Академический Документы
Профессиональный Документы
Культура Документы
Cyber Security
JAGADISH.A.T
ASSISTANT PROFESSOR OF LAW
JSS LAW COLLEGE, AUTONOMOUS
MYSORE
CYBER LAW
Cyber Law is a distinct branch of law to deal with the activities in
Cyber Space.
Cyberspace is created when two or more computers are inter-
Law,
Information
CYBER LAW
Cyber Law is a term first coined by Jonathan Rosenoer as the title for a
service aimed at explaining legal issues to computer users. It derives
from the term, Cybernetics.
Cyber Law (tm) was first published on an AOL user group no later than
early 1992, as a version of a series of articles published in print, under
the name "The Legal Side," by major US computer (primarily Macintosh)
users groups, such as BMUG, and on The WELL.
It can defined as computers and computer networks, internet
infrastructure and topography, software, websites and internet based
communication technologies and its in-depth scientific knowledge that is
used to upload, access, search, process, share, transmit, post, update
information including textual or multimedia based images or other
information. It includes hardware, databases, programs, and other
internet related equipment used for storage, processing and
transmission of information across computer network.
CYBER CRIME
Cyber crime is the latest and perhaps the most complicated
3Billion Internet Users, 2.3 Mobile Broadband Subscribers Globally By End OF 2014
Posted:06 May 2014 05:04 AM PDT
Trakin' the india business buzz
info@trak.in
virtual communication
No Jurisdictional Boundaries.
and
Cyber security
Cyber security involves protection of sensitive personal
and
business
information
through
prevention,
detection, and response to different online attacks.
Cyber security actually protects your personal
information by responding, detecting and preventing
the attacks.
Cyber security Privacy policy : Before submitting your
name, email address, or other personal information on
a web site, look for the site's privacy policy.
Evidence that your information is being encrypted : To
protect attackers from hijacking your information, any
personal information submitted online should be
encrypted. Many sites use SSL or secure sockets layer,
to encrypt information. Protecting your privacy.
Cyber security
Advantages
security
of
cyber
attacks.
It helps us to browse the safe website.
Internet security process all the incoming and
outgoing data on our computer.
cyber security will defend from hacks and virus.
The application of cyber security used in our PC
needs update every week.
The security developers will update their database
every week once. Hence the new virus also
deleted.
in 2008)
The
Information
Technology
(Certifying
Authority) Regulations, 2001 (amended in
2011)
The personal Data Protection Bill, 2006
The Communication Convergence Bill, 2001
The
Information Technology (Karnataka)
Rules, 2004
Basis for Information Technology Act, 2000
backup
check security settings
Electronic
(section 17 to 34)
Chapter VII Electronic Signature Contracts
(section 35 to 42)
Chapter VIII Duties of Subscribers (section 40 to
42)
Chapter
IX
Penalties,
Compensation
and
Adjudication (section 43 to 47)
Chapter- X The Cyber Appellate Tribunal (section
48 to 64)
Chapter XI Offences (section 65 to 78)
The
first
ScheduleDocuments
or
Transactions to which the Act shall not apply
The Second Schedule- Electronic Signature or
Electronic Authentication Technique and
Procedure.
Types of Cybercrime
HACKING:
Hacking
Types of Cybercrime
CHILD PORNOGRAPHY:
Types of Cybercrime
DENIAL OF SERVICE ATTACK:
This is an act by the criminal, who
floods the bandwidth of the victims
network or fills his e-mail box with
spam mail depriving him of the
services he is entitled to access or
provide . Many DoS attacks, such as
the Ping of Death and Teardrop
attacks, exploit limitations in the
TCp/IP protocols.
Network Worms
Trojan Horses
Logic Bombs
DNS Poisoning
Zombies, IP Spoofing
Buffer Overruns
Password Grabbers
Password Crackers
Ploys
Pop-Ups
Scams
Spam
DEFINITIONS
A computer program
Tells a computer what to do and how to do it.
Types of Cybercrime
COMPUTER VANDALISM:
Damaging or destroying data rather than
SALIENT DIFFERENCES
1) Computer Virus: Needs a host file
Copies itself
Executable
2) Network Worm: No host (self-contained)
Copies itself
Executable
3) Trojan Horse:
No host (self-contained)
Does not copy itself
Imposter Program
TYPICAL SYMPTOMS
File deletion
File corruption
Visual effects
Pop-Ups
Erratic (and unwanted) behavior
Computer crashes
Types of Cybercrime
CYBER TERRORISM
The most popular weapon in cyber terrorism is the use of computer viruses and
worms. In some cases of cyber terrorism is also called 'computer terrorism'. The
attacks or methods on the computer infrastructure can be classified into three
different categories.
(a) Physical Attack: The computer infrastructure is damaged by using
conventional methods like bombs, fire etc.
(b) Syntactic Attack: The computer infrastructure is damaged by modifying the
logic of the system in order to introduce delay or make the system unpredictable.
Computer viruses and Trojans are used in this type of attack.
(c) Semantic Attack: This is more treacherous as it exploits the confidence of the
user in the system. During the attack the information keyed in the system during
entering and exiting the system is modified without the users knowledge in order to
induce errors,
Cyber terrorism is not only limited to paralyzing computer infrastructures but it has
gone far beyond that. It is also the use of computers, Internet and information
gateways to support the traditional forms of terrorism like suicide bombings.
Internet and email can be used for organizing a terrorist attack also. Most common
usage of Internet is by designing and uploading websites on which false
propaganda can be pasted. This comes under the category of using technology for
psychological warfare.
Examples of Cyberterrorism
Attacks that lead to death or bodily injury, explosions, plane
Examples of Cyber
terrorism
Middle East terrorist groups--such as Hizballah, HAMAS, and
Types of Cybercrime
SOFTWARE PIRACY:
CASE LAWS
has been charged as stealing secret information from Intel for its
new employer and Intel's rival Advanced Micro Devices (AMD)
The Pune scam was the first among the many BPO frauds that made
MMS Scams
The Multimedia Messaging Service,
MMS scandals
In 2004 a DPS (Delhi Public School) student filmed a sexually explicit video clip
of his classmate in a compromising position on his cell phone, forwarded the video
via MMS to his friends. The clip was then put up on Bazee.com and widely
circulated.
Case of the State of Tamil Nadu Vs Suhas Katti is notable for the fact that the
conviction was achieved successfully within a relatively quick time of 7 months
from the filing of the FIR .
The case related to posting of obscene, defamatory and annoying message about a
divorcee woman in the yahoo message group. Additional Chief Metropolitan
Magistrate, delivered the judgment on 5-11-04 as follows:
The accused is found guilty of offences under section 469, 509 IPC and 67 of IT
Act 2000 and the accused is convicted and is sentenced for the offence to undergo
RI for 2 years under 469 IPC and to pay fine of Rs.500/- and for the offence u/s
509 IPC sentenced to undergo 1 year Simple imprisonment and to pay fine of
Rs.500/- and for the offence u/s 67 of IT Act 2000 to undergo RI for 2 years and to
pay fine of Rs.4000/- All sentences to run concurrently.
THANK YOU