SlideShare ist ein Scribd-Unternehmen logo
1 von 25
A Study of Cyber Crime and The IT ACT in India Suhas Ambade Contact : ambadesuhas@yahoo.co.in
Success in any field of human activity leads to crime that needs mechanisms to control it.  The law is as stringent as its enforcement. Crime is no longer limited to space, time or a group of people. In 1990 less than 100000 people log on to the internet worldwide. Now around 500 million people are hooked up to surf the net around the globe. Until recently due to lack of awareness of cyber crime phenomenon, old laws did not quite fit the crimes being committed.
The information technology act 2000 OBJECTIVE The main objective of ITA 2000 was to accord legal recognition to secure electronic records and secure digital signature. The ITA2000 provides authentication of electronic contract by means afixing digital signature. To provide legal recognition to electronic commerce to avoid paper based method of communication and storage of information. LEAGAL PROVISIONS The contract afixed with digital signature are valid and admissible as evidence in the court.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why learn about CYBER CRIME ? Because – –  Everybody is using COMPUTERS.. –  From white collar criminals to terrorist organizations And from Teenagers to Adults –  Conventional crimes like Forgery, extortion, kidnapping etc. are being committed with the help of computers –  New generation is growing up with computers –  MOST IMPORTANT  - Monetary transactions are moving on to the INTERNET
WHAT IS COMPUTER CRIME? All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system. COMPUTER CRIME is any crime where – •  Computer is a target. •  Computer is a tool of crime •  Computer is incidental to crime
Profile of Cyber Criminal •  Unsatisfied employees. •  Teenagers. •  Political Hacktivist. •  Professional Hackers. •  Business Rival. •  Ex-Boy Friend /Ex-Girl Friend. •  Divorced Husband / Wife. etc
Types of Cyber Crime (This is not exhaustive list of cyber crime) •  HACKING  • DENIAL OF SERVICE ATTACK •  VIRUS  Attack  • SOFTWARE PIRACY •  PORNOGRAPHY  • IRC Crime •  CREDIT CARD FRAUD  • NET EXTORTION •  PHISHING  • SPOOFING •  CYBER DEFAMATION  • THREATENING
HACKING Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
DENIAL OF SERVICE ATTACK This is an act by the criminal, who floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or Provide.
VIRUS Attack •  Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious softwares)
SOFTWARE PIRACY •  Theft of software through the illegal copying of genuine programs or  the counterfeiting and distribution of products intended to pass for  the original. •  Retail revenue losses worldwide are ever increasing due to this  crime •  Can be done in various ways- End user copying, Hard disk loading, Counterfeiting, Illegal downloads  from the internet etc.
•  Pornography is the first consistently successful ecommerce  product. •  Deceptive marketing tactics and mouse trapping technologies Pornography encourage customers to access their websites. •  Anybody including children can log on to the internet and access websites with pornographic contents with a click of a mouse. •  Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient interest is an offence under the provisions of section 67 of I.T. Act -2000. STOP PORN PORNOGRAPHY
Spoofing •  Getting one computer on a  network to pretend to have  the identity of another  computer, usually one with  special access privileges, so  as to obtain access to the  other computers on the  network.
IRC CRIME Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other •  Criminals use it for meeting.  •  Hackers use it for discussing their exploits / sharing the techniques •  Use chat rooms to attract Sexually small children. •  Cyber Stalking - In order to harass a woman her telephone number is  given to others as if she wants to befriend males
CREDIT CARD FRAUD You simply have to type credit card number into www page of the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner
Is there an additional slot ? FALSE slot Fixed to the original card slot. (Same color and sticker ). Contains additional card reader to copy your card information ..and duplicate your card The micro camera at the side can view the KEYPAD and also the monitor to send wireless picture up to 200metres.
Copying the company’s confidential data in order to extort said company for huge amount.. NET EXTORTION
It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means PHISHING
Recent cases of Cyber crime
The  Tejas Ahauja  case ,[object Object]
Ahmedabad Blast :  Haywood ,[object Object],[object Object]
Parliament Attack Case The Laptop seized from the gunned down terrorist contained several evidences of terrorist’s motives. The sticker of the Ministry of home that they had made on the laptop and pasted on their ambassador car to gain entry into the parliament house and the fake ID card that one of the two terrorists was carrying with the Government of India emblem and seal.
Remidial Actions ,[object Object],[object Object],[object Object],[object Object]
Thank You

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 

Andere mochten auch

Basic knowledge of cyber security
Basic knowledge of cyber securityBasic knowledge of cyber security
Basic knowledge of cyber securitymahendra_chauhan
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in Indiaamiable_indian
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCEanthony4web
 
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat DasNull Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat Dasnullowaspmumbai
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids Jishnu Pradeep
 
Asal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber CafeAsal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber CafeAmy Lenzo
 
Fd s graz2012_gesamt_druck_o
Fd s graz2012_gesamt_druck_oFd s graz2012_gesamt_druck_o
Fd s graz2012_gesamt_druck_oEva Laspas
 
El Riesgo de Maremotos en la Península Ibérica, a la luz de la catástrofe del...
El Riesgo de Maremotos en la Península Ibérica, a la luz de la catástrofe del...El Riesgo de Maremotos en la Península Ibérica, a la luz de la catástrofe del...
El Riesgo de Maremotos en la Península Ibérica, a la luz de la catástrofe del...Abel López Díez
 
1er boletín experiencias
1er boletín experiencias1er boletín experiencias
1er boletín experienciasDavid Camps
 
Creando una nueva generacion de líderes con calidad humana
Creando una nueva generacion de líderes con calidad humanaCreando una nueva generacion de líderes con calidad humana
Creando una nueva generacion de líderes con calidad humanaSebastián Valdivieso González
 

Andere mochten auch (20)

Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Analysis of database tampering
Analysis of database tamperingAnalysis of database tampering
Analysis of database tampering
 
Kristian on cyber safety
Kristian on cyber safetyKristian on cyber safety
Kristian on cyber safety
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Basic concept cybersecurity
Basic concept cybersecurityBasic concept cybersecurity
Basic concept cybersecurity
 
Basic knowledge of cyber security
Basic knowledge of cyber securityBasic knowledge of cyber security
Basic knowledge of cyber security
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
 
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat DasNull Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
 
Asal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber CafeAsal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber Cafe
 
Wireless
WirelessWireless
Wireless
 
Comp 107 cep 8
Comp 107 cep 8Comp 107 cep 8
Comp 107 cep 8
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Fd s graz2012_gesamt_druck_o
Fd s graz2012_gesamt_druck_oFd s graz2012_gesamt_druck_o
Fd s graz2012_gesamt_druck_o
 
Portfolio Alejandro Jiménez Hernández
Portfolio Alejandro Jiménez HernándezPortfolio Alejandro Jiménez Hernández
Portfolio Alejandro Jiménez Hernández
 
El Riesgo de Maremotos en la Península Ibérica, a la luz de la catástrofe del...
El Riesgo de Maremotos en la Península Ibérica, a la luz de la catástrofe del...El Riesgo de Maremotos en la Península Ibérica, a la luz de la catástrofe del...
El Riesgo de Maremotos en la Península Ibérica, a la luz de la catástrofe del...
 
1er boletín experiencias
1er boletín experiencias1er boletín experiencias
1er boletín experiencias
 
Creando una nueva generacion de líderes con calidad humana
Creando una nueva generacion de líderes con calidad humanaCreando una nueva generacion de líderes con calidad humana
Creando una nueva generacion de líderes con calidad humana
 
Brunhofer, Matthew 11.03.15
Brunhofer, Matthew 11.03.15Brunhofer, Matthew 11.03.15
Brunhofer, Matthew 11.03.15
 

Ähnlich wie Cyberlaw

Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimeDevanshi Solanki
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Various cyber crime
Various cyber crimeVarious cyber crime
Various cyber crimeasha mali
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 

Ähnlich wie Cyberlaw (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
English in written
English in writtenEnglish in written
English in written
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Various cyber crime
Various cyber crimeVarious cyber crime
Various cyber crime
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 

Kürzlich hochgeladen

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 

Kürzlich hochgeladen (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 

Cyberlaw

  • 1. A Study of Cyber Crime and The IT ACT in India Suhas Ambade Contact : ambadesuhas@yahoo.co.in
  • 2. Success in any field of human activity leads to crime that needs mechanisms to control it. The law is as stringent as its enforcement. Crime is no longer limited to space, time or a group of people. In 1990 less than 100000 people log on to the internet worldwide. Now around 500 million people are hooked up to surf the net around the globe. Until recently due to lack of awareness of cyber crime phenomenon, old laws did not quite fit the crimes being committed.
  • 3. The information technology act 2000 OBJECTIVE The main objective of ITA 2000 was to accord legal recognition to secure electronic records and secure digital signature. The ITA2000 provides authentication of electronic contract by means afixing digital signature. To provide legal recognition to electronic commerce to avoid paper based method of communication and storage of information. LEAGAL PROVISIONS The contract afixed with digital signature are valid and admissible as evidence in the court.
  • 4.
  • 5. Why learn about CYBER CRIME ? Because – – Everybody is using COMPUTERS.. – From white collar criminals to terrorist organizations And from Teenagers to Adults – Conventional crimes like Forgery, extortion, kidnapping etc. are being committed with the help of computers – New generation is growing up with computers – MOST IMPORTANT - Monetary transactions are moving on to the INTERNET
  • 6. WHAT IS COMPUTER CRIME? All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system. COMPUTER CRIME is any crime where – • Computer is a target. • Computer is a tool of crime • Computer is incidental to crime
  • 7. Profile of Cyber Criminal • Unsatisfied employees. • Teenagers. • Political Hacktivist. • Professional Hackers. • Business Rival. • Ex-Boy Friend /Ex-Girl Friend. • Divorced Husband / Wife. etc
  • 8. Types of Cyber Crime (This is not exhaustive list of cyber crime) • HACKING • DENIAL OF SERVICE ATTACK • VIRUS Attack • SOFTWARE PIRACY • PORNOGRAPHY • IRC Crime • CREDIT CARD FRAUD • NET EXTORTION • PHISHING • SPOOFING • CYBER DEFAMATION • THREATENING
  • 9. HACKING Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
  • 10. DENIAL OF SERVICE ATTACK This is an act by the criminal, who floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or Provide.
  • 11. VIRUS Attack • Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious softwares)
  • 12. SOFTWARE PIRACY • Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. • Retail revenue losses worldwide are ever increasing due to this crime • Can be done in various ways- End user copying, Hard disk loading, Counterfeiting, Illegal downloads from the internet etc.
  • 13. • Pornography is the first consistently successful ecommerce product. • Deceptive marketing tactics and mouse trapping technologies Pornography encourage customers to access their websites. • Anybody including children can log on to the internet and access websites with pornographic contents with a click of a mouse. • Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient interest is an offence under the provisions of section 67 of I.T. Act -2000. STOP PORN PORNOGRAPHY
  • 14. Spoofing • Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges, so as to obtain access to the other computers on the network.
  • 15. IRC CRIME Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other • Criminals use it for meeting. • Hackers use it for discussing their exploits / sharing the techniques • Use chat rooms to attract Sexually small children. • Cyber Stalking - In order to harass a woman her telephone number is given to others as if she wants to befriend males
  • 16. CREDIT CARD FRAUD You simply have to type credit card number into www page of the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner
  • 17. Is there an additional slot ? FALSE slot Fixed to the original card slot. (Same color and sticker ). Contains additional card reader to copy your card information ..and duplicate your card The micro camera at the side can view the KEYPAD and also the monitor to send wireless picture up to 200metres.
  • 18. Copying the company’s confidential data in order to extort said company for huge amount.. NET EXTORTION
  • 19. It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means PHISHING
  • 20. Recent cases of Cyber crime
  • 21.
  • 22.
  • 23. Parliament Attack Case The Laptop seized from the gunned down terrorist contained several evidences of terrorist’s motives. The sticker of the Ministry of home that they had made on the laptop and pasted on their ambassador car to gain entry into the parliament house and the fake ID card that one of the two terrorists was carrying with the Government of India emblem and seal.
  • 24.