Publicidad
Publicidad

Más contenido relacionado

Publicidad

ppt cyber law 1.pptx

  1. L E T ’ S F A C E I T : T H E F U T U R E I S N O W Cyber Laws
  2. FIRST THOUGHT
  3. What is cyber crime Cybercrime is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrime may harm someone's security and financial health.
  4. •Confidential business information •Government information and • disable a device It also a cyber crime when the above information is being sold. •Confidential business information •Government information and • disable a device It also a cyber crime when the above information is being sold. •Confidential business information •Government information and • disable a device It also a cyber crime when the above information is being sold. •Confidential business information •Government information and • disable a device It also a cyber crime when the above information is being sold. •Confidential business information •Government information and • disable a device It also a cyber crime when the above information is being sold. It may use a device to access user’s Personal information Confidential business information Government information and  disable a device It also a cyber crime when the above information is being sold.
  5. HISTORY OF CYBER CRIME The first recorded cyber crime was in year 1820 The 1st case of use of computer theft in 1973. A teller at local New York bank used a computer to embezzle over$2 million dollars.  The first spam email took place in 1978 when it was sent over the Arpanet. The first virus was installed on apple computer in 1982
  6. First person to convicted a cyber crime In 1981 LAN MURPHY KNOWN AS CAPTAIN ZAP TO HIS FANS BEEN 1ST to convicted crime He hacked into the AT&T network and changed the internal clock to change off the hours rates of peak times He received 1000hours of community service and 2.5 years of probation, a mere slap on the wrist compared to today’s penalties , and was the inspiration for the movie sneakers.
  7. Categories of cyber crime The computer as a target – using a computer ,e.g. Hacking, virus/worms attacks ,Dos attack etc.
  8. The computer as weapon- using a computer to commit real world crime e.g. cyber terrorism , credit card fraud and pornography etc.,
  9. TYPES OF CYBER CRIME Hacking – Illegal intrusion into a computer system and network known as CRACKING. Though hackers enjoy the media coverage. Motive behind the hackers - Greed, Publicity, revenge , adventure to access forbidden information.
  10. OTHER TYPES OF CYBER CRIME >Dental and service attacks >Virus dissemination >Computer vandalism >Cyber terrorism >Software piracy
  11. Law that uses to protect cyber assets is cyber law or cyber security.
  12. Cyber security is to protect system or cyber assets Cyber law is to protect system or cyber assets in legal way
  13. Roles of Cyber law in India FRAUD
  14. COPYRIGHT
  15. HARASSMENT AND STALKING
  16. FREEDOM OF SPEECH
  17. Trade secrets
  18. s In India cyber law was contained in the information technology Act, 2000 (“IT Act)” NO21 of 2000 notified notified on 17 October 2000. It is the primary law in India dealing with dealing with cyber crime and electronic commerce ETHICAL HACKING
  19. Citation Information Technology Act, 2000 Enacted by Parliament of India Enacted 9 June 2000 Assented to 9 June 2000 Signed 9 May 2000  Commenced 17 October 2000 Introduced by Pramod Mahajan Minister of Communications and Information Technology
  20. What are the key points of IT Act 2000? The Act provides a legal framework for electronic governance by giving recognition to electronic records and digital signatures. It also defines cyber crimes and prescribes penalties for them. The Act directed the formation of a Controller of Certify Authorities to regulate the issuance of digital signatures.
  21. Information Technology Amendment Act 2008 (IT 2008) The Information Technology Amendment Act, 2008 (IT Act 2008) is a substantial addition to India's Information Technology Act (ITA- 2000). The IT Amendment Act was passed by the Indian Parliament in October 2008 and came into force a year later.
  22. WHY WAS IT Act, 2000 amended in 2008? • The IT Amendment Act was passed by the Indian Parliament in October 2008 and came into force a year later. • The Amendment was created to address issues that the original bill failed to cover and to accommodate further development of IT and related security concerns since the original law was passed.
  23. What are the major changes made in the amendment of IT Act in 2008? Section 66A - Sending of offensive or false messages Section 66B - receiving stolen computer resource
  24. S Section 66C - Identity theft Section 66D - Cheating by personation Section 66E - violation of privacy
  25. Monitor any DISCREEPANCY
  26. ssssssssss
  27. Facility in E-Filing of Document
  28. For restricting electronic crime where power in hands of RBI,IPO and Indiance evidence act
  29. Provisions of information technology act 2000 Provisions of Information Technology Act 2000
  30. Section 65 Destroy of computer source code
  31. Section 67,67A,67B Publishing obscene
  32. Section 67C Failure to maintain records Punishment (Imprisonment up to 3 years or with fine or both)
  33. Section 69 Decrypt of data
  34. Section 72 and 72A Breach of Confidentiality and Privacy
  35. Final Thoughts Final Thoughts
Publicidad