Académique Documents
Professionnel Documents
Culture Documents
&
CYBER LAWS
…
CONTENTS
§WHY LEARN ABOUT CYBER CRIME?
§DEFINING CYBER CRIME
§TYPES OF CYBER CRIMES
§PREVENTIVE MEASURES
§CYBERLAWS
§
§ 2
§
§
WHAT IS CYBER CRIME ?
3
WHY LEARN ABOUT CYBER CRIME?
Because: –
5
COMPUTER CRIME is any crime where –
• Computer is a target.
6
SO HOW ARE CRIMINALS
COMMITTING THE CRIMES?
Tools of the Trade
7
WHAT ARE GENERAL REASONS, FOR
HACKING, BY CYBER-CRIMINALS?
§ Gathering Trophies (quest to become famous)
§ General Mischief
§ Financial Gain
§ Revenge
§ Protest
§ Criminal activity
§ Identity Theft
§ Forging Documents and Messages
8
PROFILE OF CYBER CRIMINAL
§ Disgruntled employees.
§ Teenagers.
§ Political Hacktivist.
§ Professional Hackers.
§ Business Rival.
§ Ex-Boy Friend.
§ Divorced Husband. etc
9
The World's Most Famous
Hackers
Vladimir Levin
Johan Helsingius
Kevin Mitnick
Robert Morris
10
WHAT ARE GENERAL REASONS,
FOR HACKING, BY CYBER-
CRIMINALS?
Gathering Trophies (quest to become
famous)
General Mischief
Financial Gain
Revenge
Protest
Criminal activity
Identity Theft
Forging Documents and Messages
11
PROFILE OF CYBER CRIMINAL
Disgruntled employees..
Teenagers..
Political Hacktivist.
Professional Hackers..
Business Rival..
Ex-Boy Friend..
12
TYPES OF CYBER CRIME
HACKING
DENIAL OF SERVICE
NET EXTORTION
PHISHING
ATTACK
SPOOFING
VIRUS DISSEMINATION
CYBER STALKING
SOFTWARE PIRACY
CYBER
IRC CRIME
DEFAMATION
CREDIT CARD FRAUD
THREATENING
13
SALAMI ATTACK
HACKING
14
WHO IS A HACKER?
15
DENIAL OF SERVICE ATTACK
16
VIRUS DISSEMINATION
17
SOFTWARE PIRACY
ØTheft of software through the illegal
copying of genuine programs or the
counterfeiting and distribution of products
intended to pass for the original.
ØRetail revenue losses worldwide are ever
increasing due to this crime.
Can be done in various ways-
18
IRC CRIME
Internet Relay Chat (IRC) servers have chat
rooms in which people from anywhere the
world can come together and chat with
each other
Criminals use it for meeting coconspirators.
Hackers use it for discussing their exploits /
sharing the techniques
Pedophiles use chat rooms to allure small
children
Cyber Stalking - In order to harass a woman
her telephone number is given to others
as if she wants to befriend males
19
CREDIT CARD FRAUD
Thisis done by duplicating the credit
card of the victim.
20
Card Skimmer over the original
card slot – Replicates the card
21
Pamphlet holder attached with
camera – Gets the victims pin
code
22
Hidden Camera
NET EXTORTION
Copying the company’s confidential data in order
to extort said company for huge amount.
For e.g. :
Crypto virology :
It’sa virus that ciphers or encrypts the data in a
computer
23
PHISHING
It is technique of pulling out confidential
information from the bank/financial institutional
account holders by deceptive means
Phishing methods :
E-mails that redirects to a deceptive website
Deceptive website resembles the victims
financial institutional website
24
Phishing website Original Login in page
25
SPOOFING
Getting one computer on a network to pretend
OR
E-MAIL SPOOFING
27
CYBER STALKING
Is the use of the Internet or other electronic
means to Stalk or harass an individual, a group
of individuals, or an organization. It may include
false accusations, monitoring, making threats,
identity theft, damage to data or equipment, the
solicitation of minors for sex, or gathering
information in order to harass.
28
CYBER DEFAMATION
Criminal publishing defamatory matter about
victim on a websites
OR
Sending e-mail containing defamatory
information to all of that victim’s friends
E.g. :
displeased employee may do this against
31
PREVENTIVE MEASURES
Preventive steps for children:-
Should not give information such as Name, Home
Use Of Password
Using Encryption 35
Remember: People such as computer
36
Cyber Laws
37
Hierarchy
Law
38
CYBERLAW INDIA
39
IT Amendment Acts
40
Contd…
41
Offences
Offence under IT Acts
42
Sections in Law & Penalties
Section 43 : of the act reads: “If any person without
Punishment:
He shall be liable to pay damages by the way of compensation
not exceeding One crore to person so affected….
43
Section 66
Hacking with Computer System
Punishment:
Punishment
3 yrs. Or Fine up to 2 lac for hacking.
Ø 44
Section 67
Punishment:
Offences are punishable with
imprisonment up to 3 yrs. And / or fine
up to Rs. 2 lakh
46
Section 69
47
Some other Sections…
Section 72: “Violation of the privacy policy”---Fine
up to 5 lakh, jail not extending 2 yrs.
48
Conclusions