group 8 ppt
Post on 09-Apr-2018
218 Views
Preview:
TRANSCRIPT
-
8/8/2019 group 8 PPT
1/44
Need for Cyber Law:
Commercial Disputes to
Cyber Crime
Group No.8
R.Anand
Prithvi S.R.Vardhan
S.P.Singh
-
8/8/2019 group 8 PPT
2/44
AIM& OBJECTIVE Highlight the emerging security issues and threats in the cyberspace.
The legal and constitutional issues and stakes involved.
Issues related to E-Commerce
Conflict of laws in Commercial Disputes
The concerns on privacy, personal liberties and freedoms.
Identify the possible areas of conflict and operational problems.
To suggest methods of secure use of cyber space to avoid commercial disputes.
-
8/8/2019 group 8 PPT
3/44
The what of computer/ cyber crime
The phrase computer crime or computer misuse
has a precise definition and tends to cover a multitude
of computer related offences ranging fromunauthorised access to computer and computer stored
material, causing damage to computer held
information trafficking in passwords and hacking,
manufacturing and selling pirated copies of softwareand transmission of objectionable material.
-
8/8/2019 group 8 PPT
4/44
Getting computer crime
Use of computer-: computer crime involves the use of
a computer as a primary instrument to facilitate thecrime and the target thereof.
Offences against the secrecy and integrity of data and
information systems:- access, without right to a
computer system is a criminal offense i.e.unauthorized access
-
8/8/2019 group 8 PPT
5/44
Contd.
Act to modify, delete or damage data or to restrict access to
data without right.
Unauthorized transfer of data from a computer system.
Act to interrupt seriously, without law, a software system
through the introduction, transmission, modification, deletion
or damage to data or by restricting access to such data..
-
8/8/2019 group 8 PPT
6/44
Contd.
Act of production, sale, import, distribute or make available under
any form, without right of a device or software designed.
Without right of a password, access code or other such computer
data allowing total or partial access to a computer system in purpose
of committing a crime.
Causing loss of property to a person by the introduction,modification or deletion of computer data by an unauthorized
access.
-
8/8/2019 group 8 PPT
7/44
REASONS FORCYBER CRIME
-
8/8/2019 group 8 PPT
8/44
Capacity to store data
storing data in a very small space
Storing data in a very small space
To remove or derive information either through
physical or virtual medium makes it much more
easier
Easy to carry and transfer of data.
-
8/8/2019 group 8 PPT
9/44
Easy to access-
Every possibility of breach isn't due to human
error, but due to the complex technology.
logic bomb, key loggers that can steal access
codes, advanced voice recorders; retina
imagers etc. that can fool biometric systems
and bypass firewalls.
-
8/8/2019 group 8 PPT
10/44
Complex-
The computers work on operating systems and
these operating systems in turn are composed
of millions of codes.
The cyber criminals take advantage of these
lacunas and penetrate into the computer
system.
-
8/8/2019 group 8 PPT
11/44
Negligence-
Negligence provides a cyber criminal to gainaccess and control over the computer system.
Not providing proper security measures.
Open and public use of systems.
-
8/8/2019 group 8 PPT
12/44
Loss of evidence-
Person cant be traced.
Territorial restrictions
Jurisdiction irregularities
Statutory incapability.
-
8/8/2019 group 8 PPT
13/44
CYBERCRIMINALS
-
8/8/2019 group 8 PPT
14/44
Professionalhackers / crackers
Motivated by the colour of money.
Employed to hack the site of the rivals and get
credible, reliable and valuable information.
Employed to crack the system of the employer
basically as a measure to make it safer bydetecting the loopholes
-
8/8/2019 group 8 PPT
15/44
Discontented
employees-
People who have been either kicked out bytheir employer or are dissatisfied with their
employer.
To take revenge they normally hack thesystem of their employee.
-
8/8/2019 group 8 PPT
16/44
Childrenand youngsters between
the agegroup of 6 18 years
Children is seen mostly due to the curiosity to
know and explore the things.
Prove themselves to be outstanding amongst
other children in their group.
The psychological reasons.
-
8/8/2019 group 8 PPT
17/44
Organised hackers-
Organised together to fulfil certain objective
political biasfundamentalism
The Pakistanis are said to be one of the best
quality hackers in the world. They mainlytarget the Indian government sites with the
purpose to fulfil their political objectives.
-
8/8/2019 group 8 PPT
18/44
Analysis of cyber crime This phenomenal growth of internet has provided new outlook for computer crimes,
precisely internet crimes.
It has survey of 643 computer security practitioner in the worlds largest internet
using country (USA) . 70% reported a variety of serious computer security breaches other than the most
common ones of computer viruses, laptop theft or employee not abused.
74% acknowledged financial losses due to computer breaches
42% admitted to have suffered loss amounting $265, 589, 940
Average total loss over the last three years was $120, 240, 180. 20 companies admitting to have suffered a loss exceeding $1 million as a result of
computer breakings and $2.8 billion against software piracy.
-
8/8/2019 group 8 PPT
19/44
First step to cybercrime resultingcommercial dispute
The first recorded cyber crime took place in the year 1820!
In 1820, Joseph-Marie Jacquard, a textile manufacturer in France,produced the loom. This device allowed the repetition of a series of
steps in the weaving of special fabrics. This resulted in a fear amongst
Jacquard's employees that their traditional employment and livelihood
were being threatened. They committed acts of disruption to
discourage Jacquard from further use of the new technology. This is
the first recorded cyber crime which further started a series of cybercommercial crimes.
-
8/8/2019 group 8 PPT
20/44
MODE ANDMANNER
OF COMMITING
CYBER CRIME
-
8/8/2019 group 8 PPT
21/44
(1) Phishing
Look alike of original website/e-mail;
Targeted over Financial Institutions &Banks; Divulge Financial Information;
Divulge Personal Info. (Ex:Password,etc.)
Copying of logos and other information fromoriginal website.
-
8/8/2019 group 8 PPT
22/44
(A)Risks Impounded
By being truly responsive, you loose your
money;
New Credit card/BankA/c could be opened;
Risk exposing your computer data by clicking
on the link.
-
8/8/2019 group 8 PPT
23/44
(2)Malicious Codes Contain Codes that disrupts Data
That need Host Program
(A) Trap Doors(B)Logic Bombs
(c)Trojan Horses
(D) Virus
That are independent
(A) Worms
(B) Zombie
-
8/8/2019 group 8 PPT
24/44
(A) Trap Doors
Secret Entry Point No SecurityAccess Procedure
Used to debug or test run program
-
8/8/2019 group 8 PPT
25/44
(B) Logic Bombs
Works on specified conditions
Predefined events should occur Sends a note to attacker when victim is online
The attacker then triggers the bomb.
-
8/8/2019 group 8 PPT
26/44
(C) TrojanHorse
Contains Hidden Codes Destructs Files
Creates Trap Doors in login programmed.
-
8/8/2019 group 8 PPT
27/44
(D)Virus
Replicates Modifies other programes
Leaves a copy in each program
Thus creates Trojan
-
8/8/2019 group 8 PPT
28/44
(A) Zombie
This is installed on Third Party PC; Works over Internet attached PCs;
Uses Third Party PC to instigate attacks on
other secure networks, so as to be difficult to
trace.
-
8/8/2019 group 8 PPT
29/44
(B) Worms
-
8/8/2019 group 8 PPT
30/44
Denial of Service Attacks Origin of Denial of Service Attack (DOS)
Operation of DOS
Exemplification of DOS Attack. Concepts and Logical Weaknesses
Definition
Internals of Concepts and Logical Weaknesses
Function of SQL as an Internal
Hash function as another agent of DOS
-
8/8/2019 group 8 PPT
31/44
Identity Theft Pattern of Identity theft
Perpetuation of ID Theft
ID Theft Victims
Recourse available in cases of ID Theft
Recording of action
Contacting police
Contacting Security Department of the Credit Card Company
Informing Bank Investigation Of ID Theft and Construction of Evidence
-
8/8/2019 group 8 PPT
32/44
Advance Fee Fraud
Repercussions of Advance Free Fraud. Modus Operandi
-
8/8/2019 group 8 PPT
33/44
Cyber Crime &
E-Commerce
-
8/8/2019 group 8 PPT
34/44
The What Web- Shopping;
Bond Transactions; Online Stock;
Buying and Downloading Software;
Commercial Transactions;
-
8/8/2019 group 8 PPT
35/44
Types of E-Commerce
Business-to-Business (B2B);
Business-t-Consumer (B2C);
Consumer-to-Consumer (C2C);
Paypal, Ibill, Moneybookers, WaxDigital,etc.,
-
8/8/2019 group 8 PPT
36/44
Projections B2B Asia-Pacific > Over $5 Trillion;
173 Million Internet users; Indian IT Sector grew at 30% threw the
decade >> NASSCOM;
Rs. 450 Crore E-Commerce Transaction inIndia in 1999-2000.
-
8/8/2019 group 8 PPT
37/44
Vehicles
World Wide Web; Telephone;
E-mail;
Fax;
-
8/8/2019 group 8 PPT
38/44
Benefits
Cuts Cost; Saves time;
Variety of products;
Vast reach.
-
8/8/2019 group 8 PPT
39/44
ProminentCyberCommercial Disputes
1. Beijing Oylmpics Internet Ticket Scam.2. Global Pension Trust Insurance Dispute.
3. E-Ticket Cyber Dispute
4. Google Cyber Attacks and subsequentwithdrawal calls.
-
8/8/2019 group 8 PPT
40/44
Recognition and Enforcement
A. Conflict of Laws
B. Jurisdiction
-
8/8/2019 group 8 PPT
41/44
(A) Conflict of Laws Lex Loci Deciti;
Most Significant Relationship Test:
I. Needs of International System;II. Relevant policies of both the nations;
III. Justified expectations of parties;
IV. Ease of Administration;
Article 4 Rome Convention.
-
8/8/2019 group 8 PPT
42/44
(B) Jurisdiction Article 5 Rome Convention (place of
performance of obligation).
-
8/8/2019 group 8 PPT
43/44
Suggestions and Conslusion
Awareness and Training ;
Skilled Investigators;
Trained Judges;
Efficient Enforcement;
Updated Information.
-
8/8/2019 group 8 PPT
44/44
Thank You
For your patient attentiveness
top related