0% found this document useful (0 votes)
24 views12 pages

Information Technology Act

The document outlines the Information Technology Act, focusing on digital signatures, electronic records, and various forms of cybercrime, including individual, organizational, and property-related crimes. It details the legal provisions under the IT Act, such as penalties for cyber offenses and the importance of cybersecurity measures. Additionally, it emphasizes the need for preventive actions against cybercrimes to protect personal and organizational data.

Uploaded by

agarwalnaman445
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views12 pages

Information Technology Act

The document outlines the Information Technology Act, focusing on digital signatures, electronic records, and various forms of cybercrime, including individual, organizational, and property-related crimes. It details the legal provisions under the IT Act, such as penalties for cyber offenses and the importance of cybersecurity measures. Additionally, it emphasizes the need for preventive actions against cybercrimes to protect personal and organizational data.

Uploaded by

agarwalnaman445
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Information Technology Act

DIGITAL SIGNATURE
A digital signature for an electronic message is created by using a
form of cryptography and is equivalent to a personal signature on a
written document. The digital signature on a message provides a
unique electronic binding of the identity of the signer to the origin of
the message. A digital signature provides proof of the message origin
and a method to verify the integrity of the message.
Electronic signatures, or e-signatures, enable us to sign legally binding
contracts online without printing a paper or picking up a pen. They are
more convenient than a traditional signature, saving time and postage
as they can be used to sign documents remotely, rendering the
recipient’s location irrelevant and nearly instant results. In return, it’s
easy to see why e-signatures have become a must-have for many small
businesses.
DIGITAL RECORDS
• Examples of electronic records include: emails, websites,
Word/Excel documents, digital purchase receipts, databases,
text messages, social media postings, and information stored
on SharePoint sites
Definition of Electronic Record
• An electronic record is any information created, used and
retained in a form that only a computer can process.
CYBER CRIME
• A cybercrime is a crime that involves a computer or a computer
network. The computer may have been used in committing the
crime, or it may be the target. Cybercrime may harm someone's
security or finances.
• Most cybercrime is committed by cybercriminals or hackers who
want to make money. However, occasionally cybercrime aims to
damage computers or networks for reasons other than profit.
1. Individual Cyber Crimes:

This type is targeting individuals. It includes phishing, spoofing, spam,


cyberstalking, and more.

2. Organization Cyber Crimes:

Classifications The main target here is organizations. Usually, this type of crime is done by
teams of criminals including malware attacks and denial of service attacks.
of 3. Property Cybercrimes:

Cybercrimes
This type targets property like credit cards or even intellectual property
rights.

4. Society Cybercrimes:

This is the most dangerous form of cybercrime as it includes cyber-terrorism.


Most Common Cyber Crimes

1. Phishing and Scam:


Phishing is a type of social engineering attack that targets the user and tricks them by sending fake
messages and emails to get sensitive information about the user or trying to download malicious
software and exploit it on the target system.

2. Identity Theft
Identity theft occurs when a cybercriminal uses another person’s personal data like credit card
numbers or personal pictures without their permission to commit a fraud or a crime.

3. Ransomware Attack
Ransomware attacks are a very common type of cybercrime. It is a type of malware that has the
capability to prevent users from accessing all of their personal data on the system by encrypting them
and then asking for a ransom in order to give access to the encrypted data.
4. Hacking/Misusing Computer Networks
This term refers to the crime of unauthorized access to private
computers or networks and misuse of it either by shutting it down
or tampering with the data stored or other illegal approaches.

5. Internet Fraud
• Internet fraud is a type of cybercrimes that makes use of the
internet and it can be considered a general term that groups all
of the crimes that happen over the internet like spam, banking
frauds, theft of service, etc.
Cyber crime laws in India
Information Technology Act, 2000 (IT Act):
• The important provisions of the Act
Section 43:
• This section of the IT Act applies to individuals who indulge in cyber crimes such
as damaging the computers of the victim, without taking the due permission of
the victim. In such a situation, if a computer is damaged without the owner’s
consent, the owner is fully entitled to a refund for the complete damage.
Section 66:
• Applies to any conduct described in Section 43 that is dishonest or fraudulent.
There can be up to three years of imprisonment in such instances, or a fine of up
to Rs. 5 lakh.
Section 66B:
• This section describes the penalties for fraudulently receiving stolen communication
devices or computers, and confirms a possible three-year prison sentence. Depending on
the severity, a fine of up to Rs. 1 lakh may also be imposed.
Section 66C:
• The focus of this section is digital signatures, password hacking, and other forms of
identity theft. Thi section imposes imprisonment upto 3 years along with one lakh rupees
as a fine.
Section 66D:
• This section involves cheating by personation using computer Resources. Punishment if
found guilty can be imprisonment of up to three years and/or up-to Rs 1 lakh fine.
Section 66E:
• Taking pictures of private areas, publishing or transmitting them without a person’s
consent is punishable under this section. Penalties, if found guilty, can be imprisonment
of up to three years and/or up-to Rs 2 lakh fine.
Section 66F:
• Acts of cyber terrorism. An individual convicted of a crime can face imprisonment of up to
life. An example: When a threat email was sent to the Bombay Stock Exchange and the
National Stock Exchange, which challenged the security forces to prevent a terror attack
planned on these institutions. The criminal was apprehended and charged under Section
66F of the IT Act.
Section 67:
• This involves electronically publishing obscenities. If convicted, the prison term is up to
five years and the fine is up to Rs 10 lakh.
India was the country with the highest number of attacks with 4.5 million cybercrime attacks in 2020. Cybercrime refers
to any criminal behavior committed using an internet-connected computer or other electronic equipment. Cybercrime is
unauthorized access to computer systems criminal behavior. Cybersecurity provides a thorough understanding of how
Cyber Attacks can be controlled or recovered.
Ways to Prevent
Cybercrimes.
• Think twice before clicking on links or opening
attachments.
• Protect your passwords.
• Secure your wireless network
• Verify requests for private information.
• Protect your stuff!
• If it's suspicious, report it!

You might also like