You are on page 1of 9

SEARCH ENGINE SPAMMING

• Alteration or creation of a document with the intent to deceive an


electronic catalog or a filing system
• Some web authors use “subversive techniques” to ensure that their site
appears more frequently or higher number in returned search results.
• Remedy: permanently exclude from the search index
INDUSTRIAL SPYING/ INDUSTRIAL
ESPIONAGE
• Industrial espionage is the covert and sometimes illegal
practice of investigating competitors to gain a business
advantage.
• The target of investigation might be a trade secret such as a
proprietary product specification or formula, or information
about business plans.
• In many cases, industrial spies are simply seeking any data
that their organization can exploit to its advantage.
INCIDENCE OF CYBER CRIMES IN
CITIES
• 17 out of 35 mega cities did not report any case of cyber crime (i.e,
neither under the IT act nor under IPC sections) during the year 2007.
• 17 mega cities have reported 118 cases under it act and 7 megacities
reported 180 cases under various section of IPC.
• There was an increase of 32.6% (from 89 cases in 2006 to 118 cases in
2007) in cases under IT act as compared to previous year (2006),
• And an increase of 26.8% (from 142 cases in 2006 to 180 cases in 2007)
of cases registered under various section of IPC
• Bengaluru (40), Pune (14) and Delhi (10) cities have reported high
incidence of cases (64 out of 118 cases) registered under IT act,
accounting for more than half of the cases (54.2%) reported under the act.
NEED OF CYBER LAW

"The modern thief can steal more with a computer than with a
gun. Tomorrow's terrorist may be able to do more damage
with a keyboard than with a bomb".
IT ACT-2000
• The information technology act, 2000 (IT act), came into
force on 17 October 2000.
• The primary purpose of the act is to provide legal
recognition to electronic commerce and to facilitate filing
of electronic records with the government.
• Information technology act 2000 consisted of 94 sections
segregated into 13 chapters.
IT ACT-2000

Offence section under IT act


• Tampering with computer source documents (With out the permission
of in charge) sec.43
• Hacking with computer systems, data alteration sec.66
• Publishing obscene information sec.67
• Un-authorized access to protected system sec.70
• Breach of confidentiality and privacy sec.72
• Publishing false digital signature certificates sec.73
IT ACT-2000

Crimes under Indian penal code and special laws


• Sending threatening & defamatory messages by email sec
503 & 499 IPC
• Forgery of electronic records sec 463 IPC
• Bogus websites, cyber frauds sec 420 IPC
• Email spoofing & abuse sec 463 & 500 IPC
• Web-jacking sec 383 IPC
• Online sale of drugs NDPS act
• Online sale of arms arms act
GENERAL SAFETY TIPS
•Always change the default admin password on your wifi router to a
strong password known only to you. In addition, always configure your
wireless network to use the latest encryption (contact your network
service provider, in case of any doubt)
•Be cautions while browsing through a public wifi and avoid logging in
to personal professional accounts such as email or banking on these
networks
•Always use virtual keyboard to access net banking facility from public
computers and logout from Banking portal/website after completion of
online transaction also ensure to delete browsing history from web
browser after completion of online banking activity
GENERAL SAFETY TIPS
• Do scan all e mail attachments for viruses before opening them Avoid
downloading email attachments received in e mails from unknown or un
trusted sources
• Be careful while sharing identity proof documents especially if you cannot
verify the authenticity of the company/person with whom you are sharing
information
• Note the IMEI code of your cell phone and keep it in a safe place The operator
can blacklist/ block/trace a phone using the IMEI code, in case the cell phone
is stolen
• Observe your surroundings for skimmers or people observing your PIN before
using an ATM
• Discuss safe internet practices and netiquettes with your friends and family
regularly! Motivate them to learn more about cybercrimes and safe cyber
practices
• Do not save your card or bank account details in your e wallet as it increases
the risk of theft or fraudulent transactions in case of a security breach
• If you think you are compromised, inform authorities immediately

You might also like