SlideShare uma empresa Scribd logo
1 de 18
By
Aditya Gurav.
It is observed that because of global communication ,internet is
misused for criminal activities. Today many unethical things are
happening in Cyber space called cyber crime.
Cyber crime is refer to all activities done with the criminal
intent in Cyber space. People with intelligence and having bad
intention are misusing the aspect of internet to perpetuate criminal
activities in Cyber space.
The Criminal activities include various crime like Software
Piracy, Unauthorized Access, Transmission of
harmful software etc.
So there is need for cyber law.
The earliest forms of computer crimes
revolved around using computers to illegally
obtain free long distance phone calls, known
as phreaking. This required the computer
users to hack into phone company
computers. Hacking became more
predominant in the 1980s when personal
computers and home modems were first
becoming readily available. Unfortunately,
the term “hacking” is also synonymous with
computer programming so the term “cracking”
is also sometimes used.
 Cybercrime in a narrow sense
(computer crime):
Any illegal behavior directed
by means of electronic operations that targets the
security of computer systems and the data processed
by them.
 Cybercrime in a broader sense
(computer-related crime):
Any illegal behavior committed
by means of, or in relation to, a computer system or
network, including such crimes as illegal possession
[and] offering or distributing information by means of a
computer system or network.
Denial of service (DDOS) attack.
Phishing.
Cyber-Terrorism.
Pornography.
Copyright infringement.
Malicious software.
 Web servers are typically set up to handle a set number of
requests at a time
• For instance, a small web server might be set up to handle 20 requests
 Web servers also are set up to offer a certain time period
before a “time out” occurs
• Perhaps 2 minutes
 Now consider a single web server (1 machine) for a company
that is suddenly deluged with 10,000,000 requests
• Most of the requests get placed into a queue, waiting for attention by the
web server
• Most requests do not make it through the queue in time and are thus
timed out, so legitimate users get a denial of access to the web server (or
denial of service)
 This is a tactic of sheer sabotage (or cyber terrorism) –
someone writes a program to generate millions of requests
and floods the target web server(s).
 A web form is one of the few forms of input to a web page
• The web page is set up specifically so that a user (visitor) to that
web page can provide information or feedback
• Typically, forms use server side programs (scripts) to process the
data in the form
• This may include generating SQL queries to send to a database
• A clever user can fill in malicious SQL queries into a form and
thus, when submitted to the database, the SQL query is enacted
– this could be a query to overwrite previously stored data.
 Like the denial of service, this is another form of sabotage or
terrorism
• Proper mechanisms must be in place to safeguard against this.
 Jan 13, 2006 – Russian computer criminals broke into
Rhode Island government web site and stole credit card
data
 June 29, 2007 – a computer criminal used an SQL
injection to deface the Microsoft UK website
 Apr – Aug 2008, a number of attacks against various
computers using Microsoft’s IIS web server and SQL
Server database that, when successful, gives the user
(hacker) access to the entire computer system – an
estimated 500,000 web pages were exploited!
 Illegally attempting to gain sensitive information
from people for the purpose of computer-based
fraud, these attempts can include
• social engineering – calling or emailing someone
pretending to be “official” and asking for confidential
information such as password or social security #
• password cracking – attempting to break into an
account by guessing a password (possibly trying all
possible passwords, or guessing based on what you
know of the person)
• link manipulation for website spoofing – here, an
email has a link pretending to be to a page you visit
(e.g., paypal) but in fact the link is to a spoofed or
forged site
Cyber law or Internet law is a
term that encapsulates the legal issues
related to use of the Internet. It is less a
distinct field of law than intellectual
property or contract law, as it is a domain
covering many areas of law and regulation.
Some leading topics include internet
access and usage, privacy, freedom of
expression, and jurisdiction.
Cyber law refers to all legal aspect and
regulatory aspects of Internet, World Wide
Web (WWW), E-Commerce.
 Florida Electronic Security Act
 Illinois Electronic Commerce Security Act
 Texas Penal Code - Computer Crimes Statute
 Maine Criminal Code - Computer Crimes
 Singapore Electronic Transactions Act
 Malaysia Computer Crimes Act
 UNCITRAL Model Law on Electronic
Commerce
 Information Technology Act 2000 of India
 Thailand Computer Crimes Act B.E.2550
 IT ACT PASSED IN 2000
 The primary purpose of the Act is to provide legal
recognition to electronic commerce and to facilitate filing
of electronic records with the Government.
 The IT Act also penalizes various cyber crimes and
provides strict punishments (imprisonment terms upto
10years and compensation up to Rs 1 cr./-).
 The IT Act was amended by the Negotiable Instruments
(Amendments and Miscellaneous Provisions) Act,
2002. This introduced the concept of electronic cheques
and truncated cheques.
 Information Technology (Use of Electronic Records
and Digital Signatures) Rules, 2004 has provided the
necessary legal framework for filing of documents with
the Government as well as issue of licenses by the
Government.
 The Cyber Regulations Appellate Tribunal (Salary,
Allowances and other terms and conditions of service of
Presiding Officer) Rules, 2003 prescribe the salary,
allowances and other terms for the Presiding Officer of
the CRAT.
 Wikipedia (Wikimedia Foundation)
 Information Technology
(Nirali Prakashan)
 Hacking Exposed 5 (MacAfee ltd.)
---- THANK YOU ----

Mais conteúdo relacionado

Mais procurados

Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivismrashidirazali
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in Indiaamiable_indian
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistanmahrukh rafique
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Cyber law
Cyber lawCyber law
Cyber lawabiabel
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Cyber laws
Cyber lawsCyber laws
Cyber lawsmadhu190
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceTushar Rajput
 

Mais procurados (20)

Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber law
Cyber lawCyber law
Cyber law
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
State of Cyber Law in India
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 

Destaque

Resultados Campeonato Colombiano Sub15 Femenino 2015
Resultados Campeonato Colombiano Sub15 Femenino 2015Resultados Campeonato Colombiano Sub15 Femenino 2015
Resultados Campeonato Colombiano Sub15 Femenino 2015Federacion de Judo
 
Tabla de Medalleria Campeonato Colombiano Sub15 2015
Tabla de Medalleria Campeonato Colombiano Sub15 2015Tabla de Medalleria Campeonato Colombiano Sub15 2015
Tabla de Medalleria Campeonato Colombiano Sub15 2015Federacion de Judo
 
Ascensos a grados dan en Pereira
Ascensos a grados dan  en PereiraAscensos a grados dan  en Pereira
Ascensos a grados dan en PereiraFederacion de Judo
 
Resultados Campeonato Colombiano Sub15 Masculino 2015
Resultados Campeonato Colombiano Sub15 Masculino 2015Resultados Campeonato Colombiano Sub15 Masculino 2015
Resultados Campeonato Colombiano Sub15 Masculino 2015Federacion de Judo
 
Updated%20ANC%20Press%20Release
Updated%20ANC%20Press%20ReleaseUpdated%20ANC%20Press%20Release
Updated%20ANC%20Press%20ReleaseCarolina Endara
 
Planillas Resultados Femenino Campeonato Colombiano Sub13
Planillas Resultados Femenino Campeonato Colombiano Sub13 Planillas Resultados Femenino Campeonato Colombiano Sub13
Planillas Resultados Femenino Campeonato Colombiano Sub13 Federacion de Judo
 
RPC_FAIRLAWN CG 2014
RPC_FAIRLAWN CG 2014RPC_FAIRLAWN CG 2014
RPC_FAIRLAWN CG 2014April Helms
 
11 niezmiennych-zasad-skutecznego-dzialania
11 niezmiennych-zasad-skutecznego-dzialania11 niezmiennych-zasad-skutecznego-dzialania
11 niezmiennych-zasad-skutecznego-dzialaniaGucio Silva
 
EXTRACURRICULAR ACTIVITIES - BEA LOREN LING TAN OCBA
EXTRACURRICULAR ACTIVITIES - BEA LOREN LING TAN OCBAEXTRACURRICULAR ACTIVITIES - BEA LOREN LING TAN OCBA
EXTRACURRICULAR ACTIVITIES - BEA LOREN LING TAN OCBABea Loren Ocba
 
ANC-Newsletter-Terrapin-NOCROP
ANC-Newsletter-Terrapin-NOCROPANC-Newsletter-Terrapin-NOCROP
ANC-Newsletter-Terrapin-NOCROPCarolina Endara
 
Laparoscopic surgery. Intro. History of Armata manus laparoscopic simulators
Laparoscopic surgery. Intro. History of Armata manus laparoscopic simulatorsLaparoscopic surgery. Intro. History of Armata manus laparoscopic simulators
Laparoscopic surgery. Intro. History of Armata manus laparoscopic simulatorsDmitriy Shamrai
 
Inmarsat – Powering global connectivity
Inmarsat – Powering global connectivityInmarsat – Powering global connectivity
Inmarsat – Powering global connectivitytechUK
 
Evolution & Ergonomics in Laparoscopy
Evolution & Ergonomics in LaparoscopyEvolution & Ergonomics in Laparoscopy
Evolution & Ergonomics in LaparoscopyHarmandeep Jabbal
 
Resume_Rahul_Sumbrui_Vistex_Fico_Cs
Resume_Rahul_Sumbrui_Vistex_Fico_CsResume_Rahul_Sumbrui_Vistex_Fico_Cs
Resume_Rahul_Sumbrui_Vistex_Fico_CsRahul Sumbrui
 

Destaque (20)

Resultados Campeonato Colombiano Sub15 Femenino 2015
Resultados Campeonato Colombiano Sub15 Femenino 2015Resultados Campeonato Colombiano Sub15 Femenino 2015
Resultados Campeonato Colombiano Sub15 Femenino 2015
 
Tabla de Medalleria Campeonato Colombiano Sub15 2015
Tabla de Medalleria Campeonato Colombiano Sub15 2015Tabla de Medalleria Campeonato Colombiano Sub15 2015
Tabla de Medalleria Campeonato Colombiano Sub15 2015
 
Ascensos a grados dan en Pereira
Ascensos a grados dan  en PereiraAscensos a grados dan  en Pereira
Ascensos a grados dan en Pereira
 
Resultados Campeonato Colombiano Sub15 Masculino 2015
Resultados Campeonato Colombiano Sub15 Masculino 2015Resultados Campeonato Colombiano Sub15 Masculino 2015
Resultados Campeonato Colombiano Sub15 Masculino 2015
 
AndrewSchellengerLetterofRec
AndrewSchellengerLetterofRecAndrewSchellengerLetterofRec
AndrewSchellengerLetterofRec
 
Updated%20ANC%20Press%20Release
Updated%20ANC%20Press%20ReleaseUpdated%20ANC%20Press%20Release
Updated%20ANC%20Press%20Release
 
Nvis
NvisNvis
Nvis
 
Planillas Resultados Femenino Campeonato Colombiano Sub13
Planillas Resultados Femenino Campeonato Colombiano Sub13 Planillas Resultados Femenino Campeonato Colombiano Sub13
Planillas Resultados Femenino Campeonato Colombiano Sub13
 
RPC_FAIRLAWN CG 2014
RPC_FAIRLAWN CG 2014RPC_FAIRLAWN CG 2014
RPC_FAIRLAWN CG 2014
 
11 niezmiennych-zasad-skutecznego-dzialania
11 niezmiennych-zasad-skutecznego-dzialania11 niezmiennych-zasad-skutecznego-dzialania
11 niezmiennych-zasad-skutecznego-dzialania
 
EXTRACURRICULAR ACTIVITIES - BEA LOREN LING TAN OCBA
EXTRACURRICULAR ACTIVITIES - BEA LOREN LING TAN OCBAEXTRACURRICULAR ACTIVITIES - BEA LOREN LING TAN OCBA
EXTRACURRICULAR ACTIVITIES - BEA LOREN LING TAN OCBA
 
ANC-Newsletter-Terrapin-NOCROP
ANC-Newsletter-Terrapin-NOCROPANC-Newsletter-Terrapin-NOCROP
ANC-Newsletter-Terrapin-NOCROP
 
Hf propagation
Hf propagationHf propagation
Hf propagation
 
Especialista Europeo de Adhesivos (EAS)
Especialista Europeo de Adhesivos (EAS)Especialista Europeo de Adhesivos (EAS)
Especialista Europeo de Adhesivos (EAS)
 
Power pointofsuestubbscrc
Power pointofsuestubbscrcPower pointofsuestubbscrc
Power pointofsuestubbscrc
 
Laparoscopic surgery. Intro. History of Armata manus laparoscopic simulators
Laparoscopic surgery. Intro. History of Armata manus laparoscopic simulatorsLaparoscopic surgery. Intro. History of Armata manus laparoscopic simulators
Laparoscopic surgery. Intro. History of Armata manus laparoscopic simulators
 
Inmarsat – Powering global connectivity
Inmarsat – Powering global connectivityInmarsat – Powering global connectivity
Inmarsat – Powering global connectivity
 
Neck Dissections
Neck Dissections Neck Dissections
Neck Dissections
 
Evolution & Ergonomics in Laparoscopy
Evolution & Ergonomics in LaparoscopyEvolution & Ergonomics in Laparoscopy
Evolution & Ergonomics in Laparoscopy
 
Resume_Rahul_Sumbrui_Vistex_Fico_Cs
Resume_Rahul_Sumbrui_Vistex_Fico_CsResume_Rahul_Sumbrui_Vistex_Fico_Cs
Resume_Rahul_Sumbrui_Vistex_Fico_Cs
 

Semelhante a Cyber crime

What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the countryUjjwal Tripathi
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourssuser24dae7
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importanceAditya Shukla
 
India cyber
India cyberIndia cyber
India cybersabariss
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cybercloneseeyom
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 

Semelhante a Cyber crime (20)

What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
English in written
English in writtenEnglish in written
English in written
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber law in India: Its need & importance
Cyber law in India: Its need & importanceCyber law in India: Its need & importance
Cyber law in India: Its need & importance
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
India cyber
India cyberIndia cyber
India cyber
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 

Último

Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 

Último (20)

Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 

Cyber crime

  • 2. It is observed that because of global communication ,internet is misused for criminal activities. Today many unethical things are happening in Cyber space called cyber crime. Cyber crime is refer to all activities done with the criminal intent in Cyber space. People with intelligence and having bad intention are misusing the aspect of internet to perpetuate criminal activities in Cyber space. The Criminal activities include various crime like Software Piracy, Unauthorized Access, Transmission of harmful software etc. So there is need for cyber law.
  • 3.
  • 4. The earliest forms of computer crimes revolved around using computers to illegally obtain free long distance phone calls, known as phreaking. This required the computer users to hack into phone company computers. Hacking became more predominant in the 1980s when personal computers and home modems were first becoming readily available. Unfortunately, the term “hacking” is also synonymous with computer programming so the term “cracking” is also sometimes used.
  • 5.  Cybercrime in a narrow sense (computer crime): Any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed by them.  Cybercrime in a broader sense (computer-related crime): Any illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession [and] offering or distributing information by means of a computer system or network.
  • 6. Denial of service (DDOS) attack. Phishing. Cyber-Terrorism. Pornography. Copyright infringement. Malicious software.
  • 7.  Web servers are typically set up to handle a set number of requests at a time • For instance, a small web server might be set up to handle 20 requests  Web servers also are set up to offer a certain time period before a “time out” occurs • Perhaps 2 minutes  Now consider a single web server (1 machine) for a company that is suddenly deluged with 10,000,000 requests • Most of the requests get placed into a queue, waiting for attention by the web server • Most requests do not make it through the queue in time and are thus timed out, so legitimate users get a denial of access to the web server (or denial of service)  This is a tactic of sheer sabotage (or cyber terrorism) – someone writes a program to generate millions of requests and floods the target web server(s).
  • 8.  A web form is one of the few forms of input to a web page • The web page is set up specifically so that a user (visitor) to that web page can provide information or feedback • Typically, forms use server side programs (scripts) to process the data in the form • This may include generating SQL queries to send to a database • A clever user can fill in malicious SQL queries into a form and thus, when submitted to the database, the SQL query is enacted – this could be a query to overwrite previously stored data.  Like the denial of service, this is another form of sabotage or terrorism • Proper mechanisms must be in place to safeguard against this.
  • 9.  Jan 13, 2006 – Russian computer criminals broke into Rhode Island government web site and stole credit card data  June 29, 2007 – a computer criminal used an SQL injection to deface the Microsoft UK website  Apr – Aug 2008, a number of attacks against various computers using Microsoft’s IIS web server and SQL Server database that, when successful, gives the user (hacker) access to the entire computer system – an estimated 500,000 web pages were exploited!
  • 10.  Illegally attempting to gain sensitive information from people for the purpose of computer-based fraud, these attempts can include • social engineering – calling or emailing someone pretending to be “official” and asking for confidential information such as password or social security # • password cracking – attempting to break into an account by guessing a password (possibly trying all possible passwords, or guessing based on what you know of the person) • link manipulation for website spoofing – here, an email has a link pretending to be to a page you visit (e.g., paypal) but in fact the link is to a spoofed or forged site
  • 11.
  • 12. Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet. It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include internet access and usage, privacy, freedom of expression, and jurisdiction.
  • 13. Cyber law refers to all legal aspect and regulatory aspects of Internet, World Wide Web (WWW), E-Commerce.
  • 14.  Florida Electronic Security Act  Illinois Electronic Commerce Security Act  Texas Penal Code - Computer Crimes Statute  Maine Criminal Code - Computer Crimes  Singapore Electronic Transactions Act  Malaysia Computer Crimes Act  UNCITRAL Model Law on Electronic Commerce  Information Technology Act 2000 of India  Thailand Computer Crimes Act B.E.2550
  • 15.  IT ACT PASSED IN 2000  The primary purpose of the Act is to provide legal recognition to electronic commerce and to facilitate filing of electronic records with the Government.  The IT Act also penalizes various cyber crimes and provides strict punishments (imprisonment terms upto 10years and compensation up to Rs 1 cr./-).  The IT Act was amended by the Negotiable Instruments (Amendments and Miscellaneous Provisions) Act, 2002. This introduced the concept of electronic cheques and truncated cheques.
  • 16.  Information Technology (Use of Electronic Records and Digital Signatures) Rules, 2004 has provided the necessary legal framework for filing of documents with the Government as well as issue of licenses by the Government.  The Cyber Regulations Appellate Tribunal (Salary, Allowances and other terms and conditions of service of Presiding Officer) Rules, 2003 prescribe the salary, allowances and other terms for the Presiding Officer of the CRAT.
  • 17.  Wikipedia (Wikimedia Foundation)  Information Technology (Nirali Prakashan)  Hacking Exposed 5 (MacAfee ltd.)