SlideShare a Scribd company logo
3
Most read
5
Most read
12
Most read
Global Technical Campus, Jaipur
“IT act Case Study”
DEPARTMENT OF INFORMATION TECHNOLOGY
1
Presented by-
Jayati Tiwari
HACKING
CONTENTS
•Cyber crime - Introduction
•Types
•How it is committed?
•What is IT Law & Cyber Law?
•Case Study
•Verdict
•Quick facts about cyber crime.
•Recommendations
3
What is Cyber crime???
•Cyber crime is simply defined as crimes that
are directly related to computers and using
computers.
•A personal computer connected to the Internet
without protection may be infected with
malicious software within a minute.
Hacking
Every act committed towards breaking into a
computer and/or network is hacking. Hackers
write or use ready-made computer programs to
attack the target computer.
4
Types
Target group of
computer
devices
Target personal
computer
devices
Against
Person
Against
Property
Against
Govt.
Denial of
service
Malware
Computer
Viruses
Transmission
of indecent
material
Harassment
(racial,
religious
etc.)
Computer
Vandalism
Transmission
of harmful
programs
Terrorize
international
Govt.
Cracking
into
military
maintained
website
5
How it is Committed ???
Unauthorized access
Unauthorized access means
any kind of access without the
permission of either the
rightful owner or the person in
charge of a computer,
computer system or computer
network.
6
Hacking
Every act committed towards breaking
into a computer and/or network is
hacking. Hackers write or use ready-
made computer programs to attack the
target computer.
Trojan Attack
The program that act like
something useful but do the
things that are quiet damping.
The programs of this kind are
called as Trojans.
Virus and Worm attack:-
A program that has capability to infect
other programs and make copies of itself
and spread into other programs is called
virus.
Programs that multiply like viruses but
spread from computer to computer are
called as worms.
Email spoofing
Email spoofing refers to email that appears to
have been originated from one source when it
was actually sent from another source.
10
Phishing scams and fraud
A ‘phisher’ may use spoof emails to direct a
computer user to fraudulent websites to elicit
a transfer of money, or sensitive information
such as passwords or credit card
details, from the user.
•Cyber law or Internet law is a term that
encapsulates the legal issues related to use of
the Internet. It is less a distinct field of law
than intellectual property or contract law, as
it is a domain covering many areas of law and
regulation. Some leading topics include
internet access and usage, privacy, freedom of
expression.
What is IT Law and Cyber Law ??
•IT Law is a set of legal enactments,
currently in existence in several countries,
which governs the digital dissemination of
both (digitalized) information and software.
12
Case study
.
13
e-bay.in is the most popular online shopping mall providing free online
auctions for products like mobiles/cell phones, cameras, computers, etc.
Bhubaneswar: Rourkela police busted a racket involving an online fraud
worth Rs 12.5 lakh.
In Jan 2012 ,Two persons, including alleged mastermind Debasis Pandit,
a BCA student, were arrested and forwarded to the court of the sub
divisional judicial magistrate, Rourkela the other arrested person is Rabi
Narayan Sahu.
The ebay case
Pandit allegedly hacked into the eBay India site using XSS Scripting and gathered
the details of around 700 credit cardholders. He then made purchases by using their
passwords.
The fraud came to the notice of eBay officials when it was detected that several
purchases were made from Rourkela while the customers were based in cities such as
Bangalore, Baroda and Jaipur and even London.
The company brought the matter to the notice of Rourkela police after some
customers lodged complaints
Pandit used the address of Sahu for delivery of the purchased goods
The gang was involved in train, flight and hotel reservations.
15
What they did ???
Verdict
A case has been registered against the accused under Sections 420
and 34 of the Indian Penal Code and Section 66 of the IT Act and
further investigation is on, he said.
Section 66
Any person who sends, by means of a computer resource or a
communication device
shall be punishable with imprisonment for a term which may
extend to three years and with fine.
Section 420 Of Indian Penal Code
covers offences relating to cheating and dishonestly inducing
delivery of property, and leads to punishments of fines
and/or jail terms of up to 7 years and is liable to pay the total
amount with fine of 1 lakh.
Section 34 of Indian Panel Code :
When a criminal act is done by several persons in
furtherance of the common intention of all, each of such
persons is liable for that act in the same manner as if it
were done by him alone.
Quick Facts about Ciber Crime
29.9 million people fell victim to cybercrime,
$4 billion in direct financial losses,
$3.6 billion in time spent resolving the crime,
4 in 5 online adults (80%) have been a victim of Cybercrime,
17% of adults online have experienced cybercrime on their mobile phone.
Source: Norton Cybercrime Report 2011
18
What can be done???
More Public awareness campaigns
Training of police officers to effectively combat
cyber crimes
More Cyber crime police cells set up across the
country
Websites aid in creating awareness and
encouraging reporting of cyber crime cases
Specialised Training of forensic investigators
and experts
Active coordination between police and other
law enforcement agencies and authorities is
required.
19
Conclusions
Cybercrime greatly affects individuals, businesses, and
national security due to the pervasiveness of the Internet .
Different countries should work together and use legal,
organizational, and technological approaches to combat
cybercrime
•To reduce the damage to critical infrastructures
•To protect the Internet from being abused
"The modern thief can steal more with a computer than with
a gun. Tomorrow's terrorist may be able to do more damage
with a keyboard than with a bomb".
20
THANK YOU
21

More Related Content

PPT
Cyber Laws In Pakistan
PPT
Overview of Computer & Internet Crimes in India
PPTX
Cyber crime in india
PPTX
Cyber crime and laws
PPTX
Cyber laws in India
DOCX
Cyber laws with case studies
PPT
Cyber Crime
PPTX
Cyber Crime & Information technology Act 2000
Cyber Laws In Pakistan
Overview of Computer & Internet Crimes in India
Cyber crime in india
Cyber crime and laws
Cyber laws in India
Cyber laws with case studies
Cyber Crime
Cyber Crime & Information technology Act 2000

What's hot (19)

PPTX
Statutory laws pertaining to cybercrimes in india
PPTX
Cyber Crime and Cyber Law of India BY Vinay
PPT
Cyber crime
PPS
State of Cyber Law in India
PDF
Cyber law & information technology
PDF
Case study on cyber crime
PPTX
Cyber laws in pakistan
PPS
Introduction to Cyber law (IT Act 2000)
PPTX
Cyber fraud
PPT
Cyberlaw
PPTX
Cyber Law And Ethics
PPTX
Cyber Crime and laws in Pakistan
PPTX
Cyber law
PPTX
Indian Cyber laws
PPTX
Cyber law
DOCX
Cyber Law and Cyber Crime
PPTX
Cyber law In India: its need & importance
PPT
Cyber Governemace In Pakistan
PPT
Cyber Crime & Law
Statutory laws pertaining to cybercrimes in india
Cyber Crime and Cyber Law of India BY Vinay
Cyber crime
State of Cyber Law in India
Cyber law & information technology
Case study on cyber crime
Cyber laws in pakistan
Introduction to Cyber law (IT Act 2000)
Cyber fraud
Cyberlaw
Cyber Law And Ethics
Cyber Crime and laws in Pakistan
Cyber law
Indian Cyber laws
Cyber law
Cyber Law and Cyber Crime
Cyber law In India: its need & importance
Cyber Governemace In Pakistan
Cyber Crime & Law

Similar to Cyber Crime(Hacking) - IT acts (20)

PPTX
cyber law IT Act 2000
PPTX
138740042-cyber-law.pptx
PPTX
Cyber crime p pt
PPTX
Cyber Crimeand Cyber Laws
PPTX
Cyber crime ✔
PPTX
Asis Verma cyber crime ppt
PPTX
cyber .pptx
PPSX
Cyber law2
PDF
Laws On Cyber Crimes Alongwith It Act And Relevant Rules Pk Singh
DOC
It act 2000 & cyber crime 111111
PPT
SITA LAB PPT (XYBER CRIME)
PPTX
Pre itact
PPTX
cyber crime in india and law related to cyber crime
PPTX
Cyber Law in India.pptx
PPTX
Cyber law in India: Its need & importance
PDF
Cyberjuuuuuuuuuuhhhhhhcjgfgfvbgggggyyyyy
PPTX
CYBER CRIMES AND IT ACT.pptx
PPTX
Cyber crime ppt
PDF
Cybercrimeppt 160421074211
PPTX
Business law
cyber law IT Act 2000
138740042-cyber-law.pptx
Cyber crime p pt
Cyber Crimeand Cyber Laws
Cyber crime ✔
Asis Verma cyber crime ppt
cyber .pptx
Cyber law2
Laws On Cyber Crimes Alongwith It Act And Relevant Rules Pk Singh
It act 2000 & cyber crime 111111
SITA LAB PPT (XYBER CRIME)
Pre itact
cyber crime in india and law related to cyber crime
Cyber Law in India.pptx
Cyber law in India: Its need & importance
Cyberjuuuuuuuuuuhhhhhhcjgfgfvbgggggyyyyy
CYBER CRIMES AND IT ACT.pptx
Cyber crime ppt
Cybercrimeppt 160421074211
Business law

Recently uploaded (20)

PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
A Presentation on Artificial Intelligence
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Getting Started with Data Integration: FME Form 101
PPTX
A Presentation on Touch Screen Technology
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Approach and Philosophy of On baking technology
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Heart disease approach using modified random forest and particle swarm optimi...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
A Presentation on Artificial Intelligence
A comparative analysis of optical character recognition models for extracting...
DP Operators-handbook-extract for the Mautical Institute
Getting Started with Data Integration: FME Form 101
A Presentation on Touch Screen Technology
Enhancing emotion recognition model for a student engagement use case through...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Programs and apps: productivity, graphics, security and other tools
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
OMC Textile Division Presentation 2021.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Approach and Philosophy of On baking technology
TLE Review Electricity (Electricity).pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...

Cyber Crime(Hacking) - IT acts

  • 1. Global Technical Campus, Jaipur “IT act Case Study” DEPARTMENT OF INFORMATION TECHNOLOGY 1 Presented by- Jayati Tiwari
  • 3. CONTENTS •Cyber crime - Introduction •Types •How it is committed? •What is IT Law & Cyber Law? •Case Study •Verdict •Quick facts about cyber crime. •Recommendations 3
  • 4. What is Cyber crime??? •Cyber crime is simply defined as crimes that are directly related to computers and using computers. •A personal computer connected to the Internet without protection may be infected with malicious software within a minute. Hacking Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. 4
  • 5. Types Target group of computer devices Target personal computer devices Against Person Against Property Against Govt. Denial of service Malware Computer Viruses Transmission of indecent material Harassment (racial, religious etc.) Computer Vandalism Transmission of harmful programs Terrorize international Govt. Cracking into military maintained website 5
  • 6. How it is Committed ??? Unauthorized access Unauthorized access means any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. 6
  • 7. Hacking Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready- made computer programs to attack the target computer.
  • 8. Trojan Attack The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans.
  • 9. Virus and Worm attack:- A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. Programs that multiply like viruses but spread from computer to computer are called as worms.
  • 10. Email spoofing Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source. 10
  • 11. Phishing scams and fraud A ‘phisher’ may use spoof emails to direct a computer user to fraudulent websites to elicit a transfer of money, or sensitive information such as passwords or credit card details, from the user.
  • 12. •Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet. It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include internet access and usage, privacy, freedom of expression. What is IT Law and Cyber Law ?? •IT Law is a set of legal enactments, currently in existence in several countries, which governs the digital dissemination of both (digitalized) information and software. 12
  • 14. e-bay.in is the most popular online shopping mall providing free online auctions for products like mobiles/cell phones, cameras, computers, etc. Bhubaneswar: Rourkela police busted a racket involving an online fraud worth Rs 12.5 lakh. In Jan 2012 ,Two persons, including alleged mastermind Debasis Pandit, a BCA student, were arrested and forwarded to the court of the sub divisional judicial magistrate, Rourkela the other arrested person is Rabi Narayan Sahu. The ebay case
  • 15. Pandit allegedly hacked into the eBay India site using XSS Scripting and gathered the details of around 700 credit cardholders. He then made purchases by using their passwords. The fraud came to the notice of eBay officials when it was detected that several purchases were made from Rourkela while the customers were based in cities such as Bangalore, Baroda and Jaipur and even London. The company brought the matter to the notice of Rourkela police after some customers lodged complaints Pandit used the address of Sahu for delivery of the purchased goods The gang was involved in train, flight and hotel reservations. 15 What they did ???
  • 16. Verdict A case has been registered against the accused under Sections 420 and 34 of the Indian Penal Code and Section 66 of the IT Act and further investigation is on, he said. Section 66 Any person who sends, by means of a computer resource or a communication device shall be punishable with imprisonment for a term which may extend to three years and with fine. Section 420 Of Indian Penal Code covers offences relating to cheating and dishonestly inducing delivery of property, and leads to punishments of fines and/or jail terms of up to 7 years and is liable to pay the total amount with fine of 1 lakh.
  • 17. Section 34 of Indian Panel Code : When a criminal act is done by several persons in furtherance of the common intention of all, each of such persons is liable for that act in the same manner as if it were done by him alone.
  • 18. Quick Facts about Ciber Crime 29.9 million people fell victim to cybercrime, $4 billion in direct financial losses, $3.6 billion in time spent resolving the crime, 4 in 5 online adults (80%) have been a victim of Cybercrime, 17% of adults online have experienced cybercrime on their mobile phone. Source: Norton Cybercrime Report 2011 18
  • 19. What can be done??? More Public awareness campaigns Training of police officers to effectively combat cyber crimes More Cyber crime police cells set up across the country Websites aid in creating awareness and encouraging reporting of cyber crime cases Specialised Training of forensic investigators and experts Active coordination between police and other law enforcement agencies and authorities is required. 19
  • 20. Conclusions Cybercrime greatly affects individuals, businesses, and national security due to the pervasiveness of the Internet . Different countries should work together and use legal, organizational, and technological approaches to combat cybercrime •To reduce the damage to critical infrastructures •To protect the Internet from being abused "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb". 20