SlideShare uma empresa Scribd logo
1 de 25
A Study of Cyber Crime and The IT ACT in India Suhas Ambade Contact : ambadesuhas@yahoo.co.in
Success in any field of human activity leads to crime that needs mechanisms to control it.  The law is as stringent as its enforcement. Crime is no longer limited to space, time or a group of people. In 1990 less than 100000 people log on to the internet worldwide. Now around 500 million people are hooked up to surf the net around the globe. Until recently due to lack of awareness of cyber crime phenomenon, old laws did not quite fit the crimes being committed.
The information technology act 2000 OBJECTIVE The main objective of ITA 2000 was to accord legal recognition to secure electronic records and secure digital signature. The ITA2000 provides authentication of electronic contract by means afixing digital signature. To provide legal recognition to electronic commerce to avoid paper based method of communication and storage of information. LEAGAL PROVISIONS The contract afixed with digital signature are valid and admissible as evidence in the court.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why learn about CYBER CRIME ? Because – –  Everybody is using COMPUTERS.. –  From white collar criminals to terrorist organizations And from Teenagers to Adults –  Conventional crimes like Forgery, extortion, kidnapping etc. are being committed with the help of computers –  New generation is growing up with computers –  MOST IMPORTANT  - Monetary transactions are moving on to the INTERNET
WHAT IS COMPUTER CRIME? All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system. COMPUTER CRIME is any crime where – •  Computer is a target. •  Computer is a tool of crime •  Computer is incidental to crime
Profile of Cyber Criminal •  Unsatisfied employees. •  Teenagers. •  Political Hacktivist. •  Professional Hackers. •  Business Rival. •  Ex-Boy Friend /Ex-Girl Friend. •  Divorced Husband / Wife. etc
Types of Cyber Crime (This is not exhaustive list of cyber crime) •  HACKING  • DENIAL OF SERVICE ATTACK •  VIRUS  Attack  • SOFTWARE PIRACY •  PORNOGRAPHY  • IRC Crime •  CREDIT CARD FRAUD  • NET EXTORTION •  PHISHING  • SPOOFING •  CYBER DEFAMATION  • THREATENING
HACKING Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
DENIAL OF SERVICE ATTACK This is an act by the criminal, who floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or Provide.
VIRUS Attack •  Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious softwares)
SOFTWARE PIRACY •  Theft of software through the illegal copying of genuine programs or  the counterfeiting and distribution of products intended to pass for  the original. •  Retail revenue losses worldwide are ever increasing due to this  crime •  Can be done in various ways- End user copying, Hard disk loading, Counterfeiting, Illegal downloads  from the internet etc.
•  Pornography is the first consistently successful ecommerce  product. •  Deceptive marketing tactics and mouse trapping technologies Pornography encourage customers to access their websites. •  Anybody including children can log on to the internet and access websites with pornographic contents with a click of a mouse. •  Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient interest is an offence under the provisions of section 67 of I.T. Act -2000. STOP PORN PORNOGRAPHY
Spoofing •  Getting one computer on a  network to pretend to have  the identity of another  computer, usually one with  special access privileges, so  as to obtain access to the  other computers on the  network.
IRC CRIME Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other •  Criminals use it for meeting.  •  Hackers use it for discussing their exploits / sharing the techniques •  Use chat rooms to attract Sexually small children. •  Cyber Stalking - In order to harass a woman her telephone number is  given to others as if she wants to befriend males
CREDIT CARD FRAUD You simply have to type credit card number into www page of the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner
Is there an additional slot ? FALSE slot Fixed to the original card slot. (Same color and sticker ). Contains additional card reader to copy your card information ..and duplicate your card The micro camera at the side can view the KEYPAD and also the monitor to send wireless picture up to 200metres.
Copying the company’s confidential data in order to extort said company for huge amount.. NET EXTORTION
It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means PHISHING
Recent cases of Cyber crime
The  Tejas Ahauja  case ,[object Object]
Ahmedabad Blast :  Haywood ,[object Object],[object Object]
Parliament Attack Case The Laptop seized from the gunned down terrorist contained several evidences of terrorist’s motives. The sticker of the Ministry of home that they had made on the laptop and pasted on their ambassador car to gain entry into the parliament house and the fake ID card that one of the two terrorists was carrying with the Government of India emblem and seal.
Remidial Actions ,[object Object],[object Object],[object Object],[object Object]
Thank You

Mais conteúdo relacionado

Mais procurados (20)

Cybercrime kunal gupta
Cybercrime kunal guptaCybercrime kunal gupta
Cybercrime kunal gupta
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cybercrime final-ppt
Cybercrime final-pptCybercrime final-ppt
Cybercrime final-ppt
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 

Destaque

Basic knowledge of cyber security
Basic knowledge of cyber securityBasic knowledge of cyber security
Basic knowledge of cyber securitymahendra_chauhan
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in Indiaamiable_indian
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCEanthony4web
 
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat DasNull Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat Dasnullowaspmumbai
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids Jishnu Pradeep
 
Asal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber CafeAsal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber CafeAmy Lenzo
 
Fd s graz2012_gesamt_druck_o
Fd s graz2012_gesamt_druck_oFd s graz2012_gesamt_druck_o
Fd s graz2012_gesamt_druck_oEva Laspas
 
El Riesgo de Maremotos en la Península Ibérica, a la luz de la catástrofe del...
El Riesgo de Maremotos en la Península Ibérica, a la luz de la catástrofe del...El Riesgo de Maremotos en la Península Ibérica, a la luz de la catástrofe del...
El Riesgo de Maremotos en la Península Ibérica, a la luz de la catástrofe del...Abel López Díez
 
1er boletín experiencias
1er boletín experiencias1er boletín experiencias
1er boletín experienciasDavid Camps
 
Creando una nueva generacion de líderes con calidad humana
Creando una nueva generacion de líderes con calidad humanaCreando una nueva generacion de líderes con calidad humana
Creando una nueva generacion de líderes con calidad humanaSebastián Valdivieso González
 

Destaque (20)

Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Analysis of database tampering
Analysis of database tamperingAnalysis of database tampering
Analysis of database tampering
 
Kristian on cyber safety
Kristian on cyber safetyKristian on cyber safety
Kristian on cyber safety
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Basic concept cybersecurity
Basic concept cybersecurityBasic concept cybersecurity
Basic concept cybersecurity
 
Basic knowledge of cyber security
Basic knowledge of cyber securityBasic knowledge of cyber security
Basic knowledge of cyber security
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
 
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat DasNull Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
 
Asal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber CafeAsal and Rethemeyer - Cyber Cafe
Asal and Rethemeyer - Cyber Cafe
 
Wireless
WirelessWireless
Wireless
 
Comp 107 cep 8
Comp 107 cep 8Comp 107 cep 8
Comp 107 cep 8
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Fd s graz2012_gesamt_druck_o
Fd s graz2012_gesamt_druck_oFd s graz2012_gesamt_druck_o
Fd s graz2012_gesamt_druck_o
 
Portfolio Alejandro Jiménez Hernández
Portfolio Alejandro Jiménez HernándezPortfolio Alejandro Jiménez Hernández
Portfolio Alejandro Jiménez Hernández
 
El Riesgo de Maremotos en la Península Ibérica, a la luz de la catástrofe del...
El Riesgo de Maremotos en la Península Ibérica, a la luz de la catástrofe del...El Riesgo de Maremotos en la Península Ibérica, a la luz de la catástrofe del...
El Riesgo de Maremotos en la Península Ibérica, a la luz de la catástrofe del...
 
1er boletín experiencias
1er boletín experiencias1er boletín experiencias
1er boletín experiencias
 
Creando una nueva generacion de líderes con calidad humana
Creando una nueva generacion de líderes con calidad humanaCreando una nueva generacion de líderes con calidad humana
Creando una nueva generacion de líderes con calidad humana
 
Brunhofer, Matthew 11.03.15
Brunhofer, Matthew 11.03.15Brunhofer, Matthew 11.03.15
Brunhofer, Matthew 11.03.15
 

Semelhante a Cyberlaw

Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimeDevanshi Solanki
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Various cyber crime
Various cyber crimeVarious cyber crime
Various cyber crimeasha mali
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 

Semelhante a Cyberlaw (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
English in written
English in writtenEnglish in written
English in written
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Various cyber crime
Various cyber crimeVarious cyber crime
Various cyber crime
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Cyberlaw

  • 1. A Study of Cyber Crime and The IT ACT in India Suhas Ambade Contact : ambadesuhas@yahoo.co.in
  • 2. Success in any field of human activity leads to crime that needs mechanisms to control it. The law is as stringent as its enforcement. Crime is no longer limited to space, time or a group of people. In 1990 less than 100000 people log on to the internet worldwide. Now around 500 million people are hooked up to surf the net around the globe. Until recently due to lack of awareness of cyber crime phenomenon, old laws did not quite fit the crimes being committed.
  • 3. The information technology act 2000 OBJECTIVE The main objective of ITA 2000 was to accord legal recognition to secure electronic records and secure digital signature. The ITA2000 provides authentication of electronic contract by means afixing digital signature. To provide legal recognition to electronic commerce to avoid paper based method of communication and storage of information. LEAGAL PROVISIONS The contract afixed with digital signature are valid and admissible as evidence in the court.
  • 4.
  • 5. Why learn about CYBER CRIME ? Because – – Everybody is using COMPUTERS.. – From white collar criminals to terrorist organizations And from Teenagers to Adults – Conventional crimes like Forgery, extortion, kidnapping etc. are being committed with the help of computers – New generation is growing up with computers – MOST IMPORTANT - Monetary transactions are moving on to the INTERNET
  • 6. WHAT IS COMPUTER CRIME? All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system. COMPUTER CRIME is any crime where – • Computer is a target. • Computer is a tool of crime • Computer is incidental to crime
  • 7. Profile of Cyber Criminal • Unsatisfied employees. • Teenagers. • Political Hacktivist. • Professional Hackers. • Business Rival. • Ex-Boy Friend /Ex-Girl Friend. • Divorced Husband / Wife. etc
  • 8. Types of Cyber Crime (This is not exhaustive list of cyber crime) • HACKING • DENIAL OF SERVICE ATTACK • VIRUS Attack • SOFTWARE PIRACY • PORNOGRAPHY • IRC Crime • CREDIT CARD FRAUD • NET EXTORTION • PHISHING • SPOOFING • CYBER DEFAMATION • THREATENING
  • 9. HACKING Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
  • 10. DENIAL OF SERVICE ATTACK This is an act by the criminal, who floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or Provide.
  • 11. VIRUS Attack • Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious softwares)
  • 12. SOFTWARE PIRACY • Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. • Retail revenue losses worldwide are ever increasing due to this crime • Can be done in various ways- End user copying, Hard disk loading, Counterfeiting, Illegal downloads from the internet etc.
  • 13. • Pornography is the first consistently successful ecommerce product. • Deceptive marketing tactics and mouse trapping technologies Pornography encourage customers to access their websites. • Anybody including children can log on to the internet and access websites with pornographic contents with a click of a mouse. • Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient interest is an offence under the provisions of section 67 of I.T. Act -2000. STOP PORN PORNOGRAPHY
  • 14. Spoofing • Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges, so as to obtain access to the other computers on the network.
  • 15. IRC CRIME Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other • Criminals use it for meeting. • Hackers use it for discussing their exploits / sharing the techniques • Use chat rooms to attract Sexually small children. • Cyber Stalking - In order to harass a woman her telephone number is given to others as if she wants to befriend males
  • 16. CREDIT CARD FRAUD You simply have to type credit card number into www page of the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner
  • 17. Is there an additional slot ? FALSE slot Fixed to the original card slot. (Same color and sticker ). Contains additional card reader to copy your card information ..and duplicate your card The micro camera at the side can view the KEYPAD and also the monitor to send wireless picture up to 200metres.
  • 18. Copying the company’s confidential data in order to extort said company for huge amount.. NET EXTORTION
  • 19. It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means PHISHING
  • 20. Recent cases of Cyber crime
  • 21.
  • 22.
  • 23. Parliament Attack Case The Laptop seized from the gunned down terrorist contained several evidences of terrorist’s motives. The sticker of the Ministry of home that they had made on the laptop and pasted on their ambassador car to gain entry into the parliament house and the fake ID card that one of the two terrorists was carrying with the Government of India emblem and seal.
  • 24.