You are on page 1of 50

Cyber Terrorism

September 11th
2001

The attacks on
World Trade
Centers Twin
Towers .

PAY ATTENTION, IM ONLY DOING IT ONCE

CYBER LAW
(AN OVERVIEW)

Cyber Law

Cyber law refers to all the legal and


regulatory aspects of Internet and World
Wide Web.
Any activities in the cyber space which are
or may turn into a legal issue come within
the purview of the cyber law.

Cyber crime

Cyber Attacks."
computer-supported crime
Any illegal behavior directed by means of electronic
operations that targets the security of computer
systems and the data processed by them.
CYBER CRIME
unlawful acts wherein the computer is either a tool or
a target or both.

Arrest of hackers who


compromised homepages of the press
including manufacturers...

ITALY

SYDNEY,AUSTRALIA
A suspect who hacked University
Hospitals medical data was
arrested.

Member of International Hacker Clan,


WHP, and part of the U.S army in Korea
arrested.

KOREA

India contd..
Malwares: A Looming threat to
Mobile Phones without anti virus
software.
Introduction of a bill that amends
the existing laws of The Prevention
of Money Laundering Act 2002.
School Holidays spell an Increase in
Web Hacking as smart kids take to
crime.

INDIA
Mphasis BFL, Pune Security
breach
Citibanks Customers in the US found
that their accounts were tampered with
and a sum totaling to US$ 350,000 was
transferred to Bank accounts in and
around Pune by a few of the firms
employees.

Types of cyber
crime

Sale of illegal articles.


Intellectual Property
crimes.
Cyber Defamation.
Cyber stalking.
Data diddling.
E-mail related crimes.
Denial of Service attack.
Virus / Worm attacks.

Logic bombs.
Trojan attacks.
Theft of computer
system.
Financial crimes.
Cyber pornography.
Hacking.
Piracy.

Sale of illegal articles


Sale of narcotics, weapons and Protected / Endangered
Wildlife etc
Medium:
websites, auction websites, and bulletin boards
or by email communication.
- A website selling cocaine in the name of
'honey is being prosecuted in Thailand.

Intellectual Property crimes

Software piracy,
Copyright
infringement,
Trademarks violations,
Theft of computer
source code etc.

Cyber Defamation
Defamation taking place with the help of computers
and / or the Internet.
Ex: Publishing of defamatory matter about
someone on a website or sending e-mails containing
defamatory information to people..

Cyber stalking
stalking -

"pursuing stealthily".

Involves:
Following a person's movements across the Internet by
posting messages (sometimes threatening) on the bulletin
boards frequented by the victim.
Entering the chat-rooms frequented by the victim.
Constantly bombarding the victim with emails etc.
- Hollywood actress Halle Berry was
until recently being cyber stalked.

Data diddling

A kind of an attack which involves altering raw data


just before it is processed by a computer and then

changing it back after the processing is completed .


ex: The Electricity Board in India have been a victim to data
diddling programs inserted when private parties were computerizing
their systems.

- American wireless company AT &T suffered


a blow of thousands of $$ due data diddling.

E-mail related crimes


Email bombing:
sending large number of emails to a person
or company or an email service provider
resulting in the email account or mail server
crash.
Email spoofing :

Sending malicious codes through email.

Sending threatening emails

Denial of Service attack:


Flooding a web server with more
requests than it can handle, and
crashing it. This denies authorized
users the service offered by the
resource.

Virus / worm
attacks:
Viruses:
Affect the data on a computer, either by
altering or deleting it.
Worms:
Merely make functional copies of
themselves and do this repeatedly till
they eat up all the available space on a
computer's memory.

Logic bombs
Event dependent programs i.e. these programs
are created to do something only when a
certain event occurs.

Trojan attacks
Unauthorized program which functions from
inside like an authorized program, thereby
concealing its actions.

Theft of computer system


Causing physical damage to a computer or
its peripherals.

Financial crimes
This includes cheating, credit card frauds.
E.g. Alphonso mangoes Case

Cyber pornography:

Air Force Balbharati School case


Swiss couple filming slum children, in
Mumbai

Salami attacks
Used for financial crimes. The key here is to
make the alteration so insignificant that in a
single case it would go completely unnoticed.

We both tried to hack the same bank


account,Dude

Hacki
ng
Unauthorized access to computer
systems or networks, means any person
who secures access or attempts to secure
access to a protected system.

Hacking
Hacker : A hacker is someone who breaks into
computers sometimes to read private e-mails and
other files.
Hackers delete or alter files.
Hackers Injure Other Computer Users by destroying
Information Systems.
Hackers steal telephone and computer time and
share unauthorized access codes and passwords.

Think before you hack:


Hacking is an offence under section 66 of
the IT Act. Hacking attracts serious
penalties which include a jail term of 3
years, a fine of Rs. 2 Lakh or both.

A CRIME THAT AFFECTS REAL


PEOPLE
AND COSTS REAL JOBS.

Did u know ?

More than $12,000,000,000 is lost due to piracy each year.

40% of all software used is pirated.

In the U.S. alone, one out of four pieces of software is pirated.

Software theft robs the U.S. economy of more than


118,000 jobs, $5.6 billion in wages and more than
$1.5 billion in tax revenue each year.

The Indian
scenario..

There is a lot at stake..

Cyber fraud.

Credit card fraud.


Victims include Citibank, American Bank, Union Bank, Askari
Bank, the Muslim Commercial Bank.
Forgery.
Distance selling
Online auction frauds
Phishing, a form of deceit where cyber-criminals build exact
copies of web sites from known and trusted companies.
EX: American Bank of Texas N.A
www.abtexasna.com
and www.abtexasna.net

Penalties
and

Adjudications

Penalty for
damage to
computer,
computer system,
etc. (Sec 43)
Accessing or
securing access
Download copy or
extract data
Introduces
computer
contaminant

Compensation:
The person who is
found guilty of
contravening this
section is liable to
pay damages by
way of
compensation not
exceeding one
crore rupees to the
person affected.

Penalty for failure to


furnish information,
return, etc. (Sec 44)
Failing to furnish any
document or report
or return to the
controlling
authorities
Furnish or file any
information within
the specified time
Maintain books of
accounts or records

Compensation:
Pay penalty up to
one lakh and fifty
thousand rupees for
each such failure.
Liable to a penalty
not exceeding five
thousand rupees for
everyday during
which such failure
continues

Residuary penalty
(Sec 45)
Whoever
contravenes any
rules or regulations
made under this
Act, for the
contravention.

Compensation
Penalty of an
amount not
exceeding
twenty-five
thousand rupees.

POWER TO ADJUDICATE(Sec
46)
Appointed by the central Government.
To hold an enquiry as per the manner
prescribed by the Central Government.
All proceedings before it shall be deemed
to be judicial proceedings.
Deemed to be a Civil Court.

Factors to be taken into


account by the adjudicating
officer..(Sec 47)
The quantum of compensation is decided with
regard to..
The amount of gain of unfair advantage,
wherever quantifiable, made as a result of the
default.
The amount of loss caused to any person as a
result of the default.
The repetitive nature of the default.

Cyber Police

FACTS
Indias first exclusive cyber crimes police
station.
A Cyber Crime Cell was started at Corps of
Detectives - Head Quarters, Bangalore to
deal with Cyber Crime with
Government
Notification in 1999.
The Cyber Crime Cell was declared as Cyber
Crime Police Station in 2001 as per
Government Notification.

CYBER POLICE - INDIA


Cyber Crime Police Station
has registered only 38 cases
from September 2001 to
November 2004.
Registered crimes include:
Tampering of source code(3)
Hacking (23)
Obscene e-mails (10)
Copy Right Act 1957 (2)
Most of the complaints are
from Bangalore.

References

www.cybercrime.planetindia.com
www.4law.co.il
www.bookdigger.com
www.crimeresearch.org
www.cyberguard.org
Electronic crimes in the news.com
ECTF WEBSITE
www.fbi.gov
news.bbc.co.uk
Playitcubersafe.com
www.cyberpolicebangalore.nic.in
www.deccanherald.com
www.wipo.int
www. cyberlawindia.com
Management Information Systems James A OBrien

THANK YOU

Cyber Law and MIS


Heightened concerns about cyber
terrorism and the increasing need to open
internal networks to outside access are
pushing corporations to bolster network
and data center security
Defending against Hacker attacks and
Virus Attacks.
MTV Networks-Enforcer
First Citizens Banks-Entercept

Cyber Laws and MIS

Intellectual Property Rights.


Proportionality of Good and Bad.
Informed Consent of those those affected.
Minimized Risk and Ensured Justice.
Employee Responsibility.
Cost saving-manpower and time.
Electronic filing of records and the retention of
information in electronic format, will help in
saving costs, time and manpower for the
Corporate.

MORE..

Customer Privacy and Employee


Privacy.
Supplementing traditional network
protection with newer intrusion
monitors,access control tools and
tougher IT usage policies

You might also like