group 8 PPT

download group 8 PPT

of 44

Transcript of group 8 PPT

  • 8/8/2019 group 8 PPT

    1/44

    Need for Cyber Law:

    Commercial Disputes to

    Cyber Crime

    Group No.8

    R.Anand

    Prithvi S.R.Vardhan

    S.P.Singh

  • 8/8/2019 group 8 PPT

    2/44

    AIM& OBJECTIVE Highlight the emerging security issues and threats in the cyberspace.

    The legal and constitutional issues and stakes involved.

    Issues related to E-Commerce

    Conflict of laws in Commercial Disputes

    The concerns on privacy, personal liberties and freedoms.

    Identify the possible areas of conflict and operational problems.

    To suggest methods of secure use of cyber space to avoid commercial disputes.

  • 8/8/2019 group 8 PPT

    3/44

    The what of computer/ cyber crime

    The phrase computer crime or computer misuse

    has a precise definition and tends to cover a multitude

    of computer related offences ranging fromunauthorised access to computer and computer stored

    material, causing damage to computer held

    information trafficking in passwords and hacking,

    manufacturing and selling pirated copies of softwareand transmission of objectionable material.

  • 8/8/2019 group 8 PPT

    4/44

    Getting computer crime

    Use of computer-: computer crime involves the use of

    a computer as a primary instrument to facilitate thecrime and the target thereof.

    Offences against the secrecy and integrity of data and

    information systems:- access, without right to a

    computer system is a criminal offense i.e.unauthorized access

  • 8/8/2019 group 8 PPT

    5/44

    Contd.

    Act to modify, delete or damage data or to restrict access to

    data without right.

    Unauthorized transfer of data from a computer system.

    Act to interrupt seriously, without law, a software system

    through the introduction, transmission, modification, deletion

    or damage to data or by restricting access to such data..

  • 8/8/2019 group 8 PPT

    6/44

    Contd.

    Act of production, sale, import, distribute or make available under

    any form, without right of a device or software designed.

    Without right of a password, access code or other such computer

    data allowing total or partial access to a computer system in purpose

    of committing a crime.

    Causing loss of property to a person by the introduction,modification or deletion of computer data by an unauthorized

    access.

  • 8/8/2019 group 8 PPT

    7/44

    REASONS FORCYBER CRIME

  • 8/8/2019 group 8 PPT

    8/44

    Capacity to store data

    storing data in a very small space

    Storing data in a very small space

    To remove or derive information either through

    physical or virtual medium makes it much more

    easier

    Easy to carry and transfer of data.

  • 8/8/2019 group 8 PPT

    9/44

    Easy to access-

    Every possibility of breach isn't due to human

    error, but due to the complex technology.

    logic bomb, key loggers that can steal access

    codes, advanced voice recorders; retina

    imagers etc. that can fool biometric systems

    and bypass firewalls.

  • 8/8/2019 group 8 PPT

    10/44

    Complex-

    The computers work on operating systems and

    these operating systems in turn are composed

    of millions of codes.

    The cyber criminals take advantage of these

    lacunas and penetrate into the computer

    system.

  • 8/8/2019 group 8 PPT

    11/44

    Negligence-

    Negligence provides a cyber criminal to gainaccess and control over the computer system.

    Not providing proper security measures.

    Open and public use of systems.

  • 8/8/2019 group 8 PPT

    12/44

    Loss of evidence-

    Person cant be traced.

    Territorial restrictions

    Jurisdiction irregularities

    Statutory incapability.

  • 8/8/2019 group 8 PPT

    13/44

    CYBERCRIMINALS

  • 8/8/2019 group 8 PPT

    14/44

    Professionalhackers / crackers

    Motivated by the colour of money.

    Employed to hack the site of the rivals and get

    credible, reliable and valuable information.

    Employed to crack the system of the employer

    basically as a measure to make it safer bydetecting the loopholes

  • 8/8/2019 group 8 PPT

    15/44

    Discontented

    employees-

    People who have been either kicked out bytheir employer or are dissatisfied with their

    employer.

    To take revenge they normally hack thesystem of their employee.

  • 8/8/2019 group 8 PPT

    16/44

    Childrenand youngsters between

    the agegroup of 6 18 years

    Children is seen mostly due to the curiosity to

    know and explore the things.

    Prove themselves to be outstanding amongst

    other children in their group.

    The psychological reasons.

  • 8/8/2019 group 8 PPT

    17/44

    Organised hackers-

    Organised together to fulfil certain objective

    political biasfundamentalism

    The Pakistanis are said to be one of the best

    quality hackers in the world. They mainlytarget the Indian government sites with the

    purpose to fulfil their political objectives.

  • 8/8/2019 group 8 PPT

    18/44

    Analysis of cyber crime This phenomenal growth of internet has provided new outlook for computer crimes,

    precisely internet crimes.

    It has survey of 643 computer security practitioner in the worlds largest internet

    using country (USA) . 70% reported a variety of serious computer security breaches other than the most

    common ones of computer viruses, laptop theft or employee not abused.

    74% acknowledged financial losses due to computer breaches

    42% admitted to have suffered loss amounting $265, 589, 940

    Average total loss over the last three years was $120, 240, 180. 20 companies admitting to have suffered a loss exceeding $1 million as a result of

    computer breakings and $2.8 billion against software piracy.

  • 8/8/2019 group 8 PPT

    19/44

    First step to cybercrime resultingcommercial dispute

    The first recorded cyber crime took place in the year 1820!

    In 1820, Joseph-Marie Jacquard, a textile manufacturer in France,produced the loom. This device allowed the repetition of a series of

    steps in the weaving of special fabrics. This resulted in a fear amongst

    Jacquard's employees that their traditional employment and livelihood

    were being threatened. They committed acts of disruption to

    discourage Jacquard from further use of the new technology. This is

    the first recorded cyber crime which further started a series of cybercommercial crimes.

  • 8/8/2019 group 8 PPT

    20/44

    MODE ANDMANNER

    OF COMMITING

    CYBER CRIME

  • 8/8/2019 group 8 PPT

    21/44

    (1) Phishing

    Look alike of original website/e-mail;

    Targeted over Financial Institutions &Banks; Divulge Financial Information;

    Divulge Personal Info. (Ex:Password,etc.)

    Copying of logos and other information fromoriginal website.

  • 8/8/2019 group 8 PPT

    22/44

    (A)Risks Impounded

    By being truly responsive, you loose your

    money;

    New Credit card/BankA/c could be opened;

    Risk exposing your computer data by clicking

    on the link.

  • 8/8/2019 group 8 PPT

    23/44

    (2)Malicious Codes Contain Codes that disrupts Data

    That need Host Program

    (A) Trap Doors(B)Logic Bombs

    (c)Trojan Horses

    (D) Virus

    That are independent

    (A) Worms

    (B) Zombie

  • 8/8/2019 group 8 PPT

    24/44

    (A) Trap Doors

    Secret Entry Point No SecurityAccess Procedure

    Used to debug or test run program

  • 8/8/2019 group 8 PPT

    25/44

    (B) Logic Bombs

    Works on specified conditions

    Predefined events should occur Sends a note to attacker when victim is online

    The attacker then triggers the bomb.

  • 8/8/2019 group 8 PPT

    26/44

    (C) TrojanHorse

    Contains Hidden Codes Destructs Files

    Creates Trap Doors in login programmed.

  • 8/8/2019 group 8 PPT

    27/44

    (D)Virus

    Replicates Modifies other programes

    Leaves a copy in each program

    Thus creates Trojan

  • 8/8/2019 group 8 PPT

    28/44

    (A) Zombie

    This is installed on Third Party PC; Works over Internet attached PCs;

    Uses Third Party PC to instigate attacks on

    other secure networks, so as to be difficult to

    trace.

  • 8/8/2019 group 8 PPT

    29/44

    (B) Worms

  • 8/8/2019 group 8 PPT

    30/44

    Denial of Service Attacks Origin of Denial of Service Attack (DOS)

    Operation of DOS

    Exemplification of DOS Attack. Concepts and Logical Weaknesses

    Definition

    Internals of Concepts and Logical Weaknesses

    Function of SQL as an Internal

    Hash function as another agent of DOS

  • 8/8/2019 group 8 PPT

    31/44

    Identity Theft Pattern of Identity theft

    Perpetuation of ID Theft

    ID Theft Victims

    Recourse available in cases of ID Theft

    Recording of action

    Contacting police

    Contacting Security Department of the Credit Card Company

    Informing Bank Investigation Of ID Theft and Construction of Evidence

  • 8/8/2019 group 8 PPT

    32/44

    Advance Fee Fraud

    Repercussions of Advance Free Fraud. Modus Operandi

  • 8/8/2019 group 8 PPT

    33/44

    Cyber Crime &

    E-Commerce

  • 8/8/2019 group 8 PPT

    34/44

    The What Web- Shopping;

    Bond Transactions; Online Stock;

    Buying and Downloading Software;

    Commercial Transactions;

  • 8/8/2019 group 8 PPT

    35/44

    Types of E-Commerce

    Business-to-Business (B2B);

    Business-t-Consumer (B2C);

    Consumer-to-Consumer (C2C);

    Paypal, Ibill, Moneybookers, WaxDigital,etc.,

  • 8/8/2019 group 8 PPT

    36/44

    Projections B2B Asia-Pacific > Over $5 Trillion;

    173 Million Internet users; Indian IT Sector grew at 30% threw the

    decade >> NASSCOM;

    Rs. 450 Crore E-Commerce Transaction inIndia in 1999-2000.

  • 8/8/2019 group 8 PPT

    37/44

    Vehicles

    World Wide Web; Telephone;

    E-mail;

    Fax;

  • 8/8/2019 group 8 PPT

    38/44

    Benefits

    Cuts Cost; Saves time;

    Variety of products;

    Vast reach.

  • 8/8/2019 group 8 PPT

    39/44

    ProminentCyberCommercial Disputes

    1. Beijing Oylmpics Internet Ticket Scam.2. Global Pension Trust Insurance Dispute.

    3. E-Ticket Cyber Dispute

    4. Google Cyber Attacks and subsequentwithdrawal calls.

  • 8/8/2019 group 8 PPT

    40/44

    Recognition and Enforcement

    A. Conflict of Laws

    B. Jurisdiction

  • 8/8/2019 group 8 PPT

    41/44

    (A) Conflict of Laws Lex Loci Deciti;

    Most Significant Relationship Test:

    I. Needs of International System;II. Relevant policies of both the nations;

    III. Justified expectations of parties;

    IV. Ease of Administration;

    Article 4 Rome Convention.

  • 8/8/2019 group 8 PPT

    42/44

    (B) Jurisdiction Article 5 Rome Convention (place of

    performance of obligation).

  • 8/8/2019 group 8 PPT

    43/44

    Suggestions and Conslusion

    Awareness and Training ;

    Skilled Investigators;

    Trained Judges;

    Efficient Enforcement;

    Updated Information.

  • 8/8/2019 group 8 PPT

    44/44

    Thank You

    For your patient attentiveness