presentation1
TRANSCRIPT
INFORMATION TECHNOLOGY ACTS SEMINAR
Submitted To: Submitted by:Mrs. Mamta Sakpal Shivangi Sharma
Contents Introduction History of cyber crime Categories of cyber crime Types of cyber crime Cyber laws Birth of Cyber laws IT Act 2000 Case Study
Introduction Computer crime or cyber crime, the use
of a computer as an instrument to further illegal ends, such as committing fraud , stealing identities, or violating privacy.
Computer crime, or cybercrime, is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
History of Cyber Crime The first recorded cyber crime took place in
1820. This is not surprising considering the fact
that the abacus , which is the earliest form of a computer has been around since 3500 B.C.
The first spam mail took place in 1976,when it was sent out over ARPANET.
The first virus was installed on an Apple Computer in 1982.
Categories of cyber crime The computer as a target-
using a computer to attack other computer . E.g. Hacking ,virus /worm attack , Dos attack etc.
The computer as a weapon-using a computer to commit real world crime e.g. cyber terrorism , credit card fraud and pornography.
Types of cyber crime HACKING :- Hacking in simple terms
means an illegal intrusion of information from a computer system and/or network .
TELECOMMUNICATIONS PIRACY:-Digital technology permits perfect reproduction and easy dissemination of print, graphics, sound, and multimedia combinations. The temptation to reproduce copyrighted material for personal use, for sale at a lower price, for free distribution.
DENIAL OF SERVICE ATTACKS : This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide.
VIRUS DISSMINITION : Malicious software that attaches itself to other software. Virus , Worms, Trojan horse etc.
COMPUTER VANDALISM : Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.
CYBER TERRORISM : Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails etc.
Cyber laws Cyber law is a system of law and
regulation for the cyber space. It is a generic term which refers to all the legal and regulatory aspects of internet and the world wide web.
Cyber law is important because it touches almost all aspects of transactions and activities concerning the Internet, the World Wide Web and Cyberspace.
Birth of Cyber law The United Nations General Assembly
have adopted the Model Law on Electronic Commerce on 30th January 1997.
India passed the Information Technology Act, 2000 on 17th October, 2000.
Amended on 27th October 2009. Amended Act is known as - The Information Technology (amendment) Act, 2008.
The IT Act 2000
Objectives To provide legal recognition for
transactions carried out by means of electronic data interchange
To facilitate electronic filing of documents with the Government agencies
Cybercrime provisions under IT Act,2000 Sec.65: Tampering with Computer source
documents Sec.66 : Hacking with Computer systems,
Data alteration Sec.67 : Publishing obscene information Sec.70 : Un-authorized access to protected
system Sec.72 : Breach of Confidentiality and
Privacy Sec.73 : Publishing false digital signature
certificates
Case study
ONLINE CREDIT CARD FRAUD ON E-bay
Bhubaneswar: Rourkela police busted a racket involving an online fraud worth Rs 12.5 lakh. The modus operandi of the accused was to hack into the eBay India website and make purchases in the names of credit cardholders.
Two persons, including alleged mastermind Debasis Pandit, a BCA student, were arrested and forwarded to the court of the subdivisional judicial magistrate, Rourkela. The other arrested person is Rabi Narayan Sahu.
Superintendent of police D.S. Kutty said the a case has been registered against the accused under Sections 420 and 34 of the Indian Penal Code and Section 66 of the IT Act and further investigation is on, he said.
Pandit allegedly hacked into the eBay India site and gathered the details of around 700 credit cardholders. He then made purchases by using their passwords.
The fraud came to the notice of eBay officials when it was detected that several purchases were made from Rourkela while the customers were based in cities such as Bangalore, Baroda and Jaipur and even London, said V. Naini, deputy manager of eBay.
The company brought the matter to the notice of Rourkela police after some customers lodged complaints.
Pandit used the address of Sahu for delivery of the purchased goods, said police.
The gang was involved in train, flight and hotel reservations.
The hand of one Satya Samal, recently arrested in Bangalore, is suspected in the crime. Samal had booked a room in a Bangalore hotel for three months. The hotel and transport bills rose to Rs 5 lakh, which he did not pay.
Samal was arrested for non-payment of bills, following which Pandit rushed to Bangalore and stood guarantor for his release on bail, police sources said.
Thank You!!