You are on page 1of 9

JAMEABHISHEK IHAKKAR

NO 201260101532

U6 C5
Asisignment N
Dat

2012 0l01532

Explan Cybu Oumiuith ecamplein dtail


Cyh ximt any i Ciminal ahvity
invowinnq _Coo mp uttis and ntuwauks. the
d
Cybu Space ntlude ComputenSystems-
Comput netuuaxKs and Intexnt LAN
and WANisalse
Lano paut Cybt 9pace.

CybCximeincpeaatu anything m
oownlsoadinqJlltgal mui u'_te
Sttaling milions ot aupeu xom onin
bank_accounts

Cyhe CHumne defintd as aCuimein


whch Computex is he birt
the Paime A US LLled atool
t e Commit an oense.

Compute Cime is an illegal achvity that


is pePetiattd huaugh
a Cadmpute.

There js na Standatd deinatien


CYBER this woid is sed to
descibe the itua wald Computeas
2

20126o 10 7532

Cyber oime
u. onunebankinq ud
() ke anhvinu iu
S taund ed tawl Scams
(4) ake acxowi Scams
s) Adwanced u
piauob
lo)
Tnidging phama Ceuiealsi
fopy g ht-iinfaihgingSottwaHe
Is) Ceopy xightinfoningin muuic and videe
a) nlint pay ment Cad aud
àlo) Ja-pexson PaymemtCand ud
Lu) Industial Cybe-es pionageand tctovion
12)d wutune Maud.
L

Viscu ndion AcI2coounabuie

In ndia dheinfaumation technology AcI,


Q000 js the mohe egis lation
deals with issues Meloted to we
ComputeAs Compute Systms Cmputin
LnetwcotK and tht Iotexnet. Amendedby
the inamation Teehno lgy Act 2003.

May 2000 both the h.couaes


ndianpaliamtntpaAtd haintezmatian
technolay bi
3

2012 6o 104532

The bil eceivedthe the pALsialent


Jn CLLLgut 20.00 and Came to bKnown
a he intonmaticontechnslgy Act,2000
Cyhenlaws ce Can.tained i n h e Act, 2000

This Act aims to pANiole the egal


natIuetuHe f -CoMmULCe n India
And the Cybelaws have a mal impatt
e-husines cndth n lconamy in
Jndia

The intaumationtechnolsgyAct 20.00alse


Oims tepxovide Jega MECcOqnition
txansactians Canued Qut
by mean5
electonic dactaintEHChange Ond Cothen meann5
o electuonicLommunicaion Commonly
feed o a Llectnonit CommeH ce

what is SL njection ?
S4L injection is aCod injectiontechnigue
tattack data -duivenapplications
in uuhich maliiaus 0L tatements
Jnseuted intoaunentay dd o ecteution

SQL injecion attacdks ahe also Knoun al


SQL ntetiaa insentian atacKs
20126 0104532

SOL njection ane 0fthe m cost

Common appucaion JoLy cttacktechniqH


ed today
fo a cags
9QL jection Hefus
. n which data
Ccsdeinjecticonatacks
is incudedin.
pMenvided b y the e
an 59ueny inSuchi a thot
the ustns put is nated

a s 9 L Code.

aLtt cicks Ccun leod


to
SQL njtetion
pxivilege bypasjcnd a escalation i, dusdose
Coonidentia intcomatien ond Co upHon
clatabase jnfcoumation mong
yfects

what is Hacking eplaintype o hacker

Hacking Heus to the pactice o modifying


and
lteting Computex SotwaHe
handuw ae ho accompish a coal that
Js Cconsidened be Outside tha
CeatoHs igina 0bjechve.
A hackenwi lookfo intexnal and eateanad
9ystem holu a bugs to baea.inte
he System f un
and challeng ing
AKHEE
Pg.No: 5
Date /20

20126OLO 4 932

ypes o Hacke

) Caackets _A_LHacke J ant wheo bxtaks


Seeuuty O n a 5ystem Cuackens
aML hadl.caoxe hatkeHs Chaiacduuzd
IMOHea Mofuuimna Seuuty
beakens and hieves

)Hacktivish Hactiyis1 ate Cons cicous


hackexs ih a Caue

)Gybe tuaxists L8asedonmeivu


Cbentexuauis ts Can be divided
aitohwe Coutegoie i u
AMOusts and intazmatien
Waxfo planntus

ebcplain the need o digital toensica

2igital anensics s pAoce o analying


and Maduuating digital or dataas Videne

Any infconmation Stoed Con a diqital


Media Can b pitce of digital evidence
b be analytrdduing digital cenSi
pMoce.
6

20126OI04532

Computo ufoensie isthe scenie


examination and aunalysis f data held
HetievVd r o , Compstu Asm
Compute meia in Suh. 'a way
had he infvhat con. Can be ued a

widente na Court o
InVutigahve pHoce o digitas on3ics
Caun belividd iinteSvna 9 tag
Digital fens ic pis ce9hes hatdwane oun d
9otwae havé been deigned te wie
Cempilanee with these Mepihemns. h
pHcoc sdigita vens iu is ypically
o tellaws
-

2peuervahion f the Stat fthi device


a) Suvey and analysis
widenLt.
the datafa
(3 Event Heconstuction

cLnsiusthe appicati an InVeahgaHve


and
and cunalytiea technique hat Conom te
v idenany 9tand ands wed in papwate
Lout ofla theJegal
Cordeoc
-SAKHA
P.No
Date: 20

20126 oL04932

Heow d oe Zedattack P o y waxk 9

he2edattack pcoey 5 a n ealy e


we ntgiattdpinctmaion teating-
teol or ningvunabiiti
jn wib R M g c a i a g Cpplicatimns.Zap
p1ovidu autdmattd Sconnens a wel a_
Sed ot twols hat a l a t0.
ind 9ecuyyulnexabiüie manually
Zap is uitenin JaNa ang uag elap
Suppmxt H1IP and HITPs pacotoco.
hepxay nquinulia cenificote in aude
teuminate HIIPsCconnecians

2AP s an ntencepting pay allauusS


Nauo Seeel the HequLAts ycu mak
webaPP and alof au
ou Heceive AMom it.

Zap pHavide a basic PoaMt Sconne whieh


ShoLus twhich pen Con hu
tauget 5itu.
)
y

The API is OWalable Jn JsON HTHL


and XMLa m o t s .
20126 o1o7532

.Eplain Cyb lad Sn detil.

Cybu Jaw als Known Asinteunetlaw


Cybula ishe patt of the
OVla dg System hat is ulated
dnfanmaics and Supeyisu
the oligital Cwation infco maicon.9
CCcgmmdnce Softwant and infa m ation
Secuity
Iis CLs o ct ed with lega nvrmaia
and lecttonc elemends ineuding
ininmcction ys tems ComputAs S0twaHe
aund hatdawans.

t Cove Meuny antas 3uch a accey

the intunt
e c s mpain Vaic0LL Subtopiu wel
as needom _e Aeuion tnd
onune PAIYaCy
Gybela oit legal PHOtecians fan pecaple
who aHe uing th inteunet
c wning an Conunt buinen

You might also like