3. An !dea about Cyber Crime
▪ Crime committed using the computer and the
internet to steal the person’s identity or illegal
imports or malicious programs.
▪ Cyber Crime is nothing but where the computer is
used as an object or a subject of crime.
4. History of Cyber Crime
▪ The first recorded cyber crime LOOM took place
in the year 1820.
▪ After that in 1978 a SPAM EMAIL is found when it
was sent out over the ARPANet (Advanced
Research Project Agency Network).
5. Types of Cyber Crime
Virus/Worm Attacks
Trojan Attacks
Email Bombing
Phishing
Denial of Service Attack
Web Jacking
7. Cyber Criminals
▪ Those who are doing crimes by using the computer
as an target or object.
o Children and adolescents between the age
group of 6-18 years .
o Dissatisfied employees.
o Professional hackers / crackers.
8. Categories of Cyber Crime
▪ Cyber crimes can be basically divided into three
categories:
o Cyber crimes against persons.
o Cyber crimes against property.
o Cyber crimes against government.
9. Against persons
Harassment via E-mails: Harassment through e-mails is
not a new concept. It is very similar to harassing through
letters.
Email Spoofing: A mail which misrepresents its origin. It
shows it’s origin to be different from which actually it
originates.
10. Against property
Computer vandalism: Damaging or destroying data
rather than stealing or misusing them is called Computer
vandalism.
Transmitting virus: These are programs that attach
themselves to a file and then circulate.They usually affect
the data on a computer, either by altering or deleting it.
11. Against Government
CyberTerrorism:
• Terrorist attacks on internet is by:
o Distributed denial of service attacks
o Fake websites and fake emails
o Attacks on sensitive computer networks , etc.
• In this terrorists are using 512 bit encryption, which is
impossible to decrypt.
12. How can we protect it?
▪ Keep Software up to Date: If the seller releases patches for the
software operating your device, install them as soon as possible.
▪ Use Good Passwords: Select passwords that are difficult to guess. Do
not options that allows your computer to remember the password.
▪ Disable Remote Connectivity: Some PDA’s & Phones are equipped
with wireless technologies, such as Bluetooth.You should disable
these features when they are not in use.
15. What is Intellectual Property ?
▪ Creation of human mind
▪ Idea or a concept or a thought at the
beginning
▪ Research and Development to lead the idea
▪ The outcome of these ideas may be
development of products, processes and
design etc.
16. Why IPR is important?
•Reward original efforts ?
•Prevent duplication of work?
•Commercial value in research?
•Technical information for research &
to prevent litigation?
17. Patent
Patent defined in Patents Act as “patent
granted for any invention under the Act”.
Granted by the Government
To inventor
To prevent third parties not having his consent
from making, using, offering for sale. (Sec. 48)
For a limited period of time (20 years)
Qualified rights with duties
18. Copyright Act
▪ Objective:To ensure protection from unlawfully
exploitation of the work of owner(Author)
▪ Copyright act provides exclusive rights to authors
and other owners of original works.
▪ Exclusive privilege to authors to reproduce,
distribute, perform or display their creative works.
19. FilmsLiterary Dramatic Musical Artistic
What is covered by copyright ?
What is not covered by copyright ?
Ideas
Facts
Recipes
Names, titles or short phrases
20. Trademark
▪ Word or symbol used by manufacturers to
identify goods.
▪ Initial registration for 10 yrs and further
renewed by payment of fees for unlimited
period.
21. Types of trademark
▪ TM - a Trade Mark™ - used before registration
▪ SM - a Service Mark SM - used before registration
▪ Rights by Registration®
25. Content:
▪ Cyber law
▪ Need of Cyber law
▪ Cyber Laws in India
▪ Challenges facing law enforcement
▪ Positive Initiatives
26. Need of cyber law
▪ Tackling cyber crime
▪ Successful and smooth functioning of e-
commerce and virtual communication
▪ Cloud computing is proving to be a major
threat
27. Cyber Law
oCyber law is a term that encapsulates the legal
issues related to use of the Internet
oThe abuse of computers has also given birth to a new
age crimes that are addressed by the Information
Technology Act, 2000.
28. CYBER LAWS IN INDIA
▪ IT act 2000 passes
▪ Up gradation of IT act 2000-introducing IT act 2008
▪ IPC acts
▪ Copy right act
29. The IT ACT, 2000
o Legal Recognition of Electronic Documents
o Legal Recognition of Digital Signatures
o Offenses and Contraventions
o Justice Dispensation Systems for cybercrimes
30. Contd…..
oCivilWrongs under IT Act
oSection 46: IT Act
oSection 65: Source Code
oSection 66: Hacking
oSec. 67. Pornography
31. Contd….
o Sec 69: Decryption of information
oSec 70 : Protected System
oEmail spoofing
oCyber stalking
32. Information Technology Act 2008
o Information Security
o New sections on offences
o Data Protection.
o Section 69 empowers the C Gov/S Gov
33. Computer Related Crimes under IPC
and Special Laws
Arms ActOnline sale of Arms
Sec. 383 IPCWeb -Jacking
NDPS ActOnline sale of Drugs
Sec 416, 417, 463 IPCEmail spoofing
Sec 420 IPCBogus websites, cyber frauds
Sec 463, 470, 471 IPCForgery of electronic records
Sec 499, 500 IPCSending defamatory messages by email
Sec 503 IPCSending threatening messages by email
34. Challenges facing law enforcement
oMost not trained in the technologies
o Multiple jurisdictions
o Retrofit new crimes to existing laws
35. POSITIVE INITIATIVES:
o More Cyber crime police cells set up across the country
o Websites aid in creating awareness and encouraging
reporting of cyber crime cases.
o Specialized Training
o Active coordination between police and other law
enforcement agencies
36. ASLU Survey published in March 2014-
Incidence of Cyber crime in India
UNAUTHORISED
ACCESS 19%
E-MAIL ABUSE 21%
DATA THEFT 33%
37. Conclusion
Cyber crime is indeed getting the recognition it deserves.
It is highly likely that cyber crime and its hackers will
continue developing and upgrading to stay ahead of the
law.
Create yourself, rather than using other’s
creations.
Technological advancement made the job of the
CREATOR easy
38. Copyright Law of the USA, Chapter 1 Section 121
Schechter, Roger E., and John R. Thomas. Intellectual Property: The Law of
Copyrights, Patents and Trademarks.
Trend micro incorporated research paper
ATO Z OF Cyber Crime By Aayushi shah.
Computer Security Policy Guidebook(WILEY publication).
Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime,"
Anderson Publishing
Refrences: