the directions of the
Controller.
Imprisonment upto 3 years and fine upto two lakhs, or both.
11. Sec Offence Punishment
69 For failing to extend facilities to decrypt
information which is against the interest of
sovereignty or integrity of India.
Imprisonment which may extend to seven years.
70 Securing or attempting to secure access to a
protected system.
Imprisonment which may extend to 10 years and fine.
71 For misrepresentation or suppression of any
material fact from the Controller or the
Certifying Authority.
Imprisonment upto 2 years, or fine upto rupees one lakh or with both.
72 For break of confidentiality and privacy Imprisonment upto two years or fine upto rupees one lakh, or with
both.
72A For disclosure of information in breach of
lawful contract.
Imprisonment upto three years or with fine upto five lakh rupees or
with both.
73 For publishing digital signature certificate false
in certain particulars.
Imprisonment upto two years or with fine which may extend to one
lakh rupees or with both.
74. Publication of Digital Signature Certificate for
any fraudulent or unlawful purpose.
Imprisonment upto two years or fine upto rupees one lakh.
76 Any computer, computer system, floppies,
compact disks, tape drives or any other
accessories related thereto used for
contravention of this Act, rules, orders or
regulations made thereunder.
Liable to confiscation.
12. Criminal offenses
• Tampering with computer source documents
• Hacking with computer system
• Electronic forgery I.e. affixing of false digital
signature, making false electronic record
• Electronic forgery for the purpose of harming
reputation & Cheating
• Using a forged electronic record
• Publication of digital signature certificate for
fraudulent purpose
• Unauthorised access to protected system
• Confiscation of computer, network, etc.
• Misrepresentation or suppressing of material
facts for obtaining Digital Signature
Certificates
• Breach of confidentiality and Privacy
• Publishing false Digital Signature Certificate
13. Check-list Information security
manager
Establish information security forum
Define scope of Management
Information System
Risk assessment
Division of threats of Information
within centralized and distributed
systems
14. Even after so many level of
checking & Monitoring
It is easy to do
Share Trading with 100’s of pan
card in the name of servant's
15. IT is very easy to get the Aadhar card
without unique finger prints and
We believe that connecting
PAN with Aadhar will solve
problems
16. Money Laundering
Being Information Security Analyst I guess
it is easy to convert
Black money into white via Movie Release outside
the country and
Showing disproportionate sale of Movie Tickets
17. If I am buying fashion from flipkart in different names
from different different email accounts no
Body in able to trace me
My friends are buying Petrol / Diesel more than Rs. 2 LAC
no body is monitoring them
18. If I am buying fashion from flipkart in different names
from different different email accounts no
Body in able to trace me
My friends are buying Petrol / Diesel more than Rs. 2 LAC
no body is monitoring them
19. Adding Unique Identity like Aadhar is only
solution but with some precautions
Passport deptt. saves the fingerprint prints of applicant
And process them in batch in night. This means we can
save the finger prints also.
Now in obtaining JIO sim even panwala’s are using their
mobile along with hand held finger print scanner to verify
your details. It is very simple to store finger print in their
custom phones.
We need authorized encrypted Aadhar enabled
POS machines at limited authorized centers.
24. Most of the times we only
open the websites listed in
popular search
engine’s
25. Deep Web Contents are
not listed in search
engines so we can not find
those in Google
26. Search engines only
stores data of static url like :-
LinuxAcademy.org
LinuxAcademy.org/contactus.html
LinuxAcademy.org/about.html
Static URL
27.
28. How Antisocial elements gets access to
Deep web
Tor
Browser
As I am a cyber law student, I just want to alert you once again using this browser
may put you bhind the bars
38. Bitcoin is a Cryptocurrency, a form of money that uses
cryptography to control its creation and management, rather than
relying on central authorities. Satoshi Nakamoto (the
creator of bitcoin) integrated many existing ideas from the
cypherpunk community when creating bitcoin.
Creation
In November 2008, a paper was posted on the internet
under the name Satoshi Nakamoto titled bitcoin : A “Peer-to-
Peer Electronic Cash System”.
39.
40. How do Cyber terrorist’s identify & targets you….
What do you think who is
Biggest Hacker
in this world ??
41. Google, Google is the biggest Hacker as you saw
in previous slides that all data related with Surface web
is available with search engines.
So if you want to stay safe like China or Russia then you need to stop googling.
NSA is watching you so closely that you can’t imagine.
Best example of Google Data Mining is Google Traffic
42. Gabriel Weinberg launched DuckDuckGo as a
search engine that puts privacy first, rather than
collecting data for advertisers and security
agencies…
The search engine that doesn't track you.
45. The first ever computer virus was developed in
1986 by two Pakistani brothers in Lahore. The first
computer virus named "Brain" was designed by Amjad
Farooq Alvi and Basit Farooq Alvi
46. Variety of Virus available with us :
Virus
Worms
Trojans
Spyware
Malware
now Ransomware
Deep Web Users are not generating much money
so they created Ransomware (Ransom + Ware)
47. RANSOMWARE
Ransomware is a new type of virus that attempts to
extort money from a computer user by infecting and
tacking control of the victim’s machine, or the files or
documents stored on it.
Typically, the Ransomware will either
‘Lock’ the computer to prevent normal usage, or
encrypt the documents and files on it to prevent
access to the saved data.
48.
49. RANSOMWARE
Only 15%chance is there to get data back
once it is encrypted using 128 Bit encyrption.
They demand Ransom in Bitcoins
using Dark Web, so their detection in
next to impossible.
50. RANSOMWARE
It will not attack on each every system,
Ransomware only encrypts the
system containing Data files.
51. TYPES OF RANSOMWARE
The most common type displays messages
intended to coax the user into paying (Eg. Your
machine is infected)
More destructive types encrypt files in the
system’s hardware (Encryption Ransomware)
A new released version actually locks the
operating system (Lock Screen RansomWare)
Master Boot Record (MBR) Ransomware
55. HOW RANSOMWARE IS
DEPLOYED
ATTACHMENTS- Most come through as ZIP
files or “invoices”
ADVERTISEMENTS - Ad Network are often
targeted and exploited for these types of attack
SECURITY HOLES - Java,Flash,Macros
(Word,Excel)
56. HOW RANSOMWARE IS
DEPLOYED
Using Pen Drive on public computers in
Windows Environment.
Using Pirated Windows & Pirated Antivirus
Using Public Wifi / Open Public Network
Using Internet Explorer
57. STRATEGIES
TO COMBAT RANSOMWARE
USE LINUX-
There have been no reported cases of
Ransomware taking over anyone's Linux based
operating system so why not join the millions of
people who have left Windows behind for a more
secure way of working.
Income Tax Officer’s can use Linux Machine as
their DATA Server
58. STRATEGIES
TO COMBAT RANSOMWARE
BACKUP YOUR FILES USING DROPBOX
or any other cloud Software
Backing up your files is still a good idea however for reasons
mentioned earlier such as protecting against disk failures, fires
and burglary.
59. Solution
Right now we Don’t have any solution of high
end Ransomware like Cerber
Quick Heal and other antivirus company are
providing solutions for lower end Ransomwares
which is approx 10%
60. Thankyou
For any Query or Suggestions : -
www.facebook.com/hschouhan
Call us at – 4700646, 9981511646
info@linuxacademy.org