Professional Documents
Culture Documents
September 11th
2001
The attacks on
World Trade
Centers Twin
Towers .
CYBER LAW
(AN OVERVIEW)
Cyber Law
Cyber crime
Cyber Attacks."
computer-supported crime
Any illegal behavior directed by means of electronic
operations that targets the security of computer
systems and the data processed by them.
CYBER CRIME
unlawful acts wherein the computer is either a tool or
a target or both.
ITALY
SYDNEY,AUSTRALIA
A suspect who hacked University
Hospitals medical data was
arrested.
KOREA
India contd..
Malwares: A Looming threat to
Mobile Phones without anti virus
software.
Introduction of a bill that amends
the existing laws of The Prevention
of Money Laundering Act 2002.
School Holidays spell an Increase in
Web Hacking as smart kids take to
crime.
INDIA
Mphasis BFL, Pune Security
breach
Citibanks Customers in the US found
that their accounts were tampered with
and a sum totaling to US$ 350,000 was
transferred to Bank accounts in and
around Pune by a few of the firms
employees.
Types of cyber
crime
Logic bombs.
Trojan attacks.
Theft of computer
system.
Financial crimes.
Cyber pornography.
Hacking.
Piracy.
Software piracy,
Copyright
infringement,
Trademarks violations,
Theft of computer
source code etc.
Cyber Defamation
Defamation taking place with the help of computers
and / or the Internet.
Ex: Publishing of defamatory matter about
someone on a website or sending e-mails containing
defamatory information to people..
Cyber stalking
stalking -
"pursuing stealthily".
Involves:
Following a person's movements across the Internet by
posting messages (sometimes threatening) on the bulletin
boards frequented by the victim.
Entering the chat-rooms frequented by the victim.
Constantly bombarding the victim with emails etc.
- Hollywood actress Halle Berry was
until recently being cyber stalked.
Data diddling
Virus / worm
attacks:
Viruses:
Affect the data on a computer, either by
altering or deleting it.
Worms:
Merely make functional copies of
themselves and do this repeatedly till
they eat up all the available space on a
computer's memory.
Logic bombs
Event dependent programs i.e. these programs
are created to do something only when a
certain event occurs.
Trojan attacks
Unauthorized program which functions from
inside like an authorized program, thereby
concealing its actions.
Financial crimes
This includes cheating, credit card frauds.
E.g. Alphonso mangoes Case
Cyber pornography:
Salami attacks
Used for financial crimes. The key here is to
make the alteration so insignificant that in a
single case it would go completely unnoticed.
Hacki
ng
Unauthorized access to computer
systems or networks, means any person
who secures access or attempts to secure
access to a protected system.
Hacking
Hacker : A hacker is someone who breaks into
computers sometimes to read private e-mails and
other files.
Hackers delete or alter files.
Hackers Injure Other Computer Users by destroying
Information Systems.
Hackers steal telephone and computer time and
share unauthorized access codes and passwords.
Did u know ?
The Indian
scenario..
Cyber fraud.
Penalties
and
Adjudications
Penalty for
damage to
computer,
computer system,
etc. (Sec 43)
Accessing or
securing access
Download copy or
extract data
Introduces
computer
contaminant
Compensation:
The person who is
found guilty of
contravening this
section is liable to
pay damages by
way of
compensation not
exceeding one
crore rupees to the
person affected.
Compensation:
Pay penalty up to
one lakh and fifty
thousand rupees for
each such failure.
Liable to a penalty
not exceeding five
thousand rupees for
everyday during
which such failure
continues
Residuary penalty
(Sec 45)
Whoever
contravenes any
rules or regulations
made under this
Act, for the
contravention.
Compensation
Penalty of an
amount not
exceeding
twenty-five
thousand rupees.
POWER TO ADJUDICATE(Sec
46)
Appointed by the central Government.
To hold an enquiry as per the manner
prescribed by the Central Government.
All proceedings before it shall be deemed
to be judicial proceedings.
Deemed to be a Civil Court.
Cyber Police
FACTS
Indias first exclusive cyber crimes police
station.
A Cyber Crime Cell was started at Corps of
Detectives - Head Quarters, Bangalore to
deal with Cyber Crime with
Government
Notification in 1999.
The Cyber Crime Cell was declared as Cyber
Crime Police Station in 2001 as per
Government Notification.
References
www.cybercrime.planetindia.com
www.4law.co.il
www.bookdigger.com
www.crimeresearch.org
www.cyberguard.org
Electronic crimes in the news.com
ECTF WEBSITE
www.fbi.gov
news.bbc.co.uk
Playitcubersafe.com
www.cyberpolicebangalore.nic.in
www.deccanherald.com
www.wipo.int
www. cyberlawindia.com
Management Information Systems James A OBrien
THANK YOU
MORE..