A Study of Cyber Crime and The IT ACT in India Suhas Ambade Contact : ambadesuhas@yahoo.co.in
Success in any field of human activity leads to crime that needs mechanisms to control it.  The law is as stringent as its enforcement. Crime is no longer limited to space, time or a group of people. In 1990 less than 100000 people log on to the internet worldwide. Now around 500 million people are hooked up to surf the net around the globe. Until recently due to lack of awareness of cyber crime phenomenon, old laws did not quite fit the crimes being committed.
The information technology act 2000 OBJECTIVE The main objective of ITA 2000 was to accord legal recognition to secure electronic records and secure digital signature. The ITA2000 provides authentication of electronic contract by means afixing digital signature. To provide legal recognition to electronic commerce to avoid paper based method of communication and storage of information. LEAGAL PROVISIONS The contract afixed with digital signature are valid and admissible as evidence in the court.
Some of the instances of Violation of Law Tampering with Computer Source Code and hacking Publishing of Obscene material Breach of Confidentiality and privacy …… .. Are punishable with imprisonment or fine or both. Legal action further includes confiscation of computer, related material and accessories. Network service provider not liable under ITA2000 subject to exceptions.
Why learn about CYBER CRIME ? Because – –  Everybody is using COMPUTERS.. –  From white collar criminals to terrorist organizations And from Teenagers to Adults –  Conventional crimes like Forgery, extortion, kidnapping etc. are being committed with the help of computers –  New generation is growing up with computers –  MOST IMPORTANT  - Monetary transactions are moving on to the INTERNET
WHAT IS COMPUTER CRIME? All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system. COMPUTER CRIME is any crime where – •  Computer is a target. •  Computer is a tool of crime •  Computer is incidental to crime
Profile of Cyber Criminal •  Unsatisfied employees. •  Teenagers. •  Political Hacktivist. •  Professional Hackers. •  Business Rival. •  Ex-Boy Friend /Ex-Girl Friend. •  Divorced Husband / Wife. etc
Types of Cyber Crime (This is not exhaustive list of cyber crime) •  HACKING  • DENIAL OF SERVICE ATTACK •  VIRUS  Attack  • SOFTWARE PIRACY •  PORNOGRAPHY  • IRC Crime •  CREDIT CARD FRAUD  • NET EXTORTION •  PHISHING  • SPOOFING •  CYBER DEFAMATION  • THREATENING
HACKING Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
DENIAL OF SERVICE ATTACK This is an act by the criminal, who floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or Provide.
VIRUS Attack •  Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious softwares)
SOFTWARE PIRACY •  Theft of software through the illegal copying of genuine programs or  the counterfeiting and distribution of products intended to pass for  the original. •  Retail revenue losses worldwide are ever increasing due to this  crime •  Can be done in various ways- End user copying, Hard disk loading, Counterfeiting, Illegal downloads  from the internet etc.
•  Pornography is the first consistently successful ecommerce  product. •  Deceptive marketing tactics and mouse trapping technologies Pornography encourage customers to access their websites. •  Anybody including children can log on to the internet and access websites with pornographic contents with a click of a mouse. •  Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient interest is an offence under the provisions of section 67 of I.T. Act -2000. STOP PORN PORNOGRAPHY
Spoofing •  Getting one computer on a  network to pretend to have  the identity of another  computer, usually one with  special access privileges, so  as to obtain access to the  other computers on the  network.
IRC CRIME Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other •  Criminals use it for meeting.  •  Hackers use it for discussing their exploits / sharing the techniques •  Use chat rooms to attract Sexually small children. •  Cyber Stalking - In order to harass a woman her telephone number is  given to others as if she wants to befriend males
CREDIT CARD FRAUD You simply have to type credit card number into www page of the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner
Is there an additional slot ? FALSE slot Fixed to the original card slot. (Same color and sticker ). Contains additional card reader to copy your card information ..and duplicate your card The micro camera at the side can view the KEYPAD and also the monitor to send wireless picture up to 200metres.
Copying the company’s confidential data in order to extort said company for huge amount.. NET EXTORTION
It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means PHISHING
Recent cases of Cyber crime
The  Tejas Ahauja  case Tejas Ahuja (22), an independent advisor dealing in shares, allegedly hacked into the demat account of Ali Hussain, a share trader. Tejas operated out of an Internet café. Ahuja then sold 10,800 shares belonging to Ali to as low as 5 paisa per share to himself and sells the same shares to Ali for Rs 57 each, causing him a huge loss. Using IP addresses of the transactions, the police trace and arrested Ahuja.
Ahmedabad Blast :  Haywood Five minutes before the blast,  an  e-mails sent to national TV channels warning about blasts in Ahmedabad. The e-mail is traced to Kenneth Haywood’s computer, who stayed at Gunina apartment in Navi Mumbai. Haywood claimed that his computer was hacked. A technician associated with VSNL had asked him not to change the password of his wireless Internet network. Haywood’s laptop and computer was then sent to the forensic science laboratory at Kalina.  Wi-fy system used to hack haywood’s account to send the mail.
Parliament Attack Case The Laptop seized from the gunned down terrorist contained several evidences of terrorist’s motives. The sticker of the Ministry of home that they had made on the laptop and pasted on their ambassador car to gain entry into the parliament house and the fake ID card that one of the two terrorists was carrying with the Government of India emblem and seal.
Remidial Actions The Net Accounts should be properly secured by a password. The Password should be frequently Changed. Never revel the password, pin numbers to others. Be cautious While operating ATM.
Thank You

More Related Content

PPTX
Cyber security
PPTX
What constitutes a cyber crime in the country
PPTX
Cyber crime in india
PPTX
Cyber crime and issues
PPTX
Rajveer choudhary cyber crime presentation
PDF
Cybercrime And Computer Misuse Cases
PPTX
Cyber Crime and laws in Pakistan
PPT
Cyber Crimes
Cyber security
What constitutes a cyber crime in the country
Cyber crime in india
Cyber crime and issues
Rajveer choudhary cyber crime presentation
Cybercrime And Computer Misuse Cases
Cyber Crime and laws in Pakistan
Cyber Crimes

What's hot (20)

PPTX
Cybercrime kunal gupta
PPT
Cyber Crime & Law
PDF
Cyber crime
PPTX
Hacking and Hacktivism
PPTX
Cyber crime
PDF
Cyber Security law in Bangladesh
DOCX
Cyber crime in pakistan by zubair
PPT
Cyber Crime
DOCX
Cyber security and threats
PPTX
Cyber Law And Ethics
PPTX
Statutory laws pertaining to cybercrimes in india
PPTX
Cyber crime
PPT
Cyber crime and fraud
PDF
Case study on cyber crime
PPT
Cyber crime
PDF
Cyber crimes
PPTX
Cybercrime final-ppt
PPTX
PPTX
Cyber Crime & Information technology Act 2000
PPTX
Cyber laws in pakistan
Cybercrime kunal gupta
Cyber Crime & Law
Cyber crime
Hacking and Hacktivism
Cyber crime
Cyber Security law in Bangladesh
Cyber crime in pakistan by zubair
Cyber Crime
Cyber security and threats
Cyber Law And Ethics
Statutory laws pertaining to cybercrimes in india
Cyber crime
Cyber crime and fraud
Case study on cyber crime
Cyber crime
Cyber crimes
Cybercrime final-ppt
Cyber Crime & Information technology Act 2000
Cyber laws in pakistan
Ad

Viewers also liked (20)

PPTX
Cyber crimes
PPTX
Analysis of database tampering
PPTX
Kristian on cyber safety
PPTX
PDF
Basic concept cybersecurity
PPT
Basic knowledge of cyber security
PPS
State of Cyber Law in India
PPT
CYBERCRIMES AND DUE DILIGENCE
PDF
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
PPTX
Cyber Security of Power grids
PPTX
Asal and Rethemeyer - Cyber Cafe
PPT
Wireless
PPTX
Comp 107 cep 8
PPTX
Cybersecurity 2 cyber attacks
PDF
Fd s graz2012_gesamt_druck_o
PDF
Portfolio Alejandro Jiménez Hernández
PDF
El Riesgo de Maremotos en la Península Ibérica, a la luz de la catástrofe del...
PDF
1er boletín experiencias
PPT
Creando una nueva generacion de líderes con calidad humana
PDF
Brunhofer, Matthew 11.03.15
Cyber crimes
Analysis of database tampering
Kristian on cyber safety
Basic concept cybersecurity
Basic knowledge of cyber security
State of Cyber Law in India
CYBERCRIMES AND DUE DILIGENCE
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
Cyber Security of Power grids
Asal and Rethemeyer - Cyber Cafe
Wireless
Comp 107 cep 8
Cybersecurity 2 cyber attacks
Fd s graz2012_gesamt_druck_o
Portfolio Alejandro Jiménez Hernández
El Riesgo de Maremotos en la Península Ibérica, a la luz de la catástrofe del...
1er boletín experiencias
Creando una nueva generacion de líderes con calidad humana
Brunhofer, Matthew 11.03.15
Ad

Similar to Cyberlaw (20)

PPT
Cyber crime & security final tapan
PPTX
Cyber Crime
PPTX
Cyber crime
PDF
Cyber Security Awareness at Dadar April 25, 2010
PPTX
Cyber Crime and Cyber Law of India BY Vinay
PPTX
CYBER CRIMES AND IT ACT.pptx
PPTX
Cyber crime
PPTX
Cyber crime
PDF
Cyber Security
PDF
Cyberlaw and Cybercrime
PDF
4.report (cyber crime)
PPTX
Cyber crime
PPT
Cyber crime and forensic
PPTX
Cyber crime p pt
PPSX
Cyber crime and cyber security
PDF
Cybercrimeandforensic 120828021931-phpapp02
PDF
Laws On Cyber Crimes Alongwith It Act And Relevant Rules Pk Singh
PPTX
Introduction to Cyber Crime
DOCX
Cyber crime
PPTX
Cybercrime 111205224958-phpapp02
Cyber crime & security final tapan
Cyber Crime
Cyber crime
Cyber Security Awareness at Dadar April 25, 2010
Cyber Crime and Cyber Law of India BY Vinay
CYBER CRIMES AND IT ACT.pptx
Cyber crime
Cyber crime
Cyber Security
Cyberlaw and Cybercrime
4.report (cyber crime)
Cyber crime
Cyber crime and forensic
Cyber crime p pt
Cyber crime and cyber security
Cybercrimeandforensic 120828021931-phpapp02
Laws On Cyber Crimes Alongwith It Act And Relevant Rules Pk Singh
Introduction to Cyber Crime
Cyber crime
Cybercrime 111205224958-phpapp02

Recently uploaded (20)

PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
2018-HIPAA-Renewal-Training for executives
PPTX
Chapter 5: Probability Theory and Statistics
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Architecture types and enterprise applications.pdf
PPTX
Configure Apache Mutual Authentication
PDF
Five Habits of High-Impact Board Members
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
Modernising the Digital Integration Hub
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
STKI Israel Market Study 2025 version august
PPTX
The various Industrial Revolutions .pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
Final SEM Unit 1 for mit wpu at pune .pptx
Benefits of Physical activity for teenagers.pptx
Convolutional neural network based encoder-decoder for efficient real-time ob...
2018-HIPAA-Renewal-Training for executives
Chapter 5: Probability Theory and Statistics
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Architecture types and enterprise applications.pdf
Configure Apache Mutual Authentication
Five Habits of High-Impact Board Members
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Hindi spoken digit analysis for native and non-native speakers
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Modernising the Digital Integration Hub
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
The influence of sentiment analysis in enhancing early warning system model f...
STKI Israel Market Study 2025 version august
The various Industrial Revolutions .pptx
Developing a website for English-speaking practice to English as a foreign la...

Cyberlaw

  • 1. A Study of Cyber Crime and The IT ACT in India Suhas Ambade Contact : ambadesuhas@yahoo.co.in
  • 2. Success in any field of human activity leads to crime that needs mechanisms to control it. The law is as stringent as its enforcement. Crime is no longer limited to space, time or a group of people. In 1990 less than 100000 people log on to the internet worldwide. Now around 500 million people are hooked up to surf the net around the globe. Until recently due to lack of awareness of cyber crime phenomenon, old laws did not quite fit the crimes being committed.
  • 3. The information technology act 2000 OBJECTIVE The main objective of ITA 2000 was to accord legal recognition to secure electronic records and secure digital signature. The ITA2000 provides authentication of electronic contract by means afixing digital signature. To provide legal recognition to electronic commerce to avoid paper based method of communication and storage of information. LEAGAL PROVISIONS The contract afixed with digital signature are valid and admissible as evidence in the court.
  • 4. Some of the instances of Violation of Law Tampering with Computer Source Code and hacking Publishing of Obscene material Breach of Confidentiality and privacy …… .. Are punishable with imprisonment or fine or both. Legal action further includes confiscation of computer, related material and accessories. Network service provider not liable under ITA2000 subject to exceptions.
  • 5. Why learn about CYBER CRIME ? Because – – Everybody is using COMPUTERS.. – From white collar criminals to terrorist organizations And from Teenagers to Adults – Conventional crimes like Forgery, extortion, kidnapping etc. are being committed with the help of computers – New generation is growing up with computers – MOST IMPORTANT - Monetary transactions are moving on to the INTERNET
  • 6. WHAT IS COMPUTER CRIME? All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system. COMPUTER CRIME is any crime where – • Computer is a target. • Computer is a tool of crime • Computer is incidental to crime
  • 7. Profile of Cyber Criminal • Unsatisfied employees. • Teenagers. • Political Hacktivist. • Professional Hackers. • Business Rival. • Ex-Boy Friend /Ex-Girl Friend. • Divorced Husband / Wife. etc
  • 8. Types of Cyber Crime (This is not exhaustive list of cyber crime) • HACKING • DENIAL OF SERVICE ATTACK • VIRUS Attack • SOFTWARE PIRACY • PORNOGRAPHY • IRC Crime • CREDIT CARD FRAUD • NET EXTORTION • PHISHING • SPOOFING • CYBER DEFAMATION • THREATENING
  • 9. HACKING Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
  • 10. DENIAL OF SERVICE ATTACK This is an act by the criminal, who floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or Provide.
  • 11. VIRUS Attack • Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious softwares)
  • 12. SOFTWARE PIRACY • Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. • Retail revenue losses worldwide are ever increasing due to this crime • Can be done in various ways- End user copying, Hard disk loading, Counterfeiting, Illegal downloads from the internet etc.
  • 13. • Pornography is the first consistently successful ecommerce product. • Deceptive marketing tactics and mouse trapping technologies Pornography encourage customers to access their websites. • Anybody including children can log on to the internet and access websites with pornographic contents with a click of a mouse. • Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient interest is an offence under the provisions of section 67 of I.T. Act -2000. STOP PORN PORNOGRAPHY
  • 14. Spoofing • Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges, so as to obtain access to the other computers on the network.
  • 15. IRC CRIME Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other • Criminals use it for meeting. • Hackers use it for discussing their exploits / sharing the techniques • Use chat rooms to attract Sexually small children. • Cyber Stalking - In order to harass a woman her telephone number is given to others as if she wants to befriend males
  • 16. CREDIT CARD FRAUD You simply have to type credit card number into www page of the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner
  • 17. Is there an additional slot ? FALSE slot Fixed to the original card slot. (Same color and sticker ). Contains additional card reader to copy your card information ..and duplicate your card The micro camera at the side can view the KEYPAD and also the monitor to send wireless picture up to 200metres.
  • 18. Copying the company’s confidential data in order to extort said company for huge amount.. NET EXTORTION
  • 19. It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means PHISHING
  • 20. Recent cases of Cyber crime
  • 21. The Tejas Ahauja case Tejas Ahuja (22), an independent advisor dealing in shares, allegedly hacked into the demat account of Ali Hussain, a share trader. Tejas operated out of an Internet café. Ahuja then sold 10,800 shares belonging to Ali to as low as 5 paisa per share to himself and sells the same shares to Ali for Rs 57 each, causing him a huge loss. Using IP addresses of the transactions, the police trace and arrested Ahuja.
  • 22. Ahmedabad Blast : Haywood Five minutes before the blast, an e-mails sent to national TV channels warning about blasts in Ahmedabad. The e-mail is traced to Kenneth Haywood’s computer, who stayed at Gunina apartment in Navi Mumbai. Haywood claimed that his computer was hacked. A technician associated with VSNL had asked him not to change the password of his wireless Internet network. Haywood’s laptop and computer was then sent to the forensic science laboratory at Kalina. Wi-fy system used to hack haywood’s account to send the mail.
  • 23. Parliament Attack Case The Laptop seized from the gunned down terrorist contained several evidences of terrorist’s motives. The sticker of the Ministry of home that they had made on the laptop and pasted on their ambassador car to gain entry into the parliament house and the fake ID card that one of the two terrorists was carrying with the Government of India emblem and seal.
  • 24. Remidial Actions The Net Accounts should be properly secured by a password. The Password should be frequently Changed. Never revel the password, pin numbers to others. Be cautious While operating ATM.