Professional Documents
Culture Documents
• Virus Dissemination
– Malicious software that attaches itself to other software. For ex.
Virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit
and Bacterium are the malicious software.
Continue.. Thank You
• Software Privacy
– Theft of software through the illegal copying of genuine
program or the counterfeiting and distribution of products
intended to pass for the original.
– Retail revenue losses worldwide are ever increasing due of
this crime.
– It can be done using various ways such as End user
copying, Hard Disk loading, Counterfeiting, Illegal
downloads from internet etc.
Continue.. Thank You
• Credit Card Fraud
– You simply have to type credit card number into www page
of the vendor for online transaction.
– If electronic transactions are not secured the credit card
numbers can be stolen by the hackers who can misuse this
card by impersonating the credit card owner.
• Phishing
– It is technique of pulling out confidential information from
the bank/financial institutional account holders by
deceptive means.
Hacking Thank You
• In computer networking, hacking is any technical effort to
manipulate the normal behavior of network connections and
connected systems.
• Step-2 Analysis
During the analysis phase an investigator recovers evidence
material using a number of different methodologies and tools.
• Step-3 Reporting
When an investigation is complete the data is presented, usually in
the form of a written report, in lay person’s terms.
Computer Language
Thank You
• A computer follows the instructions given by the programmer
to perform a specific job.
The first language similar to English was developed in 1950 which was
known as Assembly Language or Symbolic Programming Languages.
Continue.. Thank You
3) THIRD GENERATION LANGUAGES (3GLs ) (High Level
Languages)
Without permission
Accesses or secures access to computer, computer system or
computer network.
Downloads, copies or extracts any data, computer data base or
information from such computer resource.
Introduces or causes to be introduced any computer
containment or computer virus into any computer resources.
Damages or causes to be damaged any computer resource.
Problem
Offences Under the ActOverview
Tampering with the computer source documents.
Hacking with computer system.
Publishing of information which is obscene in electronic form.
Power of Controller to give directions.
Directions of Controller to a subscriber to extend facilities to decrypt
information.
Protected system.
Penalty for misrepresentation.
Penalty for breach of confidentiality and privacy.
Penalty for publishing Digital Signature Certificate false in certain
particulars.
Publication for fraudulent purpose.
Act to apply for offence or contravention committed outside India.
Confiscation
Penalties or confiscation not to interfere with other punishments.
Power to investigate offences.
Who is Liable Problem
?? Overview