You are on page 1of 28

Cyber Crime & the Acts Dealing with Cyber Crime

Mohit Goyal SKIT, JAIPUR (10ESKCS058)

Contents

Cyber Crime Cyber Threat Evolution Types of Cyber Crime Security Incident Report (year 2013 !arious Cyber "cts
Intellectual #roperty Ri$hts (I#R Copyri$ht "ct

%o& to protect your computer Conclusion

*Cyber crime
'ffence &ith a criminal motive usin$ modern telecommunication net&or(s

Cyber Threat Evolution


!irus
+alicious Code (+elissa Identity Theft (#hishin$

)rea(in$ *eb Sites

"dvanced *orm , Tro-an

'r$anised Crime .ata Theft/ .oS , ..oS

1055

1001

2000

2003203

2001204

2010211

Security Incidents reported during 2011

Security Incident Report

Security Incidents reported during 2008

Types o Computer or Internet Crimes


%ac(in$ Spreadin$ of !iruses 6 *orms .ata Theft Credit Card 7rauds Cyber Terrorism +oney 8aunderin$ Cyber Stal(in$ Intellectual #roperty Theft Identity Theft Contd9

*Contd...
*Child #orno$raphy *'nline :amblin$ *'nline 7rauds ( 310 Scams/ 8ottery Scams *Sale of ille$al articles li(e narcotics/ &eapons/
&ildlife *Tamperin$ of Source .ocuments; *7inancial 7rauds

CYBER STALKING

CYBER STALKING IS THE USE OF THE INTERNET OR OTHER ELECTRONIC MEANS TO STALK SOMEONE. IT INVOLVES THREATENING BEHAVIOUR SUCH AS :FOLLOWING A PERSON MAKING PHONE CALLS, LEAVING WRITTEN MESSAGES OR OBJECTS,

HACKING

"HACKING" IS A CRIME, WHICH ENTAILS CRACKING SYSTEM AND GAINING UNAUTHORIZED ACCESS TO THE DATA STORED IN THEM.

E<"+#8ES "RE =2
THEFT OF INFORMATION - i !"#$%& i '()*+,i( &,()%$ i !(*-#,%) .+)$ $i&/&, )%*(0+1"% &,()+2% *%$i+ DENIAL OF SERVICE - '"(($i 2 !(*-#,%) )%&(#)!%& 3i,. *()% )%4#%&,& ,.+ i, !+ .+ $"% i.%, !)+&.. VIRUS/WORMS - -)(2)+*& ,.+, +,,+!. ,.%*&%"0%& ,( + !(*-#,%) () + 'i"% +''%!, ,.% $+,+ ( + !(*-#,%), %i,.%) 15 +",%)i 2 () $%"%,i 2 i,. W()*&, # "i/% 0i)#&%& $( (, %%$ ,.% .(&, ,( +,,+!. ,.%*&%"0%& ,(.

LOGIC BOMBS - $%-% $% , -)(2)+*& !)%+,%$ ,( $( &(*%,.i 2 ( "5 3.% + !%),+i %0% , (!!#)&.

PHISHING

PHISHING IS TRYING TO FOOL PEOPLE INTO PARTING WITH THEIR MONEY. IT REFERS TO :RECEIPT OF UNSOLICITED EMAILS BY CUSTOMERS, RE6UESTING THEM TO ENTER THEIR USERNAME, PASSWORDS OR OTHER PERSONAL INFORMATION.

CROSS SITE SCRIPTING

CROSS-SITE SCRIPTING 78SS9 FOUND IN WEB APPLICATIONS WHICH ALLOW CODE INJECTION BY MALICIOUS WEB USERS INTO THE WEB PAGES VIEWED BY OTHER USERS TO BYEPASS ACCESS CONTROLS.

E2:- FACEBOOK, ORKUT

CYBER S6UATTING

CYBER S6UATTING IS THE ACT OF REGISTERING A FAMOUS DOMAIN NAME AND THEN SELLING IT FOR A FORTUNE.

E2:- IF SOMEONE PURCHASED THE DOMAIN NAME "*!$( +"$&.3&" AND THEN PROCEEDED TO ATTEMPT TO SELL IT BACK TO M!D( +"$&. >'TE= Internet domain name re$istrations are for a fi?ed period of time;

Intellectual !roperty Right


Intellectuals Solve Problems; Geniuses prevents them Albert Einstein

"hat is Intellectual !roperty #


Creation of human mind and intellect Idea or a concept or a thou$ht at the be$innin$ Research and .evelopment to lead the idea or thou$ht to practice The outcome of these ideas may be development of products/ processes/ &or(s mar(s and desi$n/ etc;

W.5 IPR i& i*-(),+ ,:


@ Re&ard ori$inal efforts @ Stimulate innovation and creativity @ #revent duplication of &or(A @ Commercial value in researchA @ #revent e?ploitation of &or(ersA @ Technical information for research 6 to prevent liti$ationA

Forms of IPR

!atent

#atent defined in #atents "ct as Bpatent $ranted for any invention under the "ctC;
Territorial (national) Statutory exclusive right Granted by the Government To inventor or their assignees In consideration of disclosure of the invention to the government To prevent third parties not having his consent from making, using,

offering for sale, selling or importing for those purposes the products or products produced by the patented processes (Sec. !)
"or a limited period of time (#$ years) %ualified rights &ith duties and liabilities

Copyright $ct

'b-ective= To ensure protection from unla&fully e?ploitation of the &or( of o&ner("uthor

Copyri$ht act provides e?clusive ri$hts to authors and other o&ners of ori$inal &or(s;

E?clusive privile$e to authors to reproduce/ distribute/ perform/ or display their creative &or(s;

&iterary

'ramatic

(usical

$rtistic

%ilms

Trademar)

*ord or symbol used by manufacturers to identify $oods; Customer able to distin$uish product of one manufacturer from that of other; Initial re$istration for 10 yrs and further rene&ed by payment of fees for unlimited period;

LABEL

PEPSI ' C(CA C()A

! TATA ' *IR)A ' G(+REJ' Relian$e


NAME

&a*s in India

Trade mar(s DThe Trademar(s "ct 1000 Copy Ri$ht *or(s2 The Copyri$ht "ct 1015 .esi$ns2 lines colours shapes etc; DThe .esi$ns "ct 2000 Inventions2 #roducts or #rocess2The #atents "ct 1050

"pproach to the protection of Intellectual #roperty

S& ose yo& in,ent a )a to ' +issol&tionTest A a%at&s -ith ne-e% .eat&%es Re"iste% Patent .o% the te$hnolo"y, +esi"n .o% the a ea%an$e,

T%a/e0a%1 .o% its 2%an/ an/ Co y%i"ht .o% the a$$o0 anyin" lite%at&%e#

*Protect your Computers


*Ese anti2virus * .onFt open emails or attachments from un(no&n
sources

*Ese hard2to2$uess pass&ords; *)ac(2up your computer data

Contd9

*Contd
*.onFt share access to your computers *If you have a *i27i net&or(/ pass&ord protect it *8o$out *Reevaluate your security on a re$ular basis

Conclusion
Obviously computer crime is on the rise, but so is the awareness an ability to !ight it"# Law en!orcement reali$es that it is happening more o!ten than it is reporte an are oing there best to improve e%isting laws an create new laws as appropriate"# &he problem is not with the awareness or the laws, but with actually reporting that a crime has occurre "# 'ope!ully people will begin to reali$e that unless they report these crimes an get convictions, those committing computer crimes will continue to o so"

Than) +ou,

You might also like