Upload
shalinibabu8790
View
4.245
Download
5
Embed Size (px)
Citation preview
…
CYBER CRIMES &
CYBER LAWS
CONTENTS
WHY LEARN ABOUT CYBER
CRIME?
DEFINING CYBER CRIME
TYPES OF CYBER CRIMES
PREVENTIVE MEASURES
CYBERLAWS
2
WHAT IS CYBER CRIME ?
"unlawful acts wherein the computer is either a tool or a target or both".
3
WHY LEARN ABOUT CYBER CRIME?Because: –
– Everybody is using COMPUTERS.
– From white collar criminals to terrorist organizations
and from teenagers to adults.
– Conventional crimes like Forgery, extortion,
kidnapping etc. are being committed with the help of
computers.
– New generation is growing up with computers.
– MOST IMPORTANT - Monetary transactions are
moving on to the IINTERNET.4
WHAT IS COMPUTER CRIME?
Defining Cyber Crime
Defined, as "acts that are punishable by the Information Technology Act" would be unsuitable as the Indian Penal Code also covers many cyber crimes, such as email spoofing and cyber defamation, sending threatening emails etc. A simple yet sturdy definition of cyber crime would be "unlawful acts wherein the computer is either a tool or a target or both".
5
COMPUTER CRIME is any crime where –• Computer is a target.• Computer is a tool of crime• Computer is incidental to crime
6
SO HOW ARE CRIMINALS
COMMITTING THE CRIMES?
Tools of the Trade
Wireless networking technology Password Crackers Network Scanning software Illegitimate Websites (fake URLs), SPAM
7
WHAT ARE GENERAL REASONS, FOR HACKING, BY CYBER-CRIMINALS?
Gathering Trophies (quest to become famous)
General Mischief Financial Gain Revenge Protest Criminal activity Identity Theft Forging Documents and Messages
8
PROFILE OF CYBER CRIMINAL
Disgruntled employees. Teenagers. Political Hacktivist. Professional Hackers. Business Rival. Ex-Boy Friend. Divorced Husband. etc
9
THE WORLD'S MOST FAMOUS HACKERS
Vladimir Levin
Johan Helsingius
Kevin Mitnick
Robert Morris
Dennis Ritchie and Ken Thompson
10
WHAT ARE GENERAL REASONS, FOR HACKING, BY CYBER-CRIMINALS?
Gathering Trophies (quest to become famous)
General Mischief Financial Gain Revenge Protest Criminal activity Identity Theft Forging Documents and Messages
11
PROFILE OF CYBER CRIMINAL
Disgruntled employees..
Teenagers..
Political Hacktivist.
Professional Hackers..
Business Rival..
Ex-Boy Friend..
Divorced Husband.. etc 12
TYPES OF CYBER CRIME
HACKING DENIAL OF SERVICE
ATTACK VIRUS DISSEMINATION SOFTWARE PIRACY PORNOGRAPHY IRC CRIME CREDIT CARD FRAUD
NET EXTORTION PHISHING SPOOFING CYBER STALKING CYBER DEFAMATION THREATENING SALAMI ATTACK
13
HACKING
Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
14
WHO IS A HACKER?
A hacker is someone who breaks into
computers sometimes to read private e-mails
and other files.
15
DENIAL OF SERVICE ATTACK
This is an act by the criminal, who floods the
bandwidth of the victim's network or fill's his e-
mail box with spam mail depriving him of the
services he is entitled to access or provide
16
VIRUS DISSEMINATION
Malicious software that attaches itself to other software.(virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious software's)
17
SOFTWARE PIRACY
Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.Retail revenue losses worldwide are ever increasing due to this crime.
Can be done in various ways- End user copying, Hard disk loading,
Counterfeiting, Illegal downloads from the internet etc.
18
PORNOGRAPHY
Pornography is the first consistently successful ecommerce product.
Deceptive marketing tactics and mouse trapping technologies Pornography encourage customers to access their websites.
Anybody including children can log on to the internet and access websites with pornographic contents with a click of a mouse.
Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient interest is an offence under the provisions of section 67 of I.T. Act -2000. 19
IRC CRIME
Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other
Criminals use it for meeting coconspirators. Hackers use it for discussing their exploits /
sharing the techniques Pedophiles use chat rooms to allure small
children Cyber Stalking - In order to harass a
woman her telephone number is given to others as if she wants to befriend males 20
CREDIT CARD FRAUD This is done by duplicating the credit
card of the victim.
Credit Card Skimmer Credit Card Writer
21
CARD SKIMMER OVER THE ORIGINAL CARD SLOT – REPLICATES THE CARD
22
PAMPHLET HOLDER ATTACHED WITH CAMERA – GETS THE VICTIMS PIN CODE
Hidden Camera23
NET EXTORTION
Copying the company’s confidential data in order to extort said company for huge amount.For e.g. : Crypto virology : It’s a virus that ciphers or encrypts the data in a
computer
24
PHISHING
It is technique of pulling out confidential
information from the bank/financial institutional
account holders by deceptive means
Phishing methods :
E-mails that redirects to a deceptive website
Deceptive website resembles the victims
financial institutional website25
PHISHING WEBSITE
Deceptive Login in page
Original Login in page
26
SPOOFING
Getting one computer on a network to pretend to have the identity off another computer, usually one with special access privileges , so as to obtain access to the other computers on the network.
OR
It is a situation in which one person or program successfully impersonate as another by falsifying data and thereby gaining an illicit advantage.
27
E-MAIL SPOOFING
A spoofed email is one that appears to originate from one source but actually has been sent from another source
Its also known as “E-Mail Forging”
28
CYBER STALKING
Is the use of the Internet or other electronic means to Stalk or harass an individual, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass.
29
CYBER DEFAMATION Criminal publishing defamatory matter about
victim on a websitesOR
Sending e-mail containing defamatory information to all of that victim’s friends
E.g. :
displeased employee may do this against boss, ex-boys friend against girl, divorced husband against wife etc
30
SALAMI ATTACK
In such crime criminal makes insignificant changes are made in such a manner that it would go unnoticed
Such attacks occur during the deduction of commissions in financial institutions
For e.g. : Criminal makes such program that deducts small amount like Rs. 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.
31
SALE OF ILLEGAL ARTICLES
Sale of narcotics, weapons and wildlife with the help of internet
Posting information on websites, bulletin boards or simply by using e-mail communications
32
Should not give information such as Name,
Home Address, School Name or Telephone
number in a chat room.
Should not give photographs to anyone on the
net.
Should not respond to messages, which are
suggestive, obscene, belligerent or threatening
Should not arrange a face-to –face meeting
without telling parents or guardians
PREVENTIVE MEASURESPreventive steps for children:-
33
should use content filtering software on PC to
protect children from pornography, gambling,
hate speech, drugs and alcohol.
Install software to establish time controls for
use of limpets
allowing parents to see which site item
children have visited
Preventive steps for Parents:-
34
PREVENTIVE MEASURES
Dont delete harmful communications (emails, chats etc.). They will provide vital information about system and address of the person behind these.
If you feel any immediate physical danger, contact your local police.
Avoid getting into huge arguments online during chat and discussions with other users.
Be extremely careful about how you share personal information about yourself online
Be extremely cautious about meeting online introduced person. If you choose to meet, do so in a public place along with a friend.
Save all communications for evidence. Do not edit it in any way. Also, keep a record of your contacts and inform Law Enforcement Officials.
General Information:-
35
Physical Security
Implement Access Control Systems
Use Of Password
Finding the Holes in Network
Using Network Scanning Program ( E.g. UNIX,
COPS-computer oracle and password system)
Using Intrusion Alert Program
Using Encryption
Preventive Steps For Organizations and Governments:-
36
Remember: People such as
computer hackers and pirates who hurt
others through computer technology
are not "cool." They are breaking the
law 37
CYBER LAWS
38
04/10/2023C
yber Law
39
HIERARCHYLaw
I.P.C.: Indian Penal Code
Cr.P.C: Criminal Procedure
Court Evidence Act
I.T. Act 2000
Laws relating to computer,internet and e-commerce
Mr.Pavan Duggal,President CYBER LAW-India
04/10/2023 Cyber Law 40
CYBERLAW INDIA
IT AMENDMENT ACTS
The Information Technology Act, 2000 is the Mother Legislation that deals with issues related to use of computers, computer systems , computer networks and the Internet.
Information Technology Amendment Bill, 2006
Information technology amendment act, 2008
04/10/2023 Cyber Law 41
CONTD… The new amendments have added “identity
theft”and “phishing” as cybercrimes .
Have also covered “breach of privacy”, “ child pornography” as specific offences
04/10/2023 Cyber Law 42
OFFENCES Offence under IT Acts
Tampering with Computer source documents
Hacking with Computer systems, Data alteration
Publishing obscene information Un-authorised access to protected system Breach of Confidentiality and Privacy Publishing false digital signature
certificates
04/10/2023 Cyber Law 43
04/10/2023 Cyber Law 44
SECTIONS IN LAW & PENALTIES
Section 43: of the act reads: “If any person without permission of the owner ”
a) ACCESS to such computer
b) DOWNLOAD, COPIES, or EXTRACTS any data from such computer
c) Introduces COMPUTER VIRUS so as to contaminate the system
d) DAMAGES such computer network
e) CAUSES DISRUPTION to such computer system
f) DENY the user to access
g) CHANGES ACCOUNT SETTINGS
Punishment:
He shall be liable to pay damages by the way of compensation
not exceeding One crore to person so affected….
04/10/2023 Cyber Law 45
SECTION 66
Hacking with Computer System (1) If Information residing in a computer resources get :
Destroyed Deleted Altered Diminished in value or utility Affected Injuriously
Punishment:3 yrs. Or Fine up to 2 lac for hacking.
04/10/2023 Cyber Law 46
SECTION 67
Section 67 of the Act reads: “Whoever publishes or transmitted in the electronic form any material which contains sexually explicit acts or conduct :
Fine of ten lakh rupees as punishment on first conviction
In the event of second or subsequent conviction Imprisonment of either description for a term
which may extend to seven years and also with fine which may extend to ten lakh rupees.”
If the same thing is repeated imprisonment of 10 yrs.
04/10/2023 Cyber Law 47
SECTION 65
Tampering with computer source document:
Punishment:Offences are punishable with imprisonment up to 3 yrs. And / or fine up to Rs. 2 lakh
04/10/2023 Cyber Law 48
SECTION 69
Deals with the Interception, monitoring or decryption of any information in the interest of the sovereignty, integrity, Security or defense of India, friendly relations with the foreign states etc.
Punishment: 2 lakh and /or jail not exceeding 5 yrs.
04/10/2023 Cyber Law 49
SOME OTHER SECTIONS… Section 72: “Violation of the privacy policy”---
Fine up to 5 lakh, jail not extending 2 yrs.
Section 502A: “Publishing, Transmitting images of the private area of a person without his or her consent”---2yrs./2 lakh.
Section 419A: “Cheating by any communication device or computer resource” --- 5yrs.
Section 417A: “Identity Theft”--- 2yrs.
CONCLUSIONS
The new amendments have strengthened the hands of the nation by increasing the reach of the powers of interception of the Government.
Generate awareness & orientation about the compliance requirements of Indian Cyber Law
Sensitize people about :
The level of compliances of their respective organizations pertaining to Indian Cyber Law.
04/10/2023 Cyber Law 50