cybercrimelaw
DESCRIPTION
hi, friends the ppt is about indian cyber laws..TRANSCRIPT
Submitted By – Mihir Roat
Cyber Crime : An Indian Perspective
Introduction to Cyber crime
• Computer Crime, Hi-Tech Crime or Electronic Crime is where a computer is the target of a crime or is the means adopted to commit a crime.
• Criminals undertake different ways to commit criminal activities such as fraud, theft, blackmail and forgery using the new medium, Internet.
Types of Cyber crimes Credit card frauds
Cyber pornography
Sale of illegal articles-narcotics, weapons,
wildlife
Intellectual Property crimes- software
piracy, copyright violation, trademarks
violations, theft of computer source code
Phishing
Forgery
Cyber terrorism
Crime
against
property
Crime
against
Governme
nt
Crime
against
people
Cyber Law
• The term ‘Cyber Law’ would mean law relating to the computer and computer network
• Cyber law Sections 22 25 29 30 31 32 44 45 43 65 66 67 68 69 70 71 72 502A 419A 417A
Cr.P.C:Criminal
procedure courtI.P.C Indian Penal Code
I.T Act 2000
Laws
Cyber Law Enforcement
Section 66: Hacking• Destruction, deletion, alteration, diminishing value or utility
or injuriously affecting information residing in a computer resource
• Punishment
Imprisonment up to three years, and fine up to Rs.2 lakh
Section 70: Protected System– Securing unauthorised access or attempting to secure
unauthorised access to protected system– Punishment
Imprisonment up to 10 years and fine
Sec. 67. Pornography
– Publishing or transmitting or causing to be published in the electronic form, Obscene material
• Punishment– On first conviction
• imprisonment of either description up to five years and fine up to Rs. 1 lakh
– On subsequent conviction • imprisonment of either description up to ten years and fine
up to Rs. 2 lakh
• Arms Act• Online sale of Arms
• Sec. 383 IPC• Web• -• Jacking
• NDPS Act• Online sale of Drugs
• Sec 416, 417, 463 IPC• Email spoofing
• Sec 420 IPC• Bogus websites, cyber frauds
• Sec 463, 470, 471 IPC• Forgery of electronic records
• Sec 499, 500 IPC• Sending offensive messages by email
• Sec 503 IPC • Sending threatening messages by email
Cyber Engineers
• Kevin Mitnick – Probably the most famous hacker of his generation,
Mitnick has been described by the US Department of Justice as "the most wanted computer criminal in United States history.“
– After a highly publicised pursuit by the FBI, Mitnick was arrested in 1995 and after confessing to several charges as part of a plea-bargain agreement, he served a five year prison sentence. He was released on parole in 2000 and today runs a computer security consultancy
Cyber Engineers
• Adrian Lamo – Adrian Lamo was named 'the homeless hacker' for his
penchant for using coffee shops, libraries and internet cafés as his bases for hacking
– Most of his illicit activities involved breaking into computer networks and then reporting on their vulnerabilities to the companies that owned them
– Lamo's biggest claim to fame came when he broke into the intranet of the New York Times and added his name to their database of experts
– Lamo currently works as a journalist in new york times
Cyber Engineers
• Stephen Wozniak
– Famous for being the co-founder of Apple, Stephen "Woz" Wozniak began his 'white-hat' hacking career with 'phone phreaking' – slang for bypassing the phone system. While studying at the University of California he made devices for his friends called 'blue boxes' that allowed them to make free long distance phone calls
Cyber Engineers
• Pranav Mistry
– The famed 6th sense developer,Pranav Mistry is a research assistant and a PhD candidate at MIT Media Lab. SixthSense has recently attracted global attention
Cyber Engineers
• Ankit Fadia • He started a website called HackingTruths. At the
age of 15, his book on ethical hacking made him the youngest author to be published by Macmillan\
• he developed a certification program on computer security for corporations in alliance with Reliance Info. He was one of eight people named MTV India's Youth Icon of the Year for the year 2008
Cyber Engineers communities
Protect your Computers!
• Use anti-virus software and firewalls• Don’t share access to your computers with
strangers• Disconnect from t he Internet when not in use• Don’t open emails or attachments from unknown
sources• Back-up your computer data on disks or CDs often• Use hard-to-guess passwords. Don’tuse words
found in a dictionary
Information sources
• www.hacktree.in• http://www.telegraph.co.uk/technology/
6670127/Top-10-most-famous-hackers.html• http://www.amarjit.info/2011/04/real-
hackers-of-india-indian-hackers.html
The Glider A Universal Hacker Emblem