This seminar covered cyber crime, the IT Act, and intellectual property. It discussed types of cyber crimes like hacking and child pornography. It provided examples of cyber crimes in India, the US, and UK. The seminar also discussed the IT Act of 2000 in India, cyber security, and positive initiatives to combat cyber crimes. Finally, it covered intellectual property concepts like patents, trademarks, copyrights and their importance.
One of the most extensive and coolest presentations i have made so far on the IT act in India, its implementation and an overview of cyber crimes in India
One of the most extensive and coolest presentations i have made so far on the IT act in India, its implementation and an overview of cyber crimes in India
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
This presentation breifs about the Information Technology Act and Cyber Law in India 2000. The various acts involved in it, case studies and some recent amendments are also mentioned.
P.S: Refer the slides for educational purpose only.
What does IT Act 2000 legislation deals with? The Act essentially deals with the following issues: Legal Recognition of Electronic Documents, Legal Recognition of Digital Signatures, Offenses and Contraventions, Justice Dispensation Systems for cyber crimes.
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
Cybercrime Investigations and IT Act,2000Karnika Seth
This presentation was delivered by Cyberlaw Expert, Karnika Seth to chartered Accountants of ICAI dealing in cyber frauds and discusses the key features of IT Act,2000 and Cybercrime investigations.
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
An Introduction to Cyber Law - Chetan Bharadwaj
The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
This presentation breifs about the Information Technology Act and Cyber Law in India 2000. The various acts involved in it, case studies and some recent amendments are also mentioned.
P.S: Refer the slides for educational purpose only.
What does IT Act 2000 legislation deals with? The Act essentially deals with the following issues: Legal Recognition of Electronic Documents, Legal Recognition of Digital Signatures, Offenses and Contraventions, Justice Dispensation Systems for cyber crimes.
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997.
Cybercrime Investigations and IT Act,2000Karnika Seth
This presentation was delivered by Cyberlaw Expert, Karnika Seth to chartered Accountants of ICAI dealing in cyber frauds and discusses the key features of IT Act,2000 and Cybercrime investigations.
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
An Introduction to Cyber Law - Chetan Bharadwaj
The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
content explained:-
what is cyber crime
history
categories
types
motives
safety tips
cyber security
advantages and disadvantages
cyber law
cyber law objectives
cyber law in india
conclusion
The slide contains various day to day cyber-crimes prevailing in India as well as in the world. It talks about various measures to be taken while you are in the cyber-world.
Because the technology is used largely in the last decades; cybercrimes have become a significant
international issue as a result of the huge damage that it causes to the business and even to the ordinary
users of technology. The main aims of this paper is to shed light on digital crimes and gives overview about
what a person who is related to computer science has to know about this new type of crimes. The paper has
three sections: Introduction to Digital Crime which gives fundamental information about digital crimes,
Digital Crime Investigation which presents different investigation models and the third section is about
Cybercrime Law.
Because the technology is used largely in the last decades; cybercrimes have become a significant
international issue as a result of the huge damage that it causes to the business and even to the ordinary
users of technology. The main aims of this paper is to shed light on digital crimes and gives overview about
what a person who is related to computer science has to know about this new type of crimes. The paper has
three sections: Introduction to Digital Crime which gives fundamental information about digital crimes,
Digital Crime Investigation which presents different investigation models and the third section is about
Cybercrime Law.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. Contents
Cyber Crime
Cyber Crime in India
Cyber Crime in USA
Cyber Crime in UK
IT Act
Positive Initiatives & Recommendations
Intellectual Property
Patents and Trademarks
Copyrights
3. Cyber Crime
• Cybercrime is defined as a crime in which a computer is the
object of the crime (hacking, phishing, spamming) or is used as a
tool to commit an offence (child pornography, hate crimes).
• Cybercriminals may use computer technology to access personal
information, business trade secrets, or use the Internet for
exploitive or malicious purposes. Criminals can also use
computers for communication and document or data storage.
• It mainly consists of unauthorized access to computer systems,
data alteration, data destruction, data theft etc.
• The first recorded cyber crime took place in the year 1820.
4. Types of Cybercrime
1.HACKING :
Hacking in simple terms means an illegal intrusion into a
computer system and/or network. It is also known as
CRACKING. Government websites are the hot targets of the
hackers due to the press coverage, it receives. Hackers enjoy
the media coverage.
2.CHILD PORNOGRAPHY:
The Internet is being highly used by its abusers to reach and
abuse children sexually, worldwide. . As more homes have
access to internet, more children would be using the internet
and more are the chances of falling victim to the aggression of
pedophiles.
5. Types of Cybercrime
3.COMPUTER VANDALISM:
Damaging or destroying data rather than stealing or misusing
them is called cyber vandalism. Transmitting virus: These are
programs that attach themselves to a file and then circulate .
They usually affect the data on a computer, either by altering or
deleting it against properties.
6. Types of Cybercrim
4.SOFTWARE PIRACY:
Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of products
intended to pass for the original.
7. Cyber Crime in India
• The major Cyber Crimes reported, in India,
are phishing, Spam, hacking, Computer Virus
and Worms, Denial of Services, Defacement of
websites.
• Nearly $4 billion in direct financial losses
country every year.
• 29.9 million people fell victim to cybercrime.
• 3 in 5 online adults (60%) have been a victim
of Cybercrime.
8. Cyber cell office in India
Cyber cell offices are
situated in india's major
cities like
1.chennai
2.Banglore
3Delhi
4Mumbai
5.Hyderabad
6.pune
9. Charges of solving of
cyber crimes
•Charges of solving of different cyber crime in india
varies according to their complexities.
•Because there are different kind of cyber crimes are
exist in india.
For ex:- credit card fraud
Atm card fraud
Identity theft
Password stealing.
10. Cyber Crime in USA
• USA is the most targeted country for cyber
attacks.
• Social networks as well as ecommerce sites are
major targets.
• 14,348 website defacements in 2011.
• 4,150 .com domains were defaced during 2012.
• 15,000 sites hacked in 2012.
• USA is the number 1 country in the world for
generating spam.
11. Cyber Crime in European Union
• UK is the one of the most targeted country
for cyber attacks after USA.
• 71 Million Internet Users .
• 35 Million Active Internet Users, up by 28%
from 26 million in 2010.
• 20 Million users shop online on Online
Shopping Sites.
12. Cyber security
Cyber security involves protection of sensitive personal and
business information through prevention, detection, and
response to different online attacks.
Cyber security actually protects your personal information by
responding, detecting and preventing the attacks. Cyber
security
Privacy policy :
Before submitting your name, email address, or other personal
information on a web site, look for the site's privacy policy.
Many sites use SSL or secure sockets layer, to encrypt
information. Protecting your privacy.
13. Keep software up to date:
If the seller releases patches for the software
operating your device, install them as soon as possible.
Installing them will prevent attackers from being able to take
advantage. Use good passwords: Select passwords that will
be difficult for thieves to guess. Do not choose options that
allow your computer to remember your passwords. How
can we protect?
Disable remote connectivity:
Some PDA’s and phones are equipped with wireless
technologies, such as Bluetooth, that can be used to connect
to other devices or computers. You should disable these
features when they are not in use.
14. Advantages of cyber security
It will defend us from critical attacks.
It helps us to browse the safe website.
Internet security process all the incoming and outgoing data on our
computer.
15. Challenges of cyber security
Challenges of cyber security Explosion of computer and
broadband internet availability .
Low priority of security for software developers.
Challenge of timely patching vulnerabilities on all systems.
17. IT Act,2000
Enacted on 17th May 2000- India is 12th
nation in the world to adopt cyber laws. It
was amended in 2008.
It involve the use of alternatives to paper-
based methods of communication and
storage of information, to facilitate
electronic filing of documents with the
Government agencies and further to
amend the Indian Penal Code and other
Acts.
18.
19. Cyber Law of European Union
Cyber crimes can involve criminal activities that are traditional
in nature, such as theft, fraud, forgery, defamation and
mischief.
In Simple way we can say that cyber crime is unlawful acts
wherein the computer is either a tool or a target or both .
The abuse of computers has also given birth to a gamut of
new age crimes that are addressed by the Information
Technology Act, 2000.
20. European Union criminal law
Article 2 – Illegal access
Article 3 – Illegal interception
Article 4 – Data interference
DesigArticle 5 – System interference
Article 6 – Misuse of devices
Article 7 – Computer-related forgery
Article 8 – Computer-related fraud
21. Case Study-1
Case of Child Pornography:-
Culprit: David.v.mazinta
Year: In 2001
Article: under Article 8
• Offences related to child pornography
22. The case is related to cyber crime as the internet is being
highly used by its abusers to reach and abuse children
sexually, worldwide. As more homes have access to
internet, more children would be using the internet and
more are the chances of falling victim to the aggression of
pedophiles.
Caught by Inter Pole
Punishment: Sent to jail for 5 years.
23. Case Study-2
Case: SWEDEN Citibank Call Center Fraud
€ 3,50,000 from accounts of four customers were dishonestly transferred
to bogus accounts
24. Contd..
. In such cases, preliminary investigations do not
reveal that the criminals had any crime history.
Customer education is very important so
customers do not get taken for a ride.
So , under the EUROPEAN ACT 227-24,
Those employees were punished and were
imprisoned for 7 years.
25. Positive Initiatives &
Recommendations
Mumbai Cyber lab is a joint initiative of
Mumbai police and NASSCOM has been set
up.
Stricter provisions for online offences
required as compared to offline mode.
More Public awareness campaigns
Training of police officers to effectively
combat cyber crimes.
27. Intellectual property (IP)
refers to creations of the
mind: inventions, literary
and artistic works, and
symbols, names, images,
and designs used in
commerce.
Meaning
28. Categories of Intellectual Property
Industrial property, which includes
inventions (patents), trademarks,
industrial designs, and geographic
indications of source
Copyright, which includes literary
and artistic works such as novels,
poems and plays, films, musical
works, dance, artistic works such as
drawings, paintings, photographs ,
sculptures, and architectural designs
29. Rights related to copyright
include those of performing
artists in their performances,
producers of phonograms in
their recordings, and those
of broadcasters in their radio
and television programs.
Cont…
30. Intellectual Property rights provide an
exclusive right to stop others.
Intellectual Property right holder may
provide licenses to others.
31. Intellectual Property Right
Intellectual Property
Rights, by providing
exclusive rights to the
inventor or creator,
encourages more and
more people to invest
time, efforts and
money in such
innovations and
creations.
32. Patents and Trademarks
Patents are the primary means of protecting an
original invention/design.
The right to exclusively produce, use and /or
market a product, process or any improvement.
Invention is patentable if its new, useful and not
obvious.
Any symbol, logo, word, sound, color, design, or
other device that is used to identify a business
or a product is TRADEMARK.
It has a longer life than a patent.
33. What is “copyright”?
Copyright is a legal term
describing rights given to
creators for their literary
and artistic works.
34. Cont…
“The statutory privilege extended
to creators of works that are fixed
in a tangible medium of
expression.”
(Bruwelheide, 1995)
35. Copyrights
• Copyright is a form of protection given to
authors/creators of original works.
• This property right can be sold or transferred to
others.
• Copyright is a legal protection for the authors of
“original works of authorship”.
• Copyright protects a creator’s work from being
copied, distributed, or adapted without the
permission of the copyright holder
36. What is covered by copyright?
literary works such as novels,
poems, plays, reference works,
newspapers and computer
programs; databases;
films, musical compositions, and
choreography;
artistic works such as paintings,
drawings, photographs and
sculpture; architecture;
and advertisements, maps and
technical drawings.
37. What is covered by copyright?
literary works such as novels,
poems, plays, reference works,
newspapers and computer
programs; databases;
films, musical compositions, and
choreography;
artistic works such as paintings,
drawings, photographs and
sculpture; architecture;
and advertisements, maps and
technical drawings.
38. What is not covered by copyright?
•ideas
•facts
•recipes
•blank forms
•stock literary devices
•works lacking
originality (e.g. the
phone book)
•names, titles or short
phrases
•works from the federal
government
40. Duration of Copyright
Copyright in a literary work, lasts for the-
Author’s lifetime plus 50 years from the
end of
The calendar year in which the author
dies
50 years for films and sound recordings
25 years for typographical arrangements
of a published edition
41. Cont…
Moral rights last for as long as
Copyright and can not be assigned
An author may waive his/her
moral rights by signing an
agreement to that effect
42. Importance of copyright
Respect intellectual rights of creators
of information
Reward creativity of authors, artists,
musicians, etc.
Legal mandate
Model proper behavior for students,
teachers, and other members of
educational community
43. Conclusion
Cybercrime is indeed getting the recognition it deserves. However,
it is not going to restricted that easily. In fact, it is highly likely that
cybercrime and its hackers will continue developing and upgrading
to stay ahead of the law. So, to make us a safer we must need
cyber security.
Intellectual Property Rights, by providing exclusive rights to the
inventor or creator, encourages more and more people to invest
time, efforts and money in such innovations and creations.
Copyright is a form of protection given to authors/creators of original works.
Copyright protects a creator’s work from being copied, distributed, or
adapted without the permission of the copyright holder.