SlideShare a Scribd company logo
A Seminar Presntaion
On
Cyber Crime,IPC & IT Act 2008
Presented to:
Mr. Pankaj Dadheech
Reader, CSE
Presented by:
Dushyant Kr Marwal
11ESKCS047
Contents
 INTRODUCTION
 HISTORY OF CYBER CRIME
TYPES OF CYBER CRIME
 CYBER CRIMINALS
 CATEGORIES OF CYBER CRIME
CYBER SECURITY
An !dea about Cyber Crime
▪ Crime committed using the computer and the
internet to steal the person’s identity or illegal
imports or malicious programs.
▪ Cyber Crime is nothing but where the computer is
used as an object or a subject of crime.
History of Cyber Crime
▪ The first recorded cyber crime LOOM took place
in the year 1820.
▪ After that in 1978 a SPAM EMAIL is found when it
was sent out over the ARPANet (Advanced
Research Project Agency Network).
Types of Cyber Crime
 Virus/Worm Attacks
 Trojan Attacks
 Email Bombing
 Phishing
 Denial of Service Attack
 Web Jacking
Types of Cyber Crime(Contd…)
 Child Pornography
 Cyber Laundering
Cyber Stalking
 Cyber Theft
Botnet
Cyber Criminals
▪ Those who are doing crimes by using the computer
as an target or object.
o Children and adolescents between the age
group of 6-18 years .
o Dissatisfied employees.
o Professional hackers / crackers.
Categories of Cyber Crime
▪ Cyber crimes can be basically divided into three
categories:
o Cyber crimes against persons.
o Cyber crimes against property.
o Cyber crimes against government.
Against persons
 Harassment via E-mails: Harassment through e-mails is
not a new concept. It is very similar to harassing through
letters.
 Email Spoofing: A mail which misrepresents its origin. It
shows it’s origin to be different from which actually it
originates.
Against property
 Computer vandalism: Damaging or destroying data
rather than stealing or misusing them is called Computer
vandalism.
 Transmitting virus: These are programs that attach
themselves to a file and then circulate.They usually affect
the data on a computer, either by altering or deleting it.
Against Government
CyberTerrorism:
• Terrorist attacks on internet is by:
o Distributed denial of service attacks
o Fake websites and fake emails
o Attacks on sensitive computer networks , etc.
• In this terrorists are using 512 bit encryption, which is
impossible to decrypt.
How can we protect it?
▪ Keep Software up to Date: If the seller releases patches for the
software operating your device, install them as soon as possible.
▪ Use Good Passwords: Select passwords that are difficult to guess. Do
not options that allows your computer to remember the password.
▪ Disable Remote Connectivity: Some PDA’s & Phones are equipped
with wireless technologies, such as Bluetooth.You should disable
these features when they are not in use.
Intellectual Property Right
Contents
▪ Introduction
▪ Importance of IPR
▪ Forms of IPR
▪ Patent
▪ Copyright
▪ Trademark
▪ Laws in india
What is Intellectual Property ?
▪ Creation of human mind
▪ Idea or a concept or a thought at the
beginning
▪ Research and Development to lead the idea
▪ The outcome of these ideas may be
development of products, processes and
design etc.
Why IPR is important?
•Reward original efforts ?
•Prevent duplication of work?
•Commercial value in research?
•Technical information for research &
to prevent litigation?
Patent
Patent defined in Patents Act as “patent
granted for any invention under the Act”.
 Granted by the Government
 To inventor
 To prevent third parties not having his consent
from making, using, offering for sale. (Sec. 48)
 For a limited period of time (20 years)
 Qualified rights with duties
Copyright Act
▪ Objective:To ensure protection from unlawfully
exploitation of the work of owner(Author)
▪ Copyright act provides exclusive rights to authors
and other owners of original works.
▪ Exclusive privilege to authors to reproduce,
distribute, perform or display their creative works.
FilmsLiterary Dramatic Musical Artistic
What is covered by copyright ?
What is not covered by copyright ?
Ideas
Facts
Recipes
Names, titles or short phrases
Trademark
▪ Word or symbol used by manufacturers to
identify goods.
▪ Initial registration for 10 yrs and further
renewed by payment of fees for unlimited
period.
Types of trademark
▪ TM - a Trade Mark™ - used before registration
▪ SM - a Service Mark SM - used before registration
▪ Rights by Registration®
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
Color
Duration of protection
YEARS RENEWABLE
Patents 20 No
Trade marks 6-10 Yes
Designs 6-10 Yes
Copyright 70 after death No
CYBER LAWS
(IT ACT 2000)
Content:
▪ Cyber law
▪ Need of Cyber law
▪ Cyber Laws in India
▪ Challenges facing law enforcement
▪ Positive Initiatives
Need of cyber law
▪ Tackling cyber crime
▪ Successful and smooth functioning of e-
commerce and virtual communication
▪ Cloud computing is proving to be a major
threat
Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act, 2000.
CYBER LAWS IN INDIA
▪ IT act 2000 passes
▪ Up gradation of IT act 2000-introducing IT act 2008
▪ IPC acts
▪ Copy right act
The IT ACT, 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
o Offenses and Contraventions
o Justice Dispensation Systems for cybercrimes
Contd…..
oCivilWrongs under IT Act
oSection 46: IT Act
oSection 65: Source Code
oSection 66: Hacking
oSec. 67. Pornography
Contd….
o Sec 69: Decryption of information
oSec 70 : Protected System
oEmail spoofing
oCyber stalking
Information Technology Act 2008
o Information Security
o New sections on offences
o Data Protection.
o Section 69 empowers the C Gov/S Gov
Computer Related Crimes under IPC
and Special Laws
Arms ActOnline sale of Arms
Sec. 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416, 417, 463 IPCEmail spoofing
Sec 420 IPCBogus websites, cyber frauds
Sec 463, 470, 471 IPCForgery of electronic records
Sec 499, 500 IPCSending defamatory messages by email
Sec 503 IPCSending threatening messages by email
Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
POSITIVE INITIATIVES:
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging
reporting of cyber crime cases.
o Specialized Training
o Active coordination between police and other law
enforcement agencies
ASLU Survey published in March 2014-
Incidence of Cyber crime in India
UNAUTHORISED
ACCESS 19%
E-MAIL ABUSE 21%
DATA THEFT 33%
Conclusion
Cyber crime is indeed getting the recognition it deserves.
 It is highly likely that cyber crime and its hackers will
continue developing and upgrading to stay ahead of the
law.
 Create yourself, rather than using other’s
creations.
Technological advancement made the job of the
CREATOR easy
 Copyright Law of the USA, Chapter 1 Section 121
 Schechter, Roger E., and John R. Thomas. Intellectual Property: The Law of
Copyrights, Patents and Trademarks.
 Trend micro incorporated research paper
 ATO Z OF Cyber Crime By Aayushi shah.
 Computer Security Policy Guidebook(WILEY publication).
 Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime,"
Anderson Publishing
Refrences:
Thank you…

More Related Content

What's hot

Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
Tapan Khilar
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
Rajveer Choudhary
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
Mukesh Tekwani
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
Onkar1431
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Anchit Rajawat
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Anees Raza
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
little robie
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Nuria Quiles
 

What's hot (20)

Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Rajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentationRajveer choudhary cyber crime presentation
Rajveer choudhary cyber crime presentation
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Patent Law in India_What,How to get it regisgtered and protected
Patent Law in India_What,How to get it regisgtered and protectedPatent Law in India_What,How to get it regisgtered and protected
Patent Law in India_What,How to get it regisgtered and protected
Krishan Singla
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Shivam Lohiya
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patentsravijain90
 
Patent registration in india
Patent registration in india Patent registration in india
Patent registration in india Parth Purohit
 
Password selection,piggybacking-
Password selection,piggybacking-Password selection,piggybacking-
Password selection,piggybacking-Baljit Saini
 
Security Training: #2 Cryptography Basics
Security Training: #2 Cryptography BasicsSecurity Training: #2 Cryptography Basics
Security Training: #2 Cryptography BasicsYulian Slobodyan
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Yulian Slobodyan
 
Evolution Of IPR
Evolution Of IPREvolution Of IPR
Evolution Of IPR
Lalit Ambastha
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
The Role of People Management, Performance and Incentives in more effective L...
The Role of People Management, Performance and Incentives in more effective L...The Role of People Management, Performance and Incentives in more effective L...
The Role of People Management, Performance and Incentives in more effective L...
Kenny Ong
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
Marcelo Martins
 
patenting procedure in india
patenting procedure in indiapatenting procedure in india
patenting procedure in india
Takur Singh
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
LJ PROJECTS
 
Concept of hashing
Concept of hashingConcept of hashing
Concept of hashingRafi Dar
 
Hashing and Hash Tables
Hashing and Hash TablesHashing and Hash Tables
Hashing and Hash Tables
adil raja
 
Hashing PPT
Hashing PPTHashing PPT
Hashing PPT
Saurabh Kumar
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & lawssureshjogesh48
 

Viewers also liked (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Patent Law in India_What,How to get it regisgtered and protected
Patent Law in India_What,How to get it regisgtered and protectedPatent Law in India_What,How to get it regisgtered and protected
Patent Law in India_What,How to get it regisgtered and protected
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 
Patent registration in india
Patent registration in india Patent registration in india
Patent registration in india
 
Password selection,piggybacking-
Password selection,piggybacking-Password selection,piggybacking-
Password selection,piggybacking-
 
Security Training: #2 Cryptography Basics
Security Training: #2 Cryptography BasicsSecurity Training: #2 Cryptography Basics
Security Training: #2 Cryptography Basics
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?
 
Bluetooth Hacking
Bluetooth HackingBluetooth Hacking
Bluetooth Hacking
 
Evolution Of IPR
Evolution Of IPREvolution Of IPR
Evolution Of IPR
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
The Role of People Management, Performance and Incentives in more effective L...
The Role of People Management, Performance and Incentives in more effective L...The Role of People Management, Performance and Incentives in more effective L...
The Role of People Management, Performance and Incentives in more effective L...
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
patenting procedure in india
patenting procedure in indiapatenting procedure in india
patenting procedure in india
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Concept of hashing
Concept of hashingConcept of hashing
Concept of hashing
 
Ch17 Hashing
Ch17 HashingCh17 Hashing
Ch17 Hashing
 
Hashing and Hash Tables
Hashing and Hash TablesHashing and Hash Tables
Hashing and Hash Tables
 
Hashing PPT
Hashing PPTHashing PPT
Hashing PPT
 
Cyber crime types & laws
Cyber crime types & lawsCyber crime types & laws
Cyber crime types & laws
 

Similar to it act

Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
Divesh Mewara
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
RP6997
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
My presentation
My presentationMy presentation
My presentation
sa12chindra
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Pragnesh Ghoda
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
SumedhaBhatt2
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy laws
esther_sonu
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
Setu Joshi
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
Neeraj Ahirwar
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
Zeshan Sattar
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
talhajann43
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
manisha9kathuria
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)
Apurv Singh Gautam
 
cyber security .pdf
cyber security .pdfcyber security .pdf
cyber security .pdf
AshutoshNegi29
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
ParasSehgal12
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
Nithin Raj
 

Similar to it act (20)

Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
My presentation
My presentationMy presentation
My presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy laws
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)SIT Summer School (Cyber Security)
SIT Summer School (Cyber Security)
 
cyber security .pdf
cyber security .pdfcyber security .pdf
cyber security .pdf
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
 

Recently uploaded

Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 

Recently uploaded (20)

Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 

it act

  • 1. A Seminar Presntaion On Cyber Crime,IPC & IT Act 2008 Presented to: Mr. Pankaj Dadheech Reader, CSE Presented by: Dushyant Kr Marwal 11ESKCS047
  • 2. Contents  INTRODUCTION  HISTORY OF CYBER CRIME TYPES OF CYBER CRIME  CYBER CRIMINALS  CATEGORIES OF CYBER CRIME CYBER SECURITY
  • 3. An !dea about Cyber Crime ▪ Crime committed using the computer and the internet to steal the person’s identity or illegal imports or malicious programs. ▪ Cyber Crime is nothing but where the computer is used as an object or a subject of crime.
  • 4. History of Cyber Crime ▪ The first recorded cyber crime LOOM took place in the year 1820. ▪ After that in 1978 a SPAM EMAIL is found when it was sent out over the ARPANet (Advanced Research Project Agency Network).
  • 5. Types of Cyber Crime  Virus/Worm Attacks  Trojan Attacks  Email Bombing  Phishing  Denial of Service Attack  Web Jacking
  • 6. Types of Cyber Crime(Contd…)  Child Pornography  Cyber Laundering Cyber Stalking  Cyber Theft Botnet
  • 7. Cyber Criminals ▪ Those who are doing crimes by using the computer as an target or object. o Children and adolescents between the age group of 6-18 years . o Dissatisfied employees. o Professional hackers / crackers.
  • 8. Categories of Cyber Crime ▪ Cyber crimes can be basically divided into three categories: o Cyber crimes against persons. o Cyber crimes against property. o Cyber crimes against government.
  • 9. Against persons  Harassment via E-mails: Harassment through e-mails is not a new concept. It is very similar to harassing through letters.  Email Spoofing: A mail which misrepresents its origin. It shows it’s origin to be different from which actually it originates.
  • 10. Against property  Computer vandalism: Damaging or destroying data rather than stealing or misusing them is called Computer vandalism.  Transmitting virus: These are programs that attach themselves to a file and then circulate.They usually affect the data on a computer, either by altering or deleting it.
  • 11. Against Government CyberTerrorism: • Terrorist attacks on internet is by: o Distributed denial of service attacks o Fake websites and fake emails o Attacks on sensitive computer networks , etc. • In this terrorists are using 512 bit encryption, which is impossible to decrypt.
  • 12. How can we protect it? ▪ Keep Software up to Date: If the seller releases patches for the software operating your device, install them as soon as possible. ▪ Use Good Passwords: Select passwords that are difficult to guess. Do not options that allows your computer to remember the password. ▪ Disable Remote Connectivity: Some PDA’s & Phones are equipped with wireless technologies, such as Bluetooth.You should disable these features when they are not in use.
  • 14. Contents ▪ Introduction ▪ Importance of IPR ▪ Forms of IPR ▪ Patent ▪ Copyright ▪ Trademark ▪ Laws in india
  • 15. What is Intellectual Property ? ▪ Creation of human mind ▪ Idea or a concept or a thought at the beginning ▪ Research and Development to lead the idea ▪ The outcome of these ideas may be development of products, processes and design etc.
  • 16. Why IPR is important? •Reward original efforts ? •Prevent duplication of work? •Commercial value in research? •Technical information for research & to prevent litigation?
  • 17. Patent Patent defined in Patents Act as “patent granted for any invention under the Act”.  Granted by the Government  To inventor  To prevent third parties not having his consent from making, using, offering for sale. (Sec. 48)  For a limited period of time (20 years)  Qualified rights with duties
  • 18. Copyright Act ▪ Objective:To ensure protection from unlawfully exploitation of the work of owner(Author) ▪ Copyright act provides exclusive rights to authors and other owners of original works. ▪ Exclusive privilege to authors to reproduce, distribute, perform or display their creative works.
  • 19. FilmsLiterary Dramatic Musical Artistic What is covered by copyright ? What is not covered by copyright ? Ideas Facts Recipes Names, titles or short phrases
  • 20. Trademark ▪ Word or symbol used by manufacturers to identify goods. ▪ Initial registration for 10 yrs and further renewed by payment of fees for unlimited period.
  • 21. Types of trademark ▪ TM - a Trade Mark™ - used before registration ▪ SM - a Service Mark SM - used before registration ▪ Rights by Registration®
  • 23. Duration of protection YEARS RENEWABLE Patents 20 No Trade marks 6-10 Yes Designs 6-10 Yes Copyright 70 after death No
  • 25. Content: ▪ Cyber law ▪ Need of Cyber law ▪ Cyber Laws in India ▪ Challenges facing law enforcement ▪ Positive Initiatives
  • 26. Need of cyber law ▪ Tackling cyber crime ▪ Successful and smooth functioning of e- commerce and virtual communication ▪ Cloud computing is proving to be a major threat
  • 27. Cyber Law oCyber law is a term that encapsulates the legal issues related to use of the Internet oThe abuse of computers has also given birth to a new age crimes that are addressed by the Information Technology Act, 2000.
  • 28. CYBER LAWS IN INDIA ▪ IT act 2000 passes ▪ Up gradation of IT act 2000-introducing IT act 2008 ▪ IPC acts ▪ Copy right act
  • 29. The IT ACT, 2000 o Legal Recognition of Electronic Documents o Legal Recognition of Digital Signatures o Offenses and Contraventions o Justice Dispensation Systems for cybercrimes
  • 30. Contd….. oCivilWrongs under IT Act oSection 46: IT Act oSection 65: Source Code oSection 66: Hacking oSec. 67. Pornography
  • 31. Contd…. o Sec 69: Decryption of information oSec 70 : Protected System oEmail spoofing oCyber stalking
  • 32. Information Technology Act 2008 o Information Security o New sections on offences o Data Protection. o Section 69 empowers the C Gov/S Gov
  • 33. Computer Related Crimes under IPC and Special Laws Arms ActOnline sale of Arms Sec. 383 IPCWeb -Jacking NDPS ActOnline sale of Drugs Sec 416, 417, 463 IPCEmail spoofing Sec 420 IPCBogus websites, cyber frauds Sec 463, 470, 471 IPCForgery of electronic records Sec 499, 500 IPCSending defamatory messages by email Sec 503 IPCSending threatening messages by email
  • 34. Challenges facing law enforcement oMost not trained in the technologies o Multiple jurisdictions o Retrofit new crimes to existing laws
  • 35. POSITIVE INITIATIVES: o More Cyber crime police cells set up across the country o Websites aid in creating awareness and encouraging reporting of cyber crime cases. o Specialized Training o Active coordination between police and other law enforcement agencies
  • 36. ASLU Survey published in March 2014- Incidence of Cyber crime in India UNAUTHORISED ACCESS 19% E-MAIL ABUSE 21% DATA THEFT 33%
  • 37. Conclusion Cyber crime is indeed getting the recognition it deserves.  It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law.  Create yourself, rather than using other’s creations. Technological advancement made the job of the CREATOR easy
  • 38.  Copyright Law of the USA, Chapter 1 Section 121  Schechter, Roger E., and John R. Thomas. Intellectual Property: The Law of Copyrights, Patents and Trademarks.  Trend micro incorporated research paper  ATO Z OF Cyber Crime By Aayushi shah.  Computer Security Policy Guidebook(WILEY publication).  Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Anderson Publishing Refrences: