Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

EVOLUTION OF CYBER LAW IN INDIA '02

No description
by

Tushar Jindal

on 24 April 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of EVOLUTION OF CYBER LAW IN INDIA '02

The history of the Internet begins with the development of electronic computers in the 1950s.
The US Department of Defense awarded contracts as early as the 1960s for packet network systems, including the development of the ARPANET (which would become the first network to use the Internet Protocol.)
The first message was sent over the ARPANET from computer science Professor Leonard Kleinrock's laboratory at University of California, Los Angeles (UCLA) to the second network node at Stanford Research Institute (SRI).
Access to the ARPANET was expanded in 1981 when the National Science Foundation (NSF) funded the Computer Science Network(CSNET).
Commercial Internet service providers (ISPs) began to emerge in the late 1980s.

HISTORY OF INTERNET
IMPACTS OF
INTERNET
NEED FOR IT ACT
EVOLUTION AND PRESENT TRENDS.....
CYBER LAW IN INDIA
IMPACT OF
INTERNET
Search Engines
Communication
E-Commerce
Interchange Of Ideas
Education
Social Networking
Real Time Updates
Entertainment
POSITIVE POINTS:
NEGATIVE IMPACTS
Illegal or inappropriate materials can be found in the internet
Unethical Hacking
Social networks disturb a person's way of living and professional activity
Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code. In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both.
The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act, 2000.

CYBER LAW OF INDIA

The cyber security will defend us from critical attacks.
It helps us to browse the site, website.
Internet Security process all the incoming and outgoing data on your computer.
It will defend us from hacks and virus.
Application of cyber security used in our PC needs update every week


ADVANTAGES OF CYBER SECURITY

Cyber Security : Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks. Cyber security actually preventing the attacks, cyber security.
Privacy Policy : Before submitting your name , e-mail , address, on a website look for the sites privacy policy.
Keep Software Up to Date: If the seller reduces patches for the software operating system your device ,install them as soon as possible .Installing them will prevent attackers form being able to take advantage. Use good password which will be difficult for thieves to guess. Do not choose option that allows your computer to remember your passwords.

CYBER SECURITY

Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily . In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law.
So, to make us a safer we must need cyber security.

CONCLUSION

Use antivirus Software
Insert Firewalls
Uninstall unnecessary software
Maintain backup
Check security settings

SAFETY TIPS TO CYBER CRIME

DISABLE REMOTE CONNECTIVITY : Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use.


CYBER SECURITY

Cyber crime
and
Security
by :aeman khan
cse
ii year

Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code. In simple way we can say that cyber crime is unlawful acts where in the computer is either a tool or both.
The abuse of computer has also given birth of new age crime that are addressed by the Information Technology Act, 2000.

CYBER LAW OF INDIA

The cyber security will defend us from critical attacks.
It helps us to browse the site, website.
Internet Security process all the incoming and outgoing data on your computer.
It will defend us from hacks and virus.
Application of cyber security used in our PC needs update every week


ADVANTAGES OF CYBER SECURITY

Cyber Security : Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks. Cyber security actually preventing the attacks, cyber security.
Privacy Policy : Before submitting your name , e-mail , address, on a website look for the sites privacy policy.
Keep Software Up to Date: If the seller reduces patches for the software operating system your device ,install them as soon as possible .Installing them will prevent attackers form being able to take advantage. Use good password which will be difficult for thieves to guess. Do not choose option that allows your computer to remember your passwords.

CYBER SECURITY

CYBER CRIMES THREATENS NATIONAL SECURITY IN INDIA Likewise Union home minister Shivraj Patil said that the rising level of cyber crime is an indication of enormous threat to national security. On Google’s social networking site orkut, facebook, have been perplexing authorities . Fan clubs of Underworld Dons like Dawood Ibrahim and Chhota Shakeel and other wanted underworld dons are also doing the rounds on orkut. There is huge potential for damage to national security through cyber attacks. The internet is a means for money bounding and funding terrorist attacks in an organized manner.

cyber crimes THREATENS
NATIONAL SECURITY

CYBER TERRORISM : Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate E-mails , attacks on service network etc.
SOFTWARE PIRACY : Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.

types of cyber crime

DENIAL OF SERVICE ATTACKS : This is an act by the criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide. Many DOS attacks, such as the ping of death and Tear drop attacks.
VIRUS DISSMINITION : Malicious software that attaches itself to other software. VIRUS , WORMS, TROJAN HORSE ,WEB JACKING, E-MAIL BOMBING etc.
COMPUTER VANDALISM : Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.


Types of CYBER CRIME

CHILD PORNOGRAPHY : The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of Pedophiles.
How Do They Operate :
How do they operate Pedophiles use false identity to trap the children , Pedophiles connect children in various chat rooms which are used by children to interact with other children.



types of cyber crime

TYPES OF CYBER CRIME

We can categorize cyber crime in two ways.
The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc.
The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.

Categories of cyber crime

Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily . In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law.
So, to make us a safer we must need cyber security.

CONCLUSION

Use antivirus Software
Insert Firewalls
Uninstall unnecessary software
Maintain backup
Check security settings

SAFETY TIPS TO CYBER CRIME

DISABLE REMOTE CONNECTIVITY : Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use.


CYBER SECURITY

The first recorded cyber crime took place in 1820.
That is not surprising considering the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c.
In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage.
The first spam email took place in 1976 when it was sent out over the ARPANT.
The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.

HISTORY OF CYBER CRIME

INTRODUCTION
HISTORY OF CYBER CRIME
CATEGORIES OF CYBER CRIME
TYEPS OF CYBER CRIME
CYBERCRIMES THREATENS NATIONAL SECORITY
CYBER SECURITY
ADVANTAGES OF CYBER SECURITY
SAFETY TIPS TO CYBER CRIME
CYBER LAW OF INDIA
CONCLUSION

content

HACKING :- Hacking in simple terms means an illegal intrusion info a computer system and/or network . It is also known as CRACKING. Government websites are the hot target of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.
Motive behind the crime called HACKERS
Motive behind the crime called hacking greed power, publicity, revenge, adventure desire to access forbidden information destructive mindset wants to sell n/w security services.

Types of cyber crime

Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.

introduction

ADVANTAGES OF CYBER SECURITY


BIRTH OF IT ACT 2000
UN General Assembly adopted model law on E-Commerce on 30th Jan 1997 .

It was called UNCITRAL Model Law on E-Commerce .

Being part of UN, India had to adopt the Model Law .Hence IT Act 2000 was passed on 17th Oct 2000 .

It was amended on 27 October 2009 and is popularly known as IT Act 2008 .
IT ACT 2000 OBJECTIVES
To provide legal recognition for E-Transactions.

To give legal recognition to Digital Signature for accepting agreement via computer.

To stop computer crimes and protect privacy of Netizens .

To give legal recognition for keeping account books by bankers and other companies in electronic form .

It also updated RBI Act and Evidence Act.
GREY AREAS OF IT ACT 2000
Not Applicable to NEGOTIABLE INSTRUMENT( Other than a cheque ) .

Not Applicable to a POWER-OF-ATTORNEY .

Not Applicable to a WILL .

Not Applicable to any contract for sale or conveyance of immovable property .

Any class of documents or transactions notified by the CENTRAL GOVERNMENT.
PROVISIONS OF IT ACT 2000
Tampering with computer source documents .

Hacking with computer systems .

Publishing obsene information .

Breach of confidentiality and privacy .

Publishing false Digital Signature Certificates .
SOME IMPORTANT DEFINITIONS
DIGITAL SIGNATURE
: A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document.

ELECTRONIC FORM: It means any information generated,received,sent stored in computer generated micro device.

ELECTRONIC GAZETTE: It means the official gazette published in the electronic form.

ELECTRONIC SIGNATURE:It means authentication of any electronic record by a subscriber by means of electronic technique specified in SECOND SCHEDULE and includes digital signature.

ELECTRONIC RECORD: It means data,received,sent in an electronic from.

IT ACT AMENDMENTS 2008
1.)
SECTION 66A
:
Sending of offensive or false messages.

Also covers "CYBER STALKING".

Imprisonment upto 3 Years and Fine.

2.)
SECTION 66(B)
:
Dishonestly receiving stolen computer resource or communication device.
Imprisonment upto 3 years or 1 lakh or both.

3.)
SECTION 66(C)
:
Identity theft i.e dishonestly using someone else's electronic signature, password or other unique identity feature.
Imprisonment upto 3 Years and fine upto 1.1 lakhs.

CONTD.......
4.)
SECTION 66(E)
:
VIOLATION OF PROPERTY ,popularly known as " Voyerism"

Covers acts like hiding video cameras in changing rooms etc.

Imprisonment upto 3 years or 2 lakh fine or both.

5.)
SECTION 66(F)
:
Covers cyber terrorism i.e whoever uses cyberspace to threaten the unity,integrity of India or to strike fear in the hearts of people.

Imprisonment may extend to life .

6.)
SECTION 67
:
Publishing obscene material in electronic form

Imprisonment may extend to 5years and a fine of Rs 10 lakh
Contd....
7.)
SECTION 67(A)
:
Publishing or transmitting sexually explicit acts in electronic form.

Punishable with imprisonment upto 7 years and fine upto 10 lakhs.

8.)
SECTION 67(B)
:
Creating, collecting, browsing, downloading etc of child pornography.

Imprisonment upto 7 years and fine upto 10 lakhs.
FAMOUS CASES
1.)
Sajeesh Krishnan v. State of Kerala (Kerala High Court, Decided on June 5, 2012)
:
The accused hatched a criminal conspiracy to extort money by black mailing a Minister of the State and for that purpose they have forged some CD as if it contained statements purported to have been made by the Minister.”
The Court also noted the provisions under which the accused was charged. They are Sections 66-A(b) and 66D of the Information Technology Act, 2000.

2.)
BPO of Mphasis Ltd.
:
A BPO defrauded US customers of Citi Bank of Rs 1.5 crores.

The crime was committed using unauthorised access to electronic account of customers .
FUTURE PROSPECTS
Strategies and Alert mechanisms are needed .

Need for creating a global culture of Cyber security.

International Co-operation is need of the hour .

Participation of governments, private sectors and NGOs is necessary.

Law enforcement officials, forensic investigators and experts need to trained.

Awareness is important and any wrong incident should be reported at once.
CONCLUSION
The cyber laws are well drafted and are capable of handling all kinds of challenges. However, the enforcement agencies are required to be well versed with changing technologies .
Full transcript