it tech

39
A Seminar Presntaion On Cyber Crime,IPC & IT Act 2008 Presented to: Mr. Pankaj Dadheech Presented by: Dushyant Kr Marwal 11ESKCS047

description

ff,yur

Transcript of it tech

A Seminar Presntaion OnCyber Crime,IPC & IT Act 2008

Presented to:Mr. Pankaj DadheechReader, CSE

Presented by:Dushyant Kr Marwal11ESKCS047

Contents INTRODUCTION HISTORY OF CYBER CRIME TYPES OF CYBER CRIME CYBER CRIMINALS CATEGORIES OF CYBER CRIMECYBER SECURITYAn !dea about Cyber CrimeCrime committed using the computer and the internet to steal the persons identity or illegal imports or malicious programs.Cyber Crime is nothing but where the computer is used as an object or a subject of crime.

History of Cyber CrimeThe first recorded cyber crime LOOM took place in the year 1820.

After that in 1978 a SPAM EMAIL is found when it was sent out over the ARPANet (Advanced Research Project Agency Network).

Types of Cyber Crime Virus/Worm Attacks Trojan Attacks Email Bombing Phishing Denial of Service Attack Web Jacking

Types of Cyber Crime(Contd) Child Pornography Cyber LaunderingCyber Stalking Cyber TheftBotnet

Cyber CriminalsThose who are doing crimes by using the computer as an target or object.

Children and adolescents between the age group of 6-18 years .

Dissatisfied employees.

Professional hackers / crackers.

Organized hackers . Categories of Cyber CrimeCyber crimes can be basically divided into three categories: Cyber crimes against persons.Cyber crimes against property.Cyber crimes against government.

Against personsHarassment via E-mails: Harassment through e-mails is not a new concept. It is very similar to harassing through letters. Email Spoofing: A mail which misrepresents its origin. It shows its origin to be different from which actually it originates. Against property Computer vandalism: Damaging or destroying data rather than stealing or misusing them is called Computer vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate. They usually affect the data on a computer, either by altering or deleting it. Against Government Cyber Terrorism: Terrorist attacks on internet is by: Distributed denial of service attacks Fake websites and fake emails Attacks on sensitive computer networks , etc. In this terrorists are using 512 bit encryption, which is impossible to decrypt.

How can we protect it?Keep Software up to Date: If the seller releases patches for the software operating your device, install them as soon as possible. Use Good Passwords: Select passwords that are difficult to guess. Do not options that allows your computer to remember the password. Disable Remote Connectivity: Some PDAs & Phones are equipped with wireless technologies, such as Bluetooth. You should disable these features when they are not in use.Intellectual Property RightContentsIntroductionImportance of IPRForms of IPRPatentCopyrightTrademarkLaws in indiaWhat is Intellectual Property ?Creation of human mindIdea or a concept or a thought at the beginningResearch and Development to lead the idea The outcome of these ideas may be development of products, processes and design etc.

Why IPR is important?

Reward original efforts ?Prevent duplication of work?Commercial value in research?Technical information for research & to prevent litigation?

PatentPatent defined in Patents Act as patent granted for any invention under the Act.Granted by the GovernmentTo inventor To prevent third parties not having his consent from making, using, offering for sale. (Sec. 48)For a limited period of time (20 years)Qualified rights with duties

17Copyright ActObjective: To ensure protection from unlawfully exploitation of the work of owner(Author)Copyright act provides exclusive rights to authors and other owners of original works. Exclusive privilege to authors to reproduce, distribute, perform or display their creative works.

FilmsLiterary

Dramatic

Musical

ArtisticWhat is covered by copyright ?What is not covered by copyright ?

IdeasFactsRecipesNames, titles or short phrasesTrademarkWord or symbol used by manufacturers to identify goods.

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period.

Types of trademark

TM - a Trade Mark - used before registrationSM - a Service Mark SM - used before registrationRights by Registration

Trade Marks

Name

Logotype

Symbol

Slogan

Shape

ColorDuration of protectionYEARSRENEWABLE Patents20 No Trade marks6-10Yes Designs6-10Yes Copyright 70 after deathNoCyber laws(IT ACT 2000)

Content:Cyber lawNeed of Cyber lawCyber Laws in IndiaChallenges facing law enforcementPositive Initiatives

Need of cyber lawTackling cyber crimeSuccessful and smooth functioning of e-commerce and virtual communicationCloud computing is proving to be a major threat

Cyber LawCyber lawis a term that encapsulates the legal issues related to use of theInternetThe abuse of computers has also given birth to a new age crimes that are addressed by the Information Technology Act, 2000.

CYBER LAWS IN INDIAIT act 2000 passesUp gradation of IT act 2000-introducing IT act 2008IPC actsCopy right actThe IT ACT, 2000Legal Recognition of Electronic Documents

Legal Recognition of Digital Signatures

Offenses and Contraventions

Justice Dispensation Systems for cybercrimes

Contd..Civil Wrongs under IT Act

Section 46: IT Act

Section 65: Source Code

Section 66: Hacking

Sec. 67. PornographyContd.Sec 69: Decryption of information

Sec 70 : Protected System

Email spoofing

Cyber stalkingInformation Technology Act 2008 Information Security

New sections on offences

Data Protection.

Section 69 empowers the C Gov/S Gov

Computer Related Crimes under IPC and Special LawsArms ActOnline sale of ArmsSec. 383 IPCWeb-JackingNDPS ActOnline sale of DrugsSec 416, 417, 463 IPCEmail spoofingSec 420 IPCBogus websites, cyber fraudsSec 463, 470, 471 IPCForgery of electronic recordsSec 499, 500 IPCSending defamatory messages by emailSec 503 IPC Sending threatening messages by email

Challenges facing law enforcement

Most not trained in the technologies

Multiple jurisdictions

Retrofit new crimes to existing laws

POSITIVE INITIATIVES:More Cyber crime police cells set up across the country

Websites aid in creating awareness and encouraging reporting of cyber crime cases.

Specialized Training

Active coordination between police and other law enforcement agencies

ASLU Survey published in March 2014-Incidence of Cyber crime in IndiaConclusionCyber crime is indeed getting the recognition it deserves. It is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. Create yourself, rather than using others creations.Technological advancement made the job of the CREATOR easy

Copyright Law of the USA, Chapter 1 Section 121

Schechter, Roger E., and John R. Thomas.Intellectual Property: The Law of Copyrights, Patents and Trademarks. Trend micro incorporated research paper A TO Z OF Cyber Crime By Aayushi shah.Computer Security Policy Guidebook(WILEY publication).Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Anderson Publishing

Refrences:Thank you