seminar on it acts

28
CYBER CRIME & THE ACTS DEALING WITH CYBER CRIME Mohit Goyal SKIT, JAIPUR (10ESKCS058)

Upload: abhishekac

Post on 21-May-2017

218 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Seminar on IT Acts

CYBER CRIME & THE ACTS DEALING WITH

CYBER CRIME

Mohit GoyalSKIT, JAIPUR(10ESKCS058)

Page 2: Seminar on IT Acts

Contents Cyber Crime Cyber Threat Evolution Types of Cyber Crime Security Incident Report (year 2013) Various Cyber Acts Intellectual Property Rights (IPR) Copyright Act How to protect your computer Conclusion

Page 3: Seminar on IT Acts

*Cyber crimeOffence with a criminal motive using modern telecommunication networks

Page 4: Seminar on IT Acts

Cyber Threat EvolutionVirus

Breaking Web Sites

Malicious Code

(Melissa)

Advanced Worm / Trojan

Identity Theft (Phishing)

Organised CrimeData Theft, DoS /

DDoS

1995 2000 2003-04 2005-06 2010-111977

Page 5: Seminar on IT Acts

Security Incidents reported during 2011

Security Incident Report

Security Incidents reported during 2008

Page 6: Seminar on IT Acts

Types of Computer or Internet Crimes Hacking Spreading of Viruses & Worms Data Theft Credit Card Frauds Cyber Terrorism Money Laundering Cyber Stalking Intellectual Property Theft Identity Theft

Contd…

Page 7: Seminar on IT Acts

*Contd...

*Child Pornography*Online Gambling*Online Frauds ( 419 Scams, Lottery Scams)*Sale of illegal articles like narcotics, weapons, wildlife*Tampering of Source Documents.*Financial Frauds

Page 8: Seminar on IT Acts

CYBER STALKING CYBER STALKING IS THE USE OF THE INTERNET OR

OTHER ELECTRONIC MEANS TO STALK SOMEONE.

IT INVOLVES THREATENING BEHAVIOUR SUCH AS :-

FOLLOWING A PERSON

MAKING PHONE CALLS,

LEAVING WRITTEN MESSAGES OR OBJECTS,

Page 9: Seminar on IT Acts

HACKING

"HACKING" IS A CRIME, WHICH ENTAILS CRACKING SYSTEM

AND GAINING UNAUTHORIZED ACCESS TO THE DATA STORED IN THEM.

Page 10: Seminar on IT Acts

EXAMPLES ARE :-

THEFT OF INFORMATION - includes information stored in computer hard disks, removable storage media

DENIAL OF SERVICE - flooding computer resources with more requests than it can handle i.e, crash.

VIRUS/WORMS - programs that attach themselves to a computer or a file affect the data on a computer, either by altering or deleting it.

Worms, unlike viruses don not need the host to attach themselves to.

LOGIC BOMBS - dependent programs created to do something only when a certain event occurs.

Page 11: Seminar on IT Acts

PHISHING

PHISHING IS TRYING TO FOOL PEOPLE INTO PARTING WITH THEIR MONEY.

IT REFERS TO :-

RECEIPT OF UNSOLICITED EMAILS BY CUSTOMERS,

REQUESTING THEM TO ENTER THEIR USERNAME, PASSWORDS OR OTHER PERSONAL INFORMATION.

Page 12: Seminar on IT Acts

CROSS SITE SCRIPTING

CROSS-SITE SCRIPTING (XSS) FOUND IN WEB APPLICATIONS WHICH ALLOW CODE INJECTION BY MALICIOUS WEB USERS INTO THE WEB PAGES VIEWED BY OTHER USERS TO BYEPASS ACCESS CONTROLS.

Eg:- FACEBOOK, ORKUT

Page 13: Seminar on IT Acts

CYBER SQUATTING

CYBER SQUATTING IS THE ACT OF REGISTERING A FAMOUS DOMAIN NAME AND THEN SELLING IT FOR A FORTUNE.

Eg:- IF SOMEONE PURCHASED THE DOMAIN NAME "mcdonalds.ws" AND THEN PROCEEDED TO ATTEMPT TO SELL IT BACK TO McDonalds.

NOTE: Internet domain name registrations are for a fixed period of time.

Page 14: Seminar on IT Acts

Intellectual Property Right

Intellectuals Solve Problems;

Geniuses prevents them

Albert Einstein

Page 15: Seminar on IT Acts

What is Intellectual Property ? Creation of human mind and intellect Idea or a concept or a thought at the

beginning Research and Development to lead the

idea or thought to practice The outcome of these ideas may be

development of products, processes, works marks and design, etc.

Page 16: Seminar on IT Acts

Why IPR is important?•Reward original efforts •Stimulate innovation and creativity•Prevent duplication of work?•Commercial value in research?•Prevent exploitation of workers?•Technical information for research & to prevent litigation?

Page 17: Seminar on IT Acts

IPR

Forms of IPR

Page 18: Seminar on IT Acts

Patent Patent defined in Patents Act as “patent granted

for any invention under the Act”. Territorial (national) Statutory exclusive right Granted by the Government To inventor or their assignees In consideration of disclosure of the invention to the government To prevent third parties not having his consent from making,

using, offering for sale, selling or importing for those purposes the products or products produced by the patented processes (Sec. 48)

For a limited period of time (20 years) Qualified rights with duties and liabilities

Page 19: Seminar on IT Acts

Copyright Act Objective: To ensure protection from unlawfully

exploitation of the work of owner(Author)

Copyright act provides exclusive rights to

authors and other owners of original works.

Exclusive privilege to authors to reproduce,

distribute, perform, or display their creative

works.

Page 21: Seminar on IT Acts

Trademark Word or symbol used by manufacturers

to identify goods.

Customer able to distinguish product of one manufacturer from that of other.

Initial registration for 10 yrs and further renewed by payment of fees for unlimited period.

Page 22: Seminar on IT Acts

LABEL - PEPSI / COCA COLA

NAME - TATA / BIRLA / GODREJ/ Reliance

Page 23: Seminar on IT Acts

Laws in India Trade marks –The Trademarks Act 1999 Copy Right Works- The Copyright Act

1957 Designs- lines colours shapes etc. –The

Designs Act 2000 Inventions- Products or Process-The

Patents Act 1970

Page 24: Seminar on IT Acts

Approach to the protection of Intellectual Property

Suppose you invent a Laptop/ DissolutionTest Apparatus with newer features

Register

Patent for the technology,

Design for the appearance,

Trademark for its brand and

Copyright for the accompanying literature.

Page 25: Seminar on IT Acts

*Protect your Computers*Use anti-virus

* Don't open emails or attachments from unknown sources

*Use hard-to-guess passwords.

*Back-up your computer dataContd…

Page 26: Seminar on IT Acts

*Contd…

*Don't share access to your computers

*If you have a Wi-Fi network, password protect it

*Logout

*Reevaluate your security on a regular basis

Page 27: Seminar on IT Acts

Conclusion

Obviously computer crime is on the rise, but so is the awareness and ability to fight it.  Law enforcement realizes that it is happening more often than it is reported and are doing there best to improve existing laws and create new laws as appropriate.  The problem is not with the awareness or the laws, but with actually reporting that a crime has occurred.  Hopefully people will begin to realize that unless they report these crimes and get convictions, those committing computer crimes will continue to do so.

Page 28: Seminar on IT Acts

Thank You…