0% found this document useful (0 votes)
48 views23 pages

The Information Technology Act Rather Than Giving Information and Technology Gave Rise To More Cyber Crimes

The document discusses cyber crimes in India. It provides an introduction to digital signatures and offenses under the Information Technology Act. It then describes different types of computer glitches like trojans, viruses, and worms that can enable cyber crimes. The document outlines frequently used cyber crimes and national security threats. It examines some case studies and discusses Nasscom's role in addressing cyber issues. It concludes by noting limitations of current laws and recommendations to strengthen protections against cyber crimes.

Uploaded by

Harsh Patel
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views23 pages

The Information Technology Act Rather Than Giving Information and Technology Gave Rise To More Cyber Crimes

The document discusses cyber crimes in India. It provides an introduction to digital signatures and offenses under the Information Technology Act. It then describes different types of computer glitches like trojans, viruses, and worms that can enable cyber crimes. The document outlines frequently used cyber crimes and national security threats. It examines some case studies and discusses Nasscom's role in addressing cyber issues. It concludes by noting limitations of current laws and recommendations to strengthen protections against cyber crimes.

Uploaded by

Harsh Patel
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 23

The Information

Technology Act Rather


than giving information
and technology gave rise
to more Cyber Crimes
Introduction
Digital Signatures
 Legitimacy and Use of Digital Signatures
 Attribution, Acknowledgement and
Dispatch of Electronic Records
 Utility of electronic records and digital
signatures in Government Audits Agencies
 Issuance, suspension & revocation of
Digital Signature Certificates(DSCs)
What is Cyber Crime?
Offences Under the Information
Technology Act

 SECTION 65 (Tampering with computer Source


Document)
 SECTION 66 (Hacking with computer system)
 SECTION 67 (Publishing of information which is
obscene in electronic from)
 SECTION 69 (Directions of a controller to
a subscriber to extend facilities to decrypt
information)
 SECTION 70 (Securing unauthorized
access to protected system)
 SECTION 72 (Penalty for breach of
confidentiality and Privacy)
Types of Computer Glitches
 Trojans
 Types of Trojans
1. Remote Administration Trojans(RATs)
2. Password Trojans
3.Privileges-Elevating Trojans
Viruses
 Types of Viruses
1. File Infector
2. Macro Virus
Worms
 World Famous worms
1. Internet Worm-1988
2. The Span network Worm-1989
3. The Christmas Tree Worm- 1987
NetBus
Frequently Used Cyber Crimes
 Unauthorized access to computer systems
or networks
 Theft of information contained in
electronic form
 Email bombing
 Data diddling
 Salami Attacks
 Denial of service attack
 Virus / worm attacks
 Logic Bombs
 Trojan Attacks
 Internet time thefts
 Web jacking
 Theft of Computer system
 Physically damaging a computer System
National Security threats
 Terrorist Activities
 Intelligence Agencies(I.S.I)
 Law Maker Caught in Web
Cyber Cases:

Case Study 1
Cyber law loopholes torments victim
Case Study 2
Sohonet India Private Ltd.
Case Study 3
State of Tamil Nadu Vs Suhas Katti
Case Study 4
Bazee.com
Nasscom
 Nasscom’s Vision
 Nasscom Membership
 Aims and Objectives
 Partnership with Government
 Global Partnerships
 Research and Thought Leadership
 Quality of product and services
Anti Piracy Activity
Conclusion
The Hurry in which the legislation was passed
without sufficient public debate did not really
served the desire purpose
Cyber torts

Cyber crime in the act is neither comprehensive

nor exhaustive
Ambiguity in the Definitions

Uniform Law

Lack of Awareness

Jurisdiction issues
 Extra territorial application
 Raising a cyber army
 Cyber Savvy Bench
 Dynamic form of Cyber crime
 Hesitation to report offences
Recommendation
Thank You!!!!!

You might also like