(Cyber Laws Ppt)-Final

15

Click here to load reader

Transcript of (Cyber Laws Ppt)-Final

Page 1: (Cyber Laws Ppt)-Final

Cyber Laws

Page 2: (Cyber Laws Ppt)-Final

2

Cyber Crime•Cyber crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks.•Cyber crime in the context of national security may involve hacktivism, traditional espionage, or information warfare and related activities.

Page 3: (Cyber Laws Ppt)-Final

3

Types of Cyber CrimesCyber StalkingEx: Mrs. Ritu Kohli Case (1st Cyber Stalking

Case) PornographyEx: Dr. L Prakash (1st case registered under

IT Act)HackingEx: State of Maharashtra v/s Anand Ashok

KharePhishingEx: Umashankar Vs ICICI BankSoftware Piracy

Page 4: (Cyber Laws Ppt)-Final

4

Types of Cyber Crimes contd.Property Frauds/Monetory fraudsInternet time theftsTransmitting virusHacking organization systemElectronic Fund TransferOnline GamblingDigital Signature Certificate

Page 5: (Cyber Laws Ppt)-Final

5

Information Technology Act 2000Defines 5 cyber crime:Tampering with

Computer source documents

Hacking/Data Alterations

Publishing obscene information

Breach of confidentialityPublishing false digital

signature(controller of certificate authorities)

Page 6: (Cyber Laws Ppt)-Final

6

Why Cyber Crime?Ease of AnonymityInadequate Legal JurisdictionOld Crime, New TechnologyHolding a Grudge(Tamil Nadu Vs Suhas

Katti first case convicted under sec 67 IT act)Thrill of the Game

Page 7: (Cyber Laws Ppt)-Final

7

Need for Cyber LawsIntegrity and Security of information.Protecting people from cyber criminals.Methods to reduce Cyber Crime.Privacy and Confidentiality of information.Protecting Intellectual Property Rights.

Page 8: (Cyber Laws Ppt)-Final

8

Ways for securityEncryptionSecure passwordsUse virtual keyboards for online transactionsSecure WifiUse antivirusFirewallsBackupsSoftware updates and patches

Page 9: (Cyber Laws Ppt)-Final

Types of Hacking

ETHICAL UNETHICAL

Page 10: (Cyber Laws Ppt)-Final

10

What is Ethical HackingIt is a methodology to restrict hacking.With the growth of the Internet, computer

security has become a major concern for businesses and Government.

In their search for a way to approach the problem, organizations came to realize that one of the best ways to evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.

Page 11: (Cyber Laws Ppt)-Final

11

Competencies of Ethical HackersTrustworthyStrong programming and computer

networking skillsAdept at installing and maintaining

systemsDetailed knowledge of Hardware

and software

Page 12: (Cyber Laws Ppt)-Final

12

Certified Ethical Hacker (C/EH) TrainingInfoSec Academyhttp://www.infosecacademy.com

It is a professional certification provided by the International Council of E-Commerce Consultants (EC-Council)

Page 13: (Cyber Laws Ppt)-Final

13

How to report a Cyber CrimeFiling a complaint/ Writing an application

letter.

What details will I be asked to include in my complaint?Your name,Your mailing address,Your telephone number,Specific details on how the offence was committed, along

with the names and addresses of suspects and any other relevant information necessary.

What contents should be there in the application letter?Contents vary with respect to the type of fraud or crime

faced by you.

Page 14: (Cyber Laws Ppt)-Final

14

ImplicationsOffence Implication

Tampering with computer source documents Upto 3 years and/or with a fine upto Rs. 2 Lakh

 Publishing any obscene material

electronically1st conviction upto 2 years +

fine upto Rs. 5 Lakh 2nd conviction or subsequent upto 5 years + fine upto Rs.

10 Lakh

Child pornography1st conviction upto 3 years +

fine upto Rs. 10 Lakh 2nd conviction or subsequent

conviction upto 7 years + fine

upto Rs. 10 Lakh

Cheating using digital signature of other person

Upto 3 years + fine

Impersonation using communication network Upto 5 years + fine

Page 15: (Cyber Laws Ppt)-Final

15

END

Udayan SikdarVikas Batra

Pratham TiwariPrashasti Tandon