presentation1

19
INFORMATION TECHNOLOGY ACTS SEMINAR Submitted To: Submitted by: Mrs. Mamta Sakpal Shivangi Sharma

Upload: shivangi-sharma

Post on 18-Jan-2017

119 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Presentation1

INFORMATION TECHNOLOGY ACTS SEMINAR

Submitted To: Submitted by:Mrs. Mamta Sakpal Shivangi Sharma

Page 2: Presentation1

Contents Introduction History of cyber crime Categories of cyber crime Types of cyber crime Cyber laws Birth of Cyber laws IT Act 2000 Case Study

Page 3: Presentation1

Introduction Computer crime or cyber crime,  the use

of a computer as an instrument to further illegal ends, such as committing fraud , stealing identities, or violating privacy. 

Computer crime, or cybercrime, is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.

Page 4: Presentation1

History of Cyber Crime The first recorded cyber crime took place in

1820. This is not surprising considering the fact

that the abacus , which is the earliest form of a computer has been around since 3500 B.C.

The first spam mail took place in 1976,when it was sent out over ARPANET.

The first virus was installed on an Apple Computer in 1982.

Page 5: Presentation1

Categories of cyber crime The computer as a target-

using a computer to attack other computer . E.g. Hacking ,virus /worm attack , Dos attack etc.

The computer as a weapon-using a computer to commit real world crime e.g. cyber terrorism , credit card fraud and pornography.

Page 6: Presentation1

Types of cyber crime HACKING :- Hacking in simple terms

means an illegal intrusion of information from a computer system and/or network .

TELECOMMUNICATIONS PIRACY:-Digital technology permits perfect reproduction and easy dissemination of print, graphics, sound, and multimedia combinations. The temptation to reproduce copyrighted material for personal use, for sale at a lower price, for free distribution.

Page 7: Presentation1

DENIAL OF SERVICE ATTACKS : This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide.

VIRUS DISSMINITION : Malicious software that attaches itself to other software. Virus , Worms, Trojan horse etc.

Page 8: Presentation1

COMPUTER VANDALISM : Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.

CYBER TERRORISM : Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails etc.

Page 9: Presentation1

Cyber laws Cyber law is a system of law and

regulation for the cyber space. It is a generic term which refers to all the legal and regulatory aspects of internet and the world wide web.

Cyber law is important because it touches almost all aspects of transactions and activities concerning the Internet, the World Wide Web and Cyberspace.

Page 10: Presentation1

Birth of Cyber law The United Nations General Assembly

have adopted the Model Law on Electronic Commerce on 30th January 1997.

India passed the Information Technology Act, 2000 on 17th October, 2000.

Amended on 27th October 2009. Amended Act is known as - The Information Technology (amendment) Act, 2008.

Page 11: Presentation1

The IT Act 2000

Page 12: Presentation1

Objectives To provide legal recognition for

transactions carried out by means of electronic data interchange

To facilitate electronic filing of documents with the Government agencies

Page 13: Presentation1

Cybercrime provisions under IT Act,2000 Sec.65: Tampering with Computer source

documents Sec.66 : Hacking with Computer systems,

Data alteration Sec.67 : Publishing obscene information Sec.70 : Un-authorized access to protected

system Sec.72 : Breach of Confidentiality and

Privacy Sec.73 : Publishing false digital signature

certificates

Page 14: Presentation1

Case study

Page 15: Presentation1

ONLINE CREDIT CARD FRAUD ON E-bay

Bhubaneswar: Rourkela police busted a racket involving an online fraud worth Rs 12.5 lakh. The modus operandi of the accused was to hack into the eBay India website and make purchases in the names of credit cardholders.

Two persons, including alleged mastermind Debasis Pandit, a BCA student, were arrested and forwarded to the court of the subdivisional judicial magistrate, Rourkela. The other arrested person is Rabi Narayan Sahu.

Page 16: Presentation1

Superintendent of police D.S. Kutty said the a case has been registered against the accused under Sections 420 and 34 of the Indian Penal Code and Section 66 of the IT Act and further investigation is on, he said.

Pandit allegedly hacked into the eBay India site and gathered the details of around 700 credit cardholders. He then made purchases by using their passwords.

Page 17: Presentation1

The fraud came to the notice of eBay officials when it was detected that several purchases were made from Rourkela while the customers were based in cities such as Bangalore, Baroda and Jaipur and even London, said V. Naini, deputy manager of eBay.

The company brought the matter to the notice of Rourkela police after some customers lodged complaints.

Pandit used the address of Sahu for delivery of the purchased goods, said police.

The gang was involved in train, flight and hotel reservations. 

Page 18: Presentation1

The hand of one Satya Samal, recently arrested in Bangalore, is suspected in the crime. Samal had booked a room in a Bangalore hotel for three months. The hotel and transport bills rose to Rs 5 lakh, which he did not pay. 

Samal was arrested for non-payment of bills, following which Pandit rushed to Bangalore and stood guarantor for his release on bail, police sources said.

Page 19: Presentation1

Thank You!!