34
Information Technology Act Rather Than Giving Information, It gives Rise to Cyber crime.

Final PPT for ion

Embed Size (px)

Citation preview

Page 1: Final PPT for ion

Information Technology Act

Rather Than Giving Information, It gives Rise to Cyber crime.

Page 2: Final PPT for ion

Information Technology Act It was introduced on 18th December 2000.

The main objective was to enable electronic filing of documents with the Government agencies.

To amend the Indian Penal Code, the Indian Evidence Act, 1872, the Banker's Book Evidence Act, 1891 and the Reserve Bank of India Act, 1934.

The act will not be applicable to a negotiable instruments , a power-of-attorney , and to a trust as defined in the act .

To give emphasis on e-commerce and digital or electronic signature.

Page 3: Final PPT for ion

Contents

Certifying Authority

Tata Consultancy Services

Certification Practice Statement

Digital Signature

Affixing Digital Signature

Key Pair

Asymmetric Crypto System

Hash Function

Page 4: Final PPT for ion

Functions of the Act

Legal recognition of electronic records.

Legal recognition of digital signatures.

Use of electronic records and digital signatures in Government and its agencies.

Power to make rules by Central Government in respect of digital signature.

Secure electronic record.

Secure digital signature.

Security procedure

Page 5: Final PPT for ion

Application Of The Act In Various Sectors.

Financial Agricultural Retail E-commerce Telecommunication Government Defense

Page 6: Final PPT for ion

How Cyber Crime Works

.

Cyber Crime has become an

profession, people with low technical

skills steal lack’s of money without

leaving their homes, the only time the

criminal leaves the PC is to collect money. Sometimes they do

not even do that know as Hackers .

Types of Cyber Criminals

Coders

Kids

Drops

Mobs

Page 7: Final PPT for ion

Cyber Crime Activities

HACKING PHISHING

Denial Of Service Attack

SPOOFING

Virus Dissemination CYBER STALKING

Software Piracy CYBER DEFAMATION

PORNOGRAPHY THREATENING

IRC CRIME SALAMI ATTACK

CREDIT CARD FRAUD NET EXTORTION

Page 8: Final PPT for ion

HACKING

Hacking in simple terms means illegal intrusion into computer system without the permission of the computer owner/user .

Page 9: Final PPT for ion

DENIAL OF SERVICE ATTACK

This is an Act by the Criminal, who floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.

Page 10: Final PPT for ion

VIRUS DISSEMINATION

Malicious software that attaches itself to other software. E.g.

Virus , Worms, Trojan Horse, Time Bomb, Logic Bomb, Rabbit and Bacterium are the malicious software's .

Page 11: Final PPT for ion

SOFTWARE PIRACY

Theft of software through the illegal copying of genuine programs and distribution of products intended to pass for the original .

Retail revenue losses worldwide is increasing rapidly due to this Crime.

Page 12: Final PPT for ion

PORNOGRAPHY

•Is the first consistently successful e-commerce product.•Deceptive marketing tactics and mouse trapping technologies encourage customers to access to PORNOGRAPHY sites.•Gives a very negative impact to the society, anybody including minors can log into this sites.•Publishing transmitting any material in the electronic form which is LUSTFUL and DEGRADING is an offence under the provision of SECTION 67 OF IT ACT-2000

Page 13: Final PPT for ion

PAEDOPHILIES-SLAUGHTER OF INNOCENCEPaedophilies or sexual attraction to

children by an adult is a sickness that does not discriminate by race, class or age.

Open discussion of sexual contents way to lure young victims.

Disguised identities for approaching children.

Ability to build a long term Internet Relation with a potential victim attempting to engage the child in physical contact.

Page 14: Final PPT for ion

IRC CRIME

Internet Relay Chat servers have chat rooms in which people from anywhere in the world can come together and chat with each other.

Criminals use it for meeting and planning.

Hackers use it for discussing their exploits and sharing techniques

Cyber Stalking –In order to harass a woman her telephone number is given to others as if she wants to befriend males.

Page 15: Final PPT for ion

CREDIT CARD FRAUD

You simply have to type the credit card number into www page of the vendor for online transaction

If electronic transaction are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.

Page 16: Final PPT for ion
Page 17: Final PPT for ion
Page 18: Final PPT for ion

PHISHING

It is a technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means.

Page 19: Final PPT for ion

ACTUAL LOGIN PAGE

Page 20: Final PPT for ion

DECEPTIVE LOGIN PAGE

Page 21: Final PPT for ion

SPOOFING

Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges. So as to obtain access to the other computers on the network.

Page 22: Final PPT for ion

CYBER STALKING

The Criminal follows the victim by sending emails, entering the chat rooms frequently.

Page 23: Final PPT for ion

CYBER DEFAMTION

The criminal sends emails containing defamatory matter to all concerned of the victim or post the defamatory matters on a website.

Employee may do this against boss, Ex-girl friend against boyfriend. Divorced wife against Husband.

Page 24: Final PPT for ion

THREATENING

The criminal sends threatening email or comes in contact in chat rooms with victim.

Page 25: Final PPT for ion

SALAMI ATTACK

In such crimes criminal makes insignificant changes in such a manner that such changes would go unnoticed.

Criminal makes such program that deducts small amount like Rs 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.

Page 26: Final PPT for ion

Types Of Hackers

White Hat Hackers

Is a person who is ethically opposed to the abuse of computer systems. Many such people are employed by computer security companies they are also called sneakers. A white hat hacker is generally less skilled than the Black Hat hacker.

Grey Hat Hackers

Refers to skilled hacker who sometimes acts legally and sometimes ill-legally, they are a hybrid between white and black hat hackers. They usually do not hack for personal gains but during the course may hack due to technological exploits.

Black Hat Hackers

A person who compromises the security of a computer system without the permission from an authorized party. The use of the term CRACKERS is mostly limited as BLACK HAT. A high level of computing skills are referred as Hackers.

Page 27: Final PPT for ion

The Certifying Authorities

Safes cryptNICIDRBTTCSMtnl Trust lineGNFCE-Mudhra CA

Page 28: Final PPT for ion

Role of Certifying Authorities

A certificate authority(CA) is an entity that issues Digital Certificates.

CA plays as the third party between the owner of the certificate and the party relying upon the certificate.

CA’s are the characteristic of many PUBLIC KEY INFRASTRUCTURE(PKI) schemes.

Page 29: Final PPT for ion

NASSCOM ROLE AND OBJECTIVESActs as an advisor to the industry

for the global off shoring market and maintain India’s leadership position.

Advise both established and emerging companies for the further growth.

Trade development, improving talent supply, strengthening local infrastructure and building partnerships.

Development of It workforce and enhanced Cyber security.

Page 30: Final PPT for ion

ANTI PIRACY ACTIVITY

Extensive media campaign. Implementation of code of conduct.Training and awareness programs

for police and Law Enforcement authorities.

Creation of IPR cells in every states.Nasscom statement on HIB Visa

quota getting Exhausted by FY2008.

Nasscom, Pune Police and Persistent Systems set up India’s fourth Cyber Lab

Page 31: Final PPT for ion

Different section Under Cyber Crime

Section 65 Source code

Section 66 hacking

Section 67 pornography Section 69 decryption of information

Section 70 protected system

Section 72 breach of confidentiality

Page 32: Final PPT for ion

Cyber Crime under IPC and Special Law Sending threatening messages by email

Sec 503 IPC Sending Defamatory messages by Email

Sec 499 IPC Forgery of Electronic Records

Sec 463 IPC Bogus Websites Cyber Frauds

Sec 420 IPC Emails Spoofing Sec

463 IPC Online Sale of Drugs NDPS

Act Web Jacking Sec

383 IPPC Online Sale of Arms Arms

Act

Page 33: Final PPT for ion

CONCLUSION

It is not possible to eliminate cyber crime from the cyber space. It is quite possible to check them.

From the above one can get aware about the cyber crime and try to protect from being scammed.

The Government has mistakenly relied too much upon “self governance” by private sectors and in that zeal kept aside the “welfare State role”.

The Government must also draw a line between “privatization’ and “abdication of duties” as imposed by the Supreme Constitution of India.

Page 34: Final PPT for ion

There should be a restriction on the web pages which may cause harm to the society.

Every individual should not be given access to the internet without an identification number.

Proper education of e-commerce among masses and improvement in our system.