Beruflich Dokumente
Kultur Dokumente
CYBER CRIME
&
IT ACT 2000
Insiders (employees)
Hackers (cyber-mercenaries)
Criminals (serious & organized crime)
Terrorists (sub-state groups)
Corporations (commercial espionage)
Government agencies (counterintelligence)
Revenge
Ideology
Competition
Money
Influence
VICTIMS
Because of :
Anonymity
Computers storage capacity,
Weakness in Operating System,
Lack off Awareness off user.
NET EXTORTION
PHISHING
SPOOFING
CYBER STALKING
CYBER DEFAMATION
THREATENING
SALAMI ATTACK
1. HACKING
3. VIRUS DISSEMINATION
VIRUSES
A program that has capability to infect other programs
and make copies of itself and spread into other
programs is called virus.
software that piggybacks on other software and
runs when you run something else
Macro in excel, word
Transmitted through sharing programs on
bulletin boards
Passing around floppy disks
An .exe, .com file in your email
WORMS
Programs that multiply like viruses but spread from computer
to computer are called as worms.
Software that uses computer networks to find security holes
to get in to your computer usually in Microsoft OS. But
worm for MAC was recently written.
4. SOFTWARE PIRACY
Theft of software through the illegal copying of
genuine programs or the counterfeiting and
distribution of products intended to pass for the
original.
5. PORNOGRAPHY
6. IRC CRIME
Internet Relay Chat (IRC) servers have chat rooms in
which people from anywhere the world can come
together and chat with each other
Criminals use it for meeting coconspirators.
Hackers use it for discussing their exploits / sharing the
techniques.
Pedophiles use chat rooms to allure small children.
Cyber Stalking - In order to harass a woman her
telephone number is given to others as if she wants to
befriend males.
7. FINANCIAL FRAUD
8. NET EXTORTION
9. PHISHING
10. SPOOFING
13. THREATENING
International initiatives
Representatives from the 26 Council of Europe members, the
United States, Canada, Japan and South Africa in 2001 signed a
convention on cyber crime in efforts to enhance international
cooperation in combating computer-based crimes.
The Convention on Cyber crime, drawn up by experts of the
Council of Europe, is designed to coordinate these countries'
policies and laws on penalties on crimes in cyberspace, define
the formula guaranteeing the efficient operation of the criminal
and judicial authorities, and establish an efficient mechanism
for international cooperation.
In 1997, The G-8 Ministers agreed to ten "Principles to Combat
High-Tech Crime" and an "Action Plan to Combat High-Tech
Crime."
IT ACT 2000
Sections
Sections
Failure to comply with orders of the controller by a Certifying
Authority or any employee of such authority (Sec 68):
Failure to comply with orders of the Controller by any Certifying Authority
or by any employees of Certifying Authority is a punishable offence. Such
persons are liable to imprisonment for a term not exceeding three years or
to a fine not exceeding two lakh rupees or to both.
Fails to assist any agency of the Government to decrypt the
information (Sec 69):
If any subscriber or any person-in-charge of the computer fails to assist or
to extend any facilities and technical assistance to any Government agency
to decrypt the information on the orders of the Controller in the interest of
the sovereignty and integrity of India etc. is a punishable offence under the
Act. Such persons are liable for imprisonment for a term, which may
extend to seven years.
Sections
Unauthorized access to a protected system (Sec 70):
Any person who secures access or attempts to secure access to
a protected system in contravention of the provisions is
punishable with imprisonment for a term which may extend to
ten years and also liable to fine.
Misrepresentation before authorities (Sec 71):
Any person who obtains Digital Signature Certificate by
misrepresentation or suppressing any material fact from the
Controller or Certifying Authority as the case may be punished
with imprisonment for a term which may extend two years or
with fine up to one lakh rupees or with both.
Sections
Sections
Limitations
IT Act, 2000 does not mention about domain names and the rights of
domain names owners.
IT Act, 2000 does not mention about INTELLECTUAL PROPERTY
RIGHTS
IT Act, 2000 does not confer any right upon any person to insist that the
document in questions should be accepted in electronic form.