23
Cyber Crime, Cyber Security and Cyber Laws 1

ppt -Cyber Crime, Cyber Security and Cyber Laws

Embed Size (px)

DESCRIPTION

1Crime committed using a computer and the internet to steal a person‟s identity or illegal imports or malicious programs cybercrime is nothing but where the computer used as an object or subject of crime2The first recorded cyber crime took place in the year 1820 That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C.  The first email spam took place in1978 when it was sent out over the ARPANE

Citation preview

1

Crime committed using a computer and the internet to steal a persons identity or illegal imports or malicious programs cybercrime is nothing but where the computer used as an object or subject of crime

2

The first recorded cyber crime took place in the year 1820 That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. The first email spam took place in1978 when it was sent out over the ARPANET The first virus was installed on Apple computer in 19823

The Computer as a Target : using a computer to attack other computers. The computer as a weapon : using a computer to commit real world crimes.

4

HACKING CHILD PORNOGRAPHY DENIAL OF SERVICE ATTACK VIRUS DISSEMINITION COMPUTER VANDALISM CYBER TERRORISM SOFTWARE PIRACY

5

Financial fraud:

Sabotage of data/networks: Theft of proprietary information: System penetration from the outside: Denial of service:

Unauthorized access by insiders: Employee abuse of internet privileges Viruses:

11% 17% 20% 25% 27% 71% 79% 85%

6

7

Involves

protection of sensitive personal and business information through prevention, detection, and response to different online attacks

8

Privacy Policy Keep software up to date Use good passwords Disable remote connectivity Use antivirus softwares Insert firewalls Uninstall unnecessary software Maintain backup Stay anonymous - choose a genderless screen name Never give your full name or address to strangers9

Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.

10

Email

would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. signatures have been given legal validity and sanction in the Act.

Companies

Digital

11

The

Act now allows Government to issue notification on the web thus heralding egovernance

It

shall now be possible for corporate to have a statutory remedy in case if anyone breaks into their computer systems or network and cause loss.

12

Information Technology Act, 2000-came into force on 17 October 2000 Extends to whole of India and also applies to any offence or contravention there under committed outside India by any person {section 1 (2)} read with Section 75- Act applies to offence or contravention committed outside India by any person irrespective of his nationality, if such act involves a computer, computer system or network located in India Section 2 (1) (a) Access means gaining entry into, instructing or communicating with the logical, arithmetic or memory function resources of a computer, computer resource or network IT Act confers legal recognition to electronic records and digital signatures (section 4,5 of the IT Act,2000)

13

Chapter IX of IT Act, Section 43 Whoever without permission of owner of the computer Secures access Not necessarily through a network Downloads, copies, extracts any data Introduces or causes to be introduced any viruses or contaminant Damages or causes to be damaged any computer resource Destroy, alter, delete, add, modify or rearrange Change the format of a file Disrupts or causes disruption of any computer resource

14

Denies or causes denial of access by any means Denial of service attacks

Assists any person to do any thing above Rogue Websites, Search Engines, Insiders providing vulnerabilities

Charges the services availed by a person to the

account of another person by tampering or manipulating any computer resource Credit card frauds, Internet time thefts

Liable to pay damages not exceeding Rs. One crore

to the affected party Investigation by AJUDICATING OFFICER Powers of a civil court

15

Most important asset of software Computer Source Code" means

companies the listing of programmes, computer commands, design and layout Ingredients Knowledge or intention Concealment, destruction, alteration computer source code required to be kept or

maintained by law Punishment

imprisonment up to three years and / or fine up to Rs. 2 lakh

16

Section 66: Hacking Ingredients Intention or Knowledge to cause wrongful loss or damage to the public or any person Destruction, deletion, alteration, diminishing value or utility or injuriously affecting information residing in a computer resource

Punishment imprisonment up to three years, and / or fine up to Rs. 2 lakh

Cognizable (within the jurisdiction of a court), Non Bail able,

17

Ingredients Publishing or transmitting or causing to be published in the electronic form, Obscene material

Punishment On first conviction

imprisonment of either description up to five years and fine up to Rs. 1 lakh On subsequent conviction imprisonment of either description up to ten years and fine up to Rs. 2 lakh

Section covers Internet Service Providers, Search engines, Pornographic websites

Cognizable, Non- Bail able, JMIC/ Court of Sessions18

Ingredients

Securing unauthorised access or attempting to

secure unauthorised access to protected system Acts

covered by this section:

Switching computer on / off Using installed software / hardware Installing software / hardware Port scanning

Punishment

Imprisonment up to 10 years and fine

Cognizable, Non-Bail able, Court of Sessions

19

Computer Related Crimes under IPC and Special LawsSending threatening messages by email Sec 503 IPC

Sending defamatory messages by emailForgery of electronic records Bogus websites, cyber frauds Email spoofing Online sale of Drugs

Sec 499, 500 IPCSec 463, 470, 471 IPC Sec 420 IPC Sec 416, 417, 463 IPC NDPS Act

Web -JackingOnline sale of Arms

Sec. 383 IPCArms Act

20

The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in concrete bunker and is surrounded by nerve gas and very highly paid armed guards.

21

22

23