08 CYBER CRIME & CYBER LAWS FINAL PPT

50
CYBER CRIMES & CYBER LAWS

Transcript of 08 CYBER CRIME & CYBER LAWS FINAL PPT

Page 1: 08 CYBER CRIME & CYBER LAWS FINAL PPT

CYBER CRIMES &

CYBER LAWS

Page 2: 08 CYBER CRIME & CYBER LAWS FINAL PPT

CONTENTS

WHY LEARN ABOUT CYBER

CRIME?

DEFINING CYBER CRIME

TYPES OF CYBER CRIMES

PREVENTIVE MEASURES

CYBERLAWS

2

Page 3: 08 CYBER CRIME & CYBER LAWS FINAL PPT

WHAT IS CYBER CRIME ?

"unlawful acts wherein the computer is either a tool or a target or both".

3

Page 4: 08 CYBER CRIME & CYBER LAWS FINAL PPT

WHY LEARN ABOUT CYBER CRIME?Because: –

– Everybody is using COMPUTERS.

– From white collar criminals to terrorist organizations

and from teenagers to adults.

– Conventional crimes like Forgery, extortion,

kidnapping etc. are being committed with the help of

computers.

– New generation is growing up with computers.

– MOST IMPORTANT - Monetary transactions are

moving on to the IINTERNET.4

Page 5: 08 CYBER CRIME & CYBER LAWS FINAL PPT

WHAT IS COMPUTER CRIME?

Defining Cyber Crime

Defined, as "acts that are punishable by the Information Technology Act" would be unsuitable as the Indian Penal Code also covers many cyber crimes, such as email spoofing and cyber defamation, sending threatening emails etc. A simple yet sturdy definition of cyber crime would be "unlawful acts wherein the computer is either a tool or a target or both".

5

Page 6: 08 CYBER CRIME & CYBER LAWS FINAL PPT

COMPUTER CRIME is any crime where –• Computer is a target.• Computer is a tool of crime• Computer is incidental to crime

6

Page 7: 08 CYBER CRIME & CYBER LAWS FINAL PPT

SO HOW ARE CRIMINALS

COMMITTING THE CRIMES?

Tools of the Trade

Wireless networking technology Password Crackers Network Scanning software Illegitimate Websites (fake URLs), SPAM

7

Page 8: 08 CYBER CRIME & CYBER LAWS FINAL PPT

WHAT ARE GENERAL REASONS, FOR HACKING, BY CYBER-CRIMINALS?

Gathering Trophies (quest to become famous)

General Mischief Financial Gain Revenge Protest Criminal activity Identity Theft Forging Documents and Messages

8

Page 9: 08 CYBER CRIME & CYBER LAWS FINAL PPT

PROFILE OF CYBER CRIMINAL

Disgruntled employees. Teenagers. Political Hacktivist. Professional Hackers. Business Rival. Ex-Boy Friend. Divorced Husband. etc

9

Page 10: 08 CYBER CRIME & CYBER LAWS FINAL PPT

THE WORLD'S MOST FAMOUS HACKERS

Vladimir Levin

Johan Helsingius

Kevin Mitnick

Robert Morris

Dennis Ritchie and Ken Thompson

10

Page 11: 08 CYBER CRIME & CYBER LAWS FINAL PPT

WHAT ARE GENERAL REASONS, FOR HACKING, BY CYBER-CRIMINALS?

Gathering Trophies (quest to become famous)

General Mischief Financial Gain Revenge Protest Criminal activity Identity Theft Forging Documents and Messages

11

Page 12: 08 CYBER CRIME & CYBER LAWS FINAL PPT

PROFILE OF CYBER CRIMINAL

Disgruntled employees..

Teenagers..

Political Hacktivist.

Professional Hackers..

Business Rival..

Ex-Boy Friend..

Divorced Husband.. etc 12

Page 13: 08 CYBER CRIME & CYBER LAWS FINAL PPT

TYPES OF CYBER CRIME

HACKING DENIAL OF SERVICE

ATTACK VIRUS DISSEMINATION SOFTWARE PIRACY PORNOGRAPHY IRC CRIME CREDIT CARD FRAUD

NET EXTORTION PHISHING SPOOFING CYBER STALKING CYBER DEFAMATION THREATENING SALAMI ATTACK

13

Page 14: 08 CYBER CRIME & CYBER LAWS FINAL PPT

HACKING

Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.

14

Page 15: 08 CYBER CRIME & CYBER LAWS FINAL PPT

WHO IS A HACKER?

A hacker is someone who breaks into

computers sometimes to read private e-mails

and other files.

15

Page 16: 08 CYBER CRIME & CYBER LAWS FINAL PPT

DENIAL OF SERVICE ATTACK

This is an act by the criminal, who floods the

bandwidth of the victim's network or fill's his e-

mail box with spam mail depriving him of the

services he is entitled to access or provide

16

Page 17: 08 CYBER CRIME & CYBER LAWS FINAL PPT

VIRUS DISSEMINATION

Malicious software that attaches itself to other software.(virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious software's)

17

Page 18: 08 CYBER CRIME & CYBER LAWS FINAL PPT

SOFTWARE PIRACY

Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.Retail revenue losses worldwide are ever increasing due to this crime.

Can be done in various ways- End user copying, Hard disk loading,

Counterfeiting, Illegal downloads from the internet etc.

18

Page 19: 08 CYBER CRIME & CYBER LAWS FINAL PPT

PORNOGRAPHY

Pornography is the first consistently successful ecommerce product.

Deceptive marketing tactics and mouse trapping technologies Pornography encourage customers to access their websites.

Anybody including children can log on to the internet and access websites with pornographic contents with a click of a mouse.

Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient interest is an offence under the provisions of section 67 of I.T. Act -2000. 19

Page 20: 08 CYBER CRIME & CYBER LAWS FINAL PPT

IRC CRIME

Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other

Criminals use it for meeting coconspirators. Hackers use it for discussing their exploits /

sharing the techniques Pedophiles use chat rooms to allure small

children Cyber Stalking - In order to harass a

woman her telephone number is given to others as if she wants to befriend males 20

Page 21: 08 CYBER CRIME & CYBER LAWS FINAL PPT

CREDIT CARD FRAUD This is done by duplicating the credit

card of the victim.

Credit Card Skimmer Credit Card Writer

21

Page 22: 08 CYBER CRIME & CYBER LAWS FINAL PPT

CARD SKIMMER OVER THE ORIGINAL CARD SLOT – REPLICATES THE CARD

22

Page 23: 08 CYBER CRIME & CYBER LAWS FINAL PPT

PAMPHLET HOLDER ATTACHED WITH CAMERA – GETS THE VICTIMS PIN CODE

Hidden Camera23

Nestle Rock
Page 24: 08 CYBER CRIME & CYBER LAWS FINAL PPT

NET EXTORTION

Copying the company’s confidential data in order to extort said company for huge amount.For e.g. : Crypto virology : It’s a virus that ciphers or encrypts the data in a

computer

24

Page 25: 08 CYBER CRIME & CYBER LAWS FINAL PPT

PHISHING

It is technique of pulling out confidential

information from the bank/financial institutional

account holders by deceptive means

Phishing methods :

E-mails that redirects to a deceptive website

Deceptive website resembles the victims

financial institutional website25

Page 26: 08 CYBER CRIME & CYBER LAWS FINAL PPT

PHISHING WEBSITE

Deceptive Login in page

Original Login in page

26

Page 27: 08 CYBER CRIME & CYBER LAWS FINAL PPT

SPOOFING

Getting one computer on a network to pretend to have the identity off another computer, usually one with special access privileges , so as to obtain access to the other computers on the network.

OR

It is a situation in which one person or program successfully impersonate as another by falsifying data and thereby gaining an illicit advantage.

27

Page 28: 08 CYBER CRIME & CYBER LAWS FINAL PPT

E-MAIL SPOOFING

A spoofed email is one that appears to originate from one source but actually has been sent from another source

Its also known as “E-Mail Forging”

28

Page 29: 08 CYBER CRIME & CYBER LAWS FINAL PPT

CYBER STALKING

Is the use of the Internet or other electronic means to Stalk or harass an individual, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass.

29

Page 30: 08 CYBER CRIME & CYBER LAWS FINAL PPT

CYBER DEFAMATION Criminal publishing defamatory matter about

victim on a websitesOR

Sending e-mail containing defamatory information to all of that victim’s friends

E.g. :

displeased employee may do this against boss, ex-boys friend against girl, divorced husband against wife etc

30

Page 31: 08 CYBER CRIME & CYBER LAWS FINAL PPT

SALAMI ATTACK

In such crime criminal makes insignificant changes are made in such a manner that it would go unnoticed

Such attacks occur during the deduction of commissions in financial institutions

For e.g. : Criminal makes such program that deducts small amount like Rs. 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.

31

Page 32: 08 CYBER CRIME & CYBER LAWS FINAL PPT

SALE OF ILLEGAL ARTICLES

Sale of narcotics, weapons and wildlife with the help of internet

Posting information on websites, bulletin boards or simply by using e-mail communications

32

Page 33: 08 CYBER CRIME & CYBER LAWS FINAL PPT

Should not give information such as Name,

Home Address, School Name or Telephone

number in a chat room.

Should not give photographs to anyone on the

net.

Should not respond to messages, which are

suggestive, obscene, belligerent or threatening

Should not arrange a face-to –face meeting

without telling parents or guardians

PREVENTIVE MEASURESPreventive steps for children:-

33

Page 34: 08 CYBER CRIME & CYBER LAWS FINAL PPT

should use content filtering software on PC to

protect children from pornography, gambling,

hate speech, drugs and alcohol.

Install software to establish time controls for

use of limpets

allowing parents to see which site item

children have visited

Preventive steps for Parents:-

34

PREVENTIVE MEASURES

Page 35: 08 CYBER CRIME & CYBER LAWS FINAL PPT

Dont delete harmful communications (emails, chats etc.). They will provide vital information about system and address of the person behind these.

If you feel any immediate physical danger, contact your local police.

Avoid getting into huge arguments online during chat and discussions with other users.

Be extremely careful about how you share personal information about yourself online

Be extremely cautious about meeting online introduced person. If you choose to meet, do so in a public place along with a friend.

Save all communications for evidence. Do not edit it in any way. Also, keep a record of your contacts and inform Law Enforcement Officials.

General Information:-

35

Page 36: 08 CYBER CRIME & CYBER LAWS FINAL PPT

Physical Security

Implement Access Control Systems

Use Of Password

Finding the Holes in Network

Using Network Scanning Program ( E.g. UNIX,

COPS-computer oracle and password system)

Using Intrusion Alert Program

Using Encryption

Preventive Steps For Organizations and Governments:-

36

Page 37: 08 CYBER CRIME & CYBER LAWS FINAL PPT

Remember: People such as

computer hackers and pirates who hurt

others through computer technology

are not "cool." They are breaking the

law 37

Page 38: 08 CYBER CRIME & CYBER LAWS FINAL PPT

CYBER LAWS

38

Page 39: 08 CYBER CRIME & CYBER LAWS FINAL PPT

04/10/2023C

yber Law

39

HIERARCHYLaw

I.P.C.: Indian Penal Code

Cr.P.C: Criminal Procedure

Court Evidence Act

I.T. Act 2000

Page 40: 08 CYBER CRIME & CYBER LAWS FINAL PPT

Laws relating to computer,internet and e-commerce

Mr.Pavan Duggal,President CYBER LAW-India

04/10/2023 Cyber Law 40

CYBERLAW INDIA

Page 41: 08 CYBER CRIME & CYBER LAWS FINAL PPT

IT AMENDMENT ACTS

The Information Technology Act, 2000 is the Mother Legislation that deals with issues related to use of computers, computer systems , computer networks and the Internet.

Information Technology Amendment Bill, 2006

Information technology amendment act, 2008

04/10/2023 Cyber Law 41

Page 44: 08 CYBER CRIME & CYBER LAWS FINAL PPT

04/10/2023 Cyber Law 44

SECTIONS IN LAW & PENALTIES

Section 43: of the act reads: “If any person without permission of the owner ”

a) ACCESS to such computer

b) DOWNLOAD, COPIES, or EXTRACTS any data from such computer

c) Introduces COMPUTER VIRUS so as to contaminate the system

d) DAMAGES such computer network

e) CAUSES DISRUPTION to such computer system

f) DENY the user to access

g) CHANGES ACCOUNT SETTINGS

Punishment:

He shall be liable to pay damages by the way of compensation

not exceeding One crore to person so affected….

Page 45: 08 CYBER CRIME & CYBER LAWS FINAL PPT

04/10/2023 Cyber Law 45

SECTION 66

Hacking with Computer System (1) If Information residing in a computer resources get :

Destroyed Deleted Altered Diminished in value or utility Affected Injuriously

Punishment:3 yrs. Or Fine up to 2 lac for hacking.

Page 46: 08 CYBER CRIME & CYBER LAWS FINAL PPT

04/10/2023 Cyber Law 46

SECTION 67

Section 67 of the Act reads: “Whoever publishes or transmitted in the electronic form any material which contains sexually explicit acts or conduct :

Fine of ten lakh rupees as punishment on first conviction

In the event of second or subsequent conviction Imprisonment of either description for a term

which may extend to seven years and also with fine which may extend to ten lakh rupees.”

If the same thing is repeated imprisonment of 10 yrs.

Page 47: 08 CYBER CRIME & CYBER LAWS FINAL PPT

04/10/2023 Cyber Law 47

SECTION 65

Tampering with computer source document:

Punishment:Offences are punishable with imprisonment up to 3 yrs. And / or fine up to Rs. 2 lakh

Page 48: 08 CYBER CRIME & CYBER LAWS FINAL PPT

04/10/2023 Cyber Law 48

SECTION 69

Deals with the Interception, monitoring or decryption of any information in the interest of the sovereignty, integrity, Security or defense of India, friendly relations with the foreign states etc.

Punishment: 2 lakh and /or jail not exceeding 5 yrs.

Page 49: 08 CYBER CRIME & CYBER LAWS FINAL PPT

04/10/2023 Cyber Law 49

SOME OTHER SECTIONS… Section 72: “Violation of the privacy policy”---

Fine up to 5 lakh, jail not extending 2 yrs.

Section 502A: “Publishing, Transmitting images of the private area of a person without his or her consent”---2yrs./2 lakh.

Section 419A: “Cheating by any communication device or computer resource” --- 5yrs.

Section 417A: “Identity Theft”--- 2yrs.

Page 50: 08 CYBER CRIME & CYBER LAWS FINAL PPT

CONCLUSIONS

The new amendments have strengthened the hands of the nation by increasing the reach of the powers of interception of the Government.

Generate awareness & orientation about the compliance requirements of Indian Cyber Law

Sensitize people about :

The level of compliances of their respective organizations pertaining to Indian Cyber Law.

04/10/2023 Cyber Law 50