Seminar on IT Acts
-
Upload
abhishekac -
Category
Documents
-
view
216 -
download
4
Transcript of Seminar on IT Acts
CYBER CRIME & THE ACTS DEALING WITH
CYBER CRIME
Mohit GoyalSKIT, JAIPUR(10ESKCS058)
Contents Cyber Crime Cyber Threat Evolution Types of Cyber Crime Security Incident Report (year 2013) Various Cyber Acts Intellectual Property Rights (IPR) Copyright Act How to protect your computer Conclusion
*Cyber crimeOffence with a criminal motive using modern telecommunication networks
Cyber Threat EvolutionVirus
Breaking Web Sites
Malicious Code
(Melissa)
Advanced Worm / Trojan
Identity Theft (Phishing)
Organised CrimeData Theft, DoS /
DDoS
1995 2000 2003-04 2005-06 2010-111977
Security Incidents reported during 2011
Security Incident Report
Security Incidents reported during 2008
Types of Computer or Internet Crimes Hacking Spreading of Viruses & Worms Data Theft Credit Card Frauds Cyber Terrorism Money Laundering Cyber Stalking Intellectual Property Theft Identity Theft
Contd…
*Contd...
*Child Pornography*Online Gambling*Online Frauds ( 419 Scams, Lottery Scams)*Sale of illegal articles like narcotics, weapons, wildlife*Tampering of Source Documents.*Financial Frauds
CYBER STALKING CYBER STALKING IS THE USE OF THE INTERNET OR
OTHER ELECTRONIC MEANS TO STALK SOMEONE.
IT INVOLVES THREATENING BEHAVIOUR SUCH AS :-
FOLLOWING A PERSON
MAKING PHONE CALLS,
LEAVING WRITTEN MESSAGES OR OBJECTS,
HACKING
"HACKING" IS A CRIME, WHICH ENTAILS CRACKING SYSTEM
AND GAINING UNAUTHORIZED ACCESS TO THE DATA STORED IN THEM.
EXAMPLES ARE :-
THEFT OF INFORMATION - includes information stored in computer hard disks, removable storage media
DENIAL OF SERVICE - flooding computer resources with more requests than it can handle i.e, crash.
VIRUS/WORMS - programs that attach themselves to a computer or a file affect the data on a computer, either by altering or deleting it.
Worms, unlike viruses don not need the host to attach themselves to.
LOGIC BOMBS - dependent programs created to do something only when a certain event occurs.
PHISHING
PHISHING IS TRYING TO FOOL PEOPLE INTO PARTING WITH THEIR MONEY.
IT REFERS TO :-
RECEIPT OF UNSOLICITED EMAILS BY CUSTOMERS,
REQUESTING THEM TO ENTER THEIR USERNAME, PASSWORDS OR OTHER PERSONAL INFORMATION.
CROSS SITE SCRIPTING
CROSS-SITE SCRIPTING (XSS) FOUND IN WEB APPLICATIONS WHICH ALLOW CODE INJECTION BY MALICIOUS WEB USERS INTO THE WEB PAGES VIEWED BY OTHER USERS TO BYEPASS ACCESS CONTROLS.
Eg:- FACEBOOK, ORKUT
CYBER SQUATTING
CYBER SQUATTING IS THE ACT OF REGISTERING A FAMOUS DOMAIN NAME AND THEN SELLING IT FOR A FORTUNE.
Eg:- IF SOMEONE PURCHASED THE DOMAIN NAME "mcdonalds.ws" AND THEN PROCEEDED TO ATTEMPT TO SELL IT BACK TO McDonalds.
NOTE: Internet domain name registrations are for a fixed period of time.
Intellectual Property Right
Intellectuals Solve Problems;
Geniuses prevents them
Albert Einstein
What is Intellectual Property ? Creation of human mind and intellect Idea or a concept or a thought at the
beginning Research and Development to lead the
idea or thought to practice The outcome of these ideas may be
development of products, processes, works marks and design, etc.
Why IPR is important?•Reward original efforts •Stimulate innovation and creativity•Prevent duplication of work?•Commercial value in research?•Prevent exploitation of workers?•Technical information for research & to prevent litigation?
IPR
Forms of IPR
Patent Patent defined in Patents Act as “patent granted
for any invention under the Act”. Territorial (national) Statutory exclusive right Granted by the Government To inventor or their assignees In consideration of disclosure of the invention to the government To prevent third parties not having his consent from making,
using, offering for sale, selling or importing for those purposes the products or products produced by the patented processes (Sec. 48)
For a limited period of time (20 years) Qualified rights with duties and liabilities
Copyright Act Objective: To ensure protection from unlawfully
exploitation of the work of owner(Author)
Copyright act provides exclusive rights to
authors and other owners of original works.
Exclusive privilege to authors to reproduce,
distribute, perform, or display their creative
works.
Films
Literary Dramatic
Musical Artistic
Trademark Word or symbol used by manufacturers
to identify goods.
Customer able to distinguish product of one manufacturer from that of other.
Initial registration for 10 yrs and further renewed by payment of fees for unlimited period.
LABEL - PEPSI / COCA COLA
NAME - TATA / BIRLA / GODREJ/ Reliance
Laws in India Trade marks –The Trademarks Act 1999 Copy Right Works- The Copyright Act
1957 Designs- lines colours shapes etc. –The
Designs Act 2000 Inventions- Products or Process-The
Patents Act 1970
Approach to the protection of Intellectual Property
Suppose you invent a Laptop/ DissolutionTest Apparatus with newer features
Register
Patent for the technology,
Design for the appearance,
Trademark for its brand and
Copyright for the accompanying literature.
*Protect your Computers*Use anti-virus
* Don't open emails or attachments from unknown sources
*Use hard-to-guess passwords.
*Back-up your computer dataContd…
*Contd…
*Don't share access to your computers
*If you have a Wi-Fi network, password protect it
*Logout
*Reevaluate your security on a regular basis
Conclusion
Obviously computer crime is on the rise, but so is the awareness and ability to fight it. Law enforcement realizes that it is happening more often than it is reported and are doing there best to improve existing laws and create new laws as appropriate. The problem is not with the awareness or the laws, but with actually reporting that a crime has occurred. Hopefully people will begin to realize that unless they report these crimes and get convictions, those committing computer crimes will continue to do so.
Thank You…