(Cyber Laws Ppt)-Final
Click here to load reader
Transcript of (Cyber Laws Ppt)-Final
![Page 1: (Cyber Laws Ppt)-Final](https://reader037.fdocuments.us/reader037/viewer/2022100516/5448d63ab1af9f65618b4cfe/html5/thumbnails/1.jpg)
Cyber Laws
![Page 2: (Cyber Laws Ppt)-Final](https://reader037.fdocuments.us/reader037/viewer/2022100516/5448d63ab1af9f65618b4cfe/html5/thumbnails/2.jpg)
2
Cyber Crime•Cyber crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks.•Cyber crime in the context of national security may involve hacktivism, traditional espionage, or information warfare and related activities.
![Page 3: (Cyber Laws Ppt)-Final](https://reader037.fdocuments.us/reader037/viewer/2022100516/5448d63ab1af9f65618b4cfe/html5/thumbnails/3.jpg)
3
Types of Cyber CrimesCyber StalkingEx: Mrs. Ritu Kohli Case (1st Cyber Stalking
Case) PornographyEx: Dr. L Prakash (1st case registered under
IT Act)HackingEx: State of Maharashtra v/s Anand Ashok
KharePhishingEx: Umashankar Vs ICICI BankSoftware Piracy
![Page 4: (Cyber Laws Ppt)-Final](https://reader037.fdocuments.us/reader037/viewer/2022100516/5448d63ab1af9f65618b4cfe/html5/thumbnails/4.jpg)
4
Types of Cyber Crimes contd.Property Frauds/Monetory fraudsInternet time theftsTransmitting virusHacking organization systemElectronic Fund TransferOnline GamblingDigital Signature Certificate
![Page 5: (Cyber Laws Ppt)-Final](https://reader037.fdocuments.us/reader037/viewer/2022100516/5448d63ab1af9f65618b4cfe/html5/thumbnails/5.jpg)
5
Information Technology Act 2000Defines 5 cyber crime:Tampering with
Computer source documents
Hacking/Data Alterations
Publishing obscene information
Breach of confidentialityPublishing false digital
signature(controller of certificate authorities)
![Page 6: (Cyber Laws Ppt)-Final](https://reader037.fdocuments.us/reader037/viewer/2022100516/5448d63ab1af9f65618b4cfe/html5/thumbnails/6.jpg)
6
Why Cyber Crime?Ease of AnonymityInadequate Legal JurisdictionOld Crime, New TechnologyHolding a Grudge(Tamil Nadu Vs Suhas
Katti first case convicted under sec 67 IT act)Thrill of the Game
![Page 7: (Cyber Laws Ppt)-Final](https://reader037.fdocuments.us/reader037/viewer/2022100516/5448d63ab1af9f65618b4cfe/html5/thumbnails/7.jpg)
7
Need for Cyber LawsIntegrity and Security of information.Protecting people from cyber criminals.Methods to reduce Cyber Crime.Privacy and Confidentiality of information.Protecting Intellectual Property Rights.
![Page 8: (Cyber Laws Ppt)-Final](https://reader037.fdocuments.us/reader037/viewer/2022100516/5448d63ab1af9f65618b4cfe/html5/thumbnails/8.jpg)
8
Ways for securityEncryptionSecure passwordsUse virtual keyboards for online transactionsSecure WifiUse antivirusFirewallsBackupsSoftware updates and patches
![Page 9: (Cyber Laws Ppt)-Final](https://reader037.fdocuments.us/reader037/viewer/2022100516/5448d63ab1af9f65618b4cfe/html5/thumbnails/9.jpg)
Types of Hacking
ETHICAL UNETHICAL
![Page 10: (Cyber Laws Ppt)-Final](https://reader037.fdocuments.us/reader037/viewer/2022100516/5448d63ab1af9f65618b4cfe/html5/thumbnails/10.jpg)
10
What is Ethical HackingIt is a methodology to restrict hacking.With the growth of the Internet, computer
security has become a major concern for businesses and Government.
In their search for a way to approach the problem, organizations came to realize that one of the best ways to evaluate the intruder threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.
![Page 11: (Cyber Laws Ppt)-Final](https://reader037.fdocuments.us/reader037/viewer/2022100516/5448d63ab1af9f65618b4cfe/html5/thumbnails/11.jpg)
11
Competencies of Ethical HackersTrustworthyStrong programming and computer
networking skillsAdept at installing and maintaining
systemsDetailed knowledge of Hardware
and software
![Page 12: (Cyber Laws Ppt)-Final](https://reader037.fdocuments.us/reader037/viewer/2022100516/5448d63ab1af9f65618b4cfe/html5/thumbnails/12.jpg)
12
Certified Ethical Hacker (C/EH) TrainingInfoSec Academyhttp://www.infosecacademy.com
It is a professional certification provided by the International Council of E-Commerce Consultants (EC-Council)
![Page 13: (Cyber Laws Ppt)-Final](https://reader037.fdocuments.us/reader037/viewer/2022100516/5448d63ab1af9f65618b4cfe/html5/thumbnails/13.jpg)
13
How to report a Cyber CrimeFiling a complaint/ Writing an application
letter.
What details will I be asked to include in my complaint?Your name,Your mailing address,Your telephone number,Specific details on how the offence was committed, along
with the names and addresses of suspects and any other relevant information necessary.
What contents should be there in the application letter?Contents vary with respect to the type of fraud or crime
faced by you.
![Page 14: (Cyber Laws Ppt)-Final](https://reader037.fdocuments.us/reader037/viewer/2022100516/5448d63ab1af9f65618b4cfe/html5/thumbnails/14.jpg)
14
ImplicationsOffence Implication
Tampering with computer source documents Upto 3 years and/or with a fine upto Rs. 2 Lakh
Publishing any obscene material
electronically1st conviction upto 2 years +
fine upto Rs. 5 Lakh 2nd conviction or subsequent upto 5 years + fine upto Rs.
10 Lakh
Child pornography1st conviction upto 3 years +
fine upto Rs. 10 Lakh 2nd conviction or subsequent
conviction upto 7 years + fine
upto Rs. 10 Lakh
Cheating using digital signature of other person
Upto 3 years + fine
Impersonation using communication network Upto 5 years + fine
![Page 15: (Cyber Laws Ppt)-Final](https://reader037.fdocuments.us/reader037/viewer/2022100516/5448d63ab1af9f65618b4cfe/html5/thumbnails/15.jpg)
15
END
Udayan SikdarVikas Batra
Pratham TiwariPrashasti Tandon