cyber terr 2
TRANSCRIPT
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 1/50
Cyber Terrorism
• September 11th2001
• The attacks on
World TradeCenter’s TwinTowers .
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 2/50
PAY ATTENTION, I’M ONLY DOING IT ONCE
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 3/50
YB! "#W
$#% &'!'(W)
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 4/50
Cyber "aw
Cyber law refers to all the legal andregulatory aspects of Internet and WorldWide Web.
Any activities in the cyber space which are
or may turn into a legal issue come within the purview of the cyber law.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 5/50
Cyber crime
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 6/50
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 7/50
“Cyber Attacks."
• “computer-supported crime”
• Any illegal behavior directed by means of electronicoperations that targets the security of computer
systems and the data processed by them.
CY! C#$! %
“ unla&ful acts &herein the computer is either a tool or
a target or both”.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 8/50
(T#"Y
Arrest of hackers whocompromised homepages of the press
including manufacturers...
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 9/50
SY*%Y+#,ST!#"(#
A suspect who hacked University
Hospital‘s medical data was
arrested.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 10/50
-&!#
Member of International Hacker Clan!H" and part of the U.# army in $orea
arrested.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 11/50
(ndia contd..
• alwares/ # "oomin threat toobile hones withot anti 3irs
so4tware.• (ntrodction o4 a bill that amends
the e5istin laws o4 The re3entiono4 oney "anderin #ct 2002.
• School 6olidays spell an (ncrease inWeb 6ackin as smart kids take tocrime.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 12/50
INDIA
phasis B7"+ ne 8 Secritybreach
Citibank’s Cstomers in the ,S 4ondthat their acconts were tampered withand a sm totalin to ,S9 :;0+000 wastrans4erred to Bank acconts in andarond ne by a 4ew o4 the 4irm’semployees.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 13/50
Types o4 cyber
crime<• Sale o4 illeal articles.
• (ntellectal ropertycrimes.
• Cyber *e4amation.
• Cyber stalkin.
• *ata diddlin.
• =mail related crimes.
• *enial o4 Ser3ice attack.
• 'irs > Worm attacks.
• "oic bombs.• Tro?an attacks.
• The4t o4 comptersystem.
• 7inancial crimes.
• Cyber pornoraphy.• 6ackin.
• iracy.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 14/50
Sale of illegal articles
'ale of narcotics( &eapons and )rotected * !ndangered+ildlife etc
edim/
• &ebsites( auction &ebsites( and bulletin boards
or by email communication.
- A website selling cocaine in the name of
‘'honey’ is being prosecuted in Thailand.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 15/50
Intellectual Property crimes
• 'oft&are piracy(
• Copyright
infringement(
• ,rademarks violations(
• ,heft of computersource code etc.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 16/50
yber !efamation
• efamation taking place &ith the help of computers
and * or the #nternet.
5/ blishin o4 de4amatory matter about
someone on a &ebsite or sending e-mails containing
defamatory information to people..
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 17/50
yber stal"ing• stalking - "pursuing stealthily".
#nvolves• /ollo&ing a person0s movements across the #nternet by
posting messages 1sometimes threatening2 on the bulletinboards fre3uented by the victim.
• !ntering the chat-rooms fre3uented by the victim.• Constantly bombarding the victim &ith emails etc.
- #ollywood actress #alle $erry was
until recently being cyber stal"ed.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 18/50
Data diddling
• A kind of an attack which involves altering raw data
just before it is processed by a computer and then
changing it back after the processing is completed.ex: The Electricity Board in India have been a victim to data
diddling programs inserted when private parties were computerizingtheir systems.
- merican wireless company T !T su"ered
a blow o# thousands o# $$ due data diddling.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 19/50
=mail related crimes
mail bombin/
sendin lare nmber o4 emails to a person
or company or an email ser3ice pro3iderresltin in the email accont or mail ser3ercrash.
mail spoo4in /• Sendin malicios codes throh email.
• Sendin threatenin emails
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 20/50
*enial o4 Ser3ice attack/
7loodin a web ser3er with morere@ests than it can handle+ and
crashin it. This denies athoriAedsers the ser3ice o44ered by theresorce.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 21/50
'irs > wormattacks/
'irses/
#44ect the data on a compter+ either byalterin or deletin it.
Worms/
erely make 4nctional copies o4themsel3es and do this repeatedly tillthey eat p all the a3ailable space on acompters memory.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 22/50
• "oic bombs
3ent dependent prorams i.e. these proramsare created to do somethin only when acertain e3ent occrs.
• Tro?an attacks
,nathoriAed proram which 4nctions 4rom
inside like an athoriAed proram+ therebyconcealin its actions.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 23/50
• The4t o4 compter system
Casin physical damae to a compter or
its peripherals.
• 7inancial crimes
This incldes cheatin+ credit card 4rads.
.. #lphonso manoes Case
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 24/50
Cyber pornoraphy/• #ir 7orce Balbharati School case
• Swiss cople 4ilmin slm children+ inmbai
Salami attacks
,sed 4or 4inancial crimes. The key here is tomake the alteration so insini4icant that in asinle case it wold o completely nnoticed.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 25/50
We both tried to hack the same bankaccont+*deD
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 26/50
6acki
n
“nauthori!ed access" to computer
systems or net&orks( means any person&ho secures access or attempts to secure
access to a protected system.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 27/50
6ackin<
• 6acker / # hacker is someone who breaks intocompters sometimes to read pri3ate e=mails andother 4iles.
• 6ackers delete or alter 4iles.
• 6ackers (n?re &ther Compter ,sers by destroyin
(n4ormation Systems.• 6ackers steal telephone and compter time and
share nathoriAed access codes and passwords.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 28/50
Think be4ore yo hack/
• 6ackin is an o44ence nder section FF o4the (T #ct. 6ackin attracts seriospenalties which inclde a ?ail term o4 :years+ a 4ine o4 !s. 2 "akh or both.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 29/50
%&I'E T(T ))E%T* &E+,E,+ED %*T* &E+ /B*.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 30/50
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 31/50
Did u 0now 1
% More than $12,000,000,000 is lost due to piracy each year.
% 40% of all software used is pirated.
% In the .!. alone, one out of four pieces of software is pirated.
% !oftware theft ro"s the .!. econo#y of #ore than11,000 o"s, $&.' "illion in wa(es and #ore than$1.& "illion in ta) re*enue each year.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 32/50
The (ndian
scenario..
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 33/50
There is a lot at stake..
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 34/50
Cyber 4rad<.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 35/50
• Credit card fraud.• 4ictims include Citibank( American ank( 5nion ank( Askari
ank( the $uslim Commercial ank.• /orgery.• istance selling• 6nline auction frauds• “)hishing”( a form of deceit &here cyber-criminals build e7act
copies of &eb sites from kno&n and trusted companies.
%& American $an" of Te(as ).Awww.abtexasna.com
and www.abtexasna.net
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 36/50
enaltiesand #d?dications
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 37/50
enalty 4or
damae tocompter+compter system+etc. $Sec G:)
• #ccessin orsecrin access
• *ownload copy ore5tract data
• (ntrodcescomptercontaminant
Compensation/
The person who is
4o2nd 02ilty o4
contra3enin0 this
section is liable topay dama0es by
way o4
compensation not
e5ceedin0 one
crore r2pees to the
person a44ected.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 38/50
enalty 4or 4ailre to4rnish in4ormation+
retrn+ etc. $Sec GG) • 7ailin to 4rnish any
docment or reportor retrn to thecontrollinathorities
• 7rnish or 4ile anyin4ormation withinthe speci4ied time
• aintain books o4acconts or records
Compensation/
1ay penalty 2p toone lakh and 4i4ty
tho2sand r2pees 4or
each s2ch 4ail2re.
"iable to a penalty
not e5ceedin0 4i3e
tho2sand r2pees 4or
e3eryday d2rin0
which s2ch 4ail2re
contin2es
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 39/50
!esidary penalty
$Sec G;)
• Whoe3ercontra3enes anyrles or relationsmade nder this#ct+ 4or the
contra3ention.
Compensation
1enalty o4 an
amo2nt not
e5ceedin0
twenty=4i3e
tho2sand r2pees.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 40/50
&W! T& #*H,*(C#T$Sec
GF)
• #ppointed by the central Io3ernment.
• To hold an en@iry as per the mannerprescribed by the Central Io3ernment.
• #ll proceedins be4ore it shall be deemed
to be ?dicial proceedins.
• *eemed to be a Ci3il Cort.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 41/50
7actors to be taken intoaccont by the ad?dicatin
o44icer..$Sec GJ)
The @antm o4 compensation is decided withreard to..
• The amont o4 ain o4 n4air ad3antae+where3er @anti4iable+ made as a reslt o4 thede4alt.
• The amont o4 loss cased to any person as areslt o4 the de4alt.
• The repetiti3e natre o4 the de4alt.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 42/50
Cyber olice
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 43/50
7#CTS<
• (ndia’s 4irst e5clsi3e cyber crimes policestation.
• # Cyber Crime Cell was started at Corps o4*etecti3es = 6ead Karters+ Banalore todeal with Cyber Crime with Io3ernment%oti4ication in 1LLL.
• The Cyber Crime Cell was declared as CyberCrime olice Station in 2001 as perIo3ernment %oti4ication.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 44/50
CYB! &"(C = (%*(#
Cyber Crime olice Stationhas reistered only :M cases4rom September 2001 to%o3ember 200G.!eistered crimes inclde/• Tamperin o4 sorce code$:)• 6ackin $2:)• &bscene e=mails $10)• Copy !iht #ct 1L;J $2)
ost o4 the complaints are4rom Banalore.
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 45/50
!e4erenceswww.cybercrime.planetindia.com
•
www.Glaw.co.il
•
www.bookdi00er.com
• www.crimeresearch.or0
•
www.cyber02ard.or0
•
lectronic crimes in the news.com
• T7 WBS(T
• www.4bi.0o3
• news.bbc.co.2k
• 1layitc2bersa4e.com
• www.cyberpoliceban0alore.nic.in
• www.deccanherald.com
• www.wipo.int
• www. cyberlawindia.com
• ana0ement (n4ormation Systems 8Hames # &’Brien
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 46/50
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 47/50
T6#%- Y&,
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 48/50
Cyber "aw and (S
6eihtened concerns abot cyberterrorism and the increasin need to openinternal networks to otside access are
pshin corporations to bolster networkand data center secrity
• *e4endin aainst 6acker attacks and
'irs #ttacks.• T' %etworks=n4orcer
• 7irst CitiAens Banks=ntercept
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 49/50
• (ntellectal roperty !ihts.
• roportionality o4 Iood and Bad.
• (n4ormed Consent o4 those those a44ected.• inimiAed !isk and nsred Hstice.
• mployee !esponsibility.
• Cost sa3in=manpower and time.
• lectronic 4ilin o4 records and the retention o4
in4ormation in electronic 4ormat+ will help insa3in costs+ time and manpower 4or theCorporate.
Cyber #aws and $I%
8/21/2019 Cyber Terr 2
http://slidepdf.com/reader/full/cyber-terr-2 50/50
&!..
• Cstomer ri3acy and mployee
ri3acy.
• Spplementin traditional network
protection with newer intrsionmonitors+access control tools andtoher (T sae policies