it tech
-
Upload
devendraameta -
Category
Documents
-
view
216 -
download
1
description
Transcript of it tech
A Seminar Presntaion OnCyber Crime,IPC & IT Act 2008
Presented to:Mr. Pankaj DadheechReader, CSE
Presented by:Dushyant Kr Marwal11ESKCS047
Contents INTRODUCTION HISTORY OF CYBER CRIME TYPES OF CYBER CRIME CYBER CRIMINALS CATEGORIES OF CYBER CRIMECYBER SECURITYAn !dea about Cyber CrimeCrime committed using the computer and the internet to steal the persons identity or illegal imports or malicious programs.Cyber Crime is nothing but where the computer is used as an object or a subject of crime.
History of Cyber CrimeThe first recorded cyber crime LOOM took place in the year 1820.
After that in 1978 a SPAM EMAIL is found when it was sent out over the ARPANet (Advanced Research Project Agency Network).
Types of Cyber Crime Virus/Worm Attacks Trojan Attacks Email Bombing Phishing Denial of Service Attack Web Jacking
Types of Cyber Crime(Contd) Child Pornography Cyber LaunderingCyber Stalking Cyber TheftBotnet
Cyber CriminalsThose who are doing crimes by using the computer as an target or object.
Children and adolescents between the age group of 6-18 years .
Dissatisfied employees.
Professional hackers / crackers.
Organized hackers . Categories of Cyber CrimeCyber crimes can be basically divided into three categories: Cyber crimes against persons.Cyber crimes against property.Cyber crimes against government.
Against personsHarassment via E-mails: Harassment through e-mails is not a new concept. It is very similar to harassing through letters. Email Spoofing: A mail which misrepresents its origin. It shows its origin to be different from which actually it originates. Against property Computer vandalism: Damaging or destroying data rather than stealing or misusing them is called Computer vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate. They usually affect the data on a computer, either by altering or deleting it. Against Government Cyber Terrorism: Terrorist attacks on internet is by: Distributed denial of service attacks Fake websites and fake emails Attacks on sensitive computer networks , etc. In this terrorists are using 512 bit encryption, which is impossible to decrypt.
How can we protect it?Keep Software up to Date: If the seller releases patches for the software operating your device, install them as soon as possible. Use Good Passwords: Select passwords that are difficult to guess. Do not options that allows your computer to remember the password. Disable Remote Connectivity: Some PDAs & Phones are equipped with wireless technologies, such as Bluetooth. You should disable these features when they are not in use.Intellectual Property RightContentsIntroductionImportance of IPRForms of IPRPatentCopyrightTrademarkLaws in indiaWhat is Intellectual Property ?Creation of human mindIdea or a concept or a thought at the beginningResearch and Development to lead the idea The outcome of these ideas may be development of products, processes and design etc.
Why IPR is important?
Reward original efforts ?Prevent duplication of work?Commercial value in research?Technical information for research & to prevent litigation?
PatentPatent defined in Patents Act as patent granted for any invention under the Act.Granted by the GovernmentTo inventor To prevent third parties not having his consent from making, using, offering for sale. (Sec. 48)For a limited period of time (20 years)Qualified rights with duties
17Copyright ActObjective: To ensure protection from unlawfully exploitation of the work of owner(Author)Copyright act provides exclusive rights to authors and other owners of original works. Exclusive privilege to authors to reproduce, distribute, perform or display their creative works.
FilmsLiterary
Dramatic
Musical
ArtisticWhat is covered by copyright ?What is not covered by copyright ?
IdeasFactsRecipesNames, titles or short phrasesTrademarkWord or symbol used by manufacturers to identify goods.
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period.
Types of trademark
TM - a Trade Mark - used before registrationSM - a Service Mark SM - used before registrationRights by Registration
Trade Marks
Name
Logotype
Symbol
Slogan
Shape
ColorDuration of protectionYEARSRENEWABLE Patents20 No Trade marks6-10Yes Designs6-10Yes Copyright 70 after deathNoCyber laws(IT ACT 2000)
Content:Cyber lawNeed of Cyber lawCyber Laws in IndiaChallenges facing law enforcementPositive Initiatives
Need of cyber lawTackling cyber crimeSuccessful and smooth functioning of e-commerce and virtual communicationCloud computing is proving to be a major threat
Cyber LawCyber lawis a term that encapsulates the legal issues related to use of theInternetThe abuse of computers has also given birth to a new age crimes that are addressed by the Information Technology Act, 2000.
CYBER LAWS IN INDIAIT act 2000 passesUp gradation of IT act 2000-introducing IT act 2008IPC actsCopy right actThe IT ACT, 2000Legal Recognition of Electronic Documents
Legal Recognition of Digital Signatures
Offenses and Contraventions
Justice Dispensation Systems for cybercrimes
Contd..Civil Wrongs under IT Act
Section 46: IT Act
Section 65: Source Code
Section 66: Hacking
Sec. 67. PornographyContd.Sec 69: Decryption of information
Sec 70 : Protected System
Email spoofing
Cyber stalkingInformation Technology Act 2008 Information Security
New sections on offences
Data Protection.
Section 69 empowers the C Gov/S Gov
Computer Related Crimes under IPC and Special LawsArms ActOnline sale of ArmsSec. 383 IPCWeb-JackingNDPS ActOnline sale of DrugsSec 416, 417, 463 IPCEmail spoofingSec 420 IPCBogus websites, cyber fraudsSec 463, 470, 471 IPCForgery of electronic recordsSec 499, 500 IPCSending defamatory messages by emailSec 503 IPC Sending threatening messages by email
Challenges facing law enforcement
Most not trained in the technologies
Multiple jurisdictions
Retrofit new crimes to existing laws
POSITIVE INITIATIVES:More Cyber crime police cells set up across the country
Websites aid in creating awareness and encouraging reporting of cyber crime cases.
Specialized Training
Active coordination between police and other law enforcement agencies
ASLU Survey published in March 2014-Incidence of Cyber crime in IndiaConclusionCyber crime is indeed getting the recognition it deserves. It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. Create yourself, rather than using others creations.Technological advancement made the job of the CREATOR easy
Copyright Law of the USA, Chapter 1 Section 121
Schechter, Roger E., and John R. Thomas.Intellectual Property: The Law of Copyrights, Patents and Trademarks. Trend micro incorporated research paper A TO Z OF Cyber Crime By Aayushi shah.Computer Security Policy Guidebook(WILEY publication).Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Anderson Publishing
Refrences:Thank you