cyber crime and cyber laws

Click here to load reader

Upload: ishmecse13

Post on 02-Jun-2015

510 views

Category:

Engineering


0 download

DESCRIPTION

Cyber crime and cyber laws

TRANSCRIPT

  • 1. Prepared by Mehta Ishani 2nd M.E.(C.S.E) 130040701003 Cyber Crime and Cyber Laws

2. Introduction Internet two sides of a coin Computer vulnerabilities 3. Cyber crime refers to all the activities done with criminal intent in cyberspace or using the medium of Internet. 4. Types of Cyber crimes Credit card frauds Sale of illegal articles-narcotics, weapons, wildlife Online gambling Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code Email spoofing Forgery Phishing Cyber terrorism 5. TYPES OF CYBER ATTACK BY PERCENTAGE Financial fraud: 11% Sabotage of data/networks: 17% Theft of proprietary information: 20% System penetration from the outside: 25% Denial of service: 27% Unauthorized access by insiders: 71% Employee abuse of internet privileges 79% Viruses 85% 6. INFORMATION TECHNOLOGY ACT, 2000 & CYBERCRIME Various cyber offences defined Cyber offences to be investigated only by a Police Officer not below the rank of the Deputy Superintendent of Police who have been duly authorized and who have also been given the power of entry, search and arrest without warrant in public places.. 7. CYBER OFFENCES UNDER THE IT ACT Tampering with computer source documents Section 65 Hacking - Section 66 Publishing of information which is obscene in electronic form - Section 67 8. SECTION 65 Tampering with computer source documents Knowingly or intentionally concealing, destroying or altering or intentionally or knowingly causing another to conceal, destroy or alter any computer source code used for computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force 9. PUNISHMENT FOR TAMPERING COMPUTER SOURCE DOCUMENTS Imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both. 10. SECTION 66 Hacking with computer system Occurs when there is intent to cause or knowledge that one is likely to cause wrongful loss or damage to the public or any person by destroying or deleting or altering any information residing in a computer resource or diminishing its value or utility or affecting it injuriously by any means 11. PUNISHMENT FOR HACKING Imprisonment up to three years, or with fine which may extend upto two lakh rupees, or with both. 12. SECTION 67 Publishing of information which is obscene in electronic form Publishing or transmitting or causing to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it 13. PUNISHMENT FOR PUBLISHING OBSCENE INFORMATION IN ELECTRONIC FORM On first conviction - imprisonment of either description for a term which may extend to five years and with fine which may extend to one lakh rupees Second or subsequent conviction - imprisonment of either description for a term which may extend to ten years and also with fine which may extend to two lakh rupees. 14. Challenges faced by Law Enforcement Awareness: Technical Issues: Software and Hardware Issues: Information sharing: Inadequate Training and Funds: Global Issues: Wireless or Wi-Fi, Bluetooth, Infrared Issues: 15. PREVENTION Disable and log off a specific user account to prevent access. Disable and log off a group of user accounts which access a particular service that is being attacked. Disable and dismount specific (network) devices, for instance disk devices that are being swamped. Disable specific applications, for example, an e-mail system subjected to a SPAM attack. Close down an entire system, and divert processing to an alternative or backup service on a secondary network. 16. SAFETY TIPS FOR CYBER CRIME Use antivirus softwares. Insert firewalls. Uninstall unnecessary software Maintain backup. Check security settings. Stay anonymous - choose a genderless screen name. Never give your full name or address to strangers. Learn more about Internet privacy. 17. CONCLUSION Obviously computer crime is on the rise, but so is the awareness and ability to fight it. Law enforcement realizes that it is happening more often than it is reported and are doing there best to improve existing laws and create new laws as appropriate. The problem is not with the awareness or the laws, but with actually reporting that a crime has occurred. Hopefully people will begin to realize that unless they report these crimes and get convictions, those committing computer crimes will continue to do so.