Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
36 views
20 pages
Nis
Uploaded by
Rutik Misal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Nis For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
36 views
20 pages
Nis
Uploaded by
Rutik Misal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Nis For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save Nis For Later
You are on page 1
/ 20
Search
Fullscreen
BHARATI VIDYAPEETH’S JAWAHARLAL NEHRU INSTITUTE OF TECHNOLOGY, PUNE 43 ACADEMIC YEAR 2023 - 24 COURSE: NETWORK AND INFORMATION SECURITY (NIS) COURSE CODE: 22620 MICRO-PROJECT ON: CASE STUDY ON CYBER SECURITY GUIDE NAME: MISS. S. S. NAIK MICRO PROJECT BY: JYOTI VAGGU (TYCM - A) (11) Signature of Student Signature of GuideACKNOWLEDGEM I WOULD LIKE TO EXPRESS MY SINCERE APPREC: TION TO RESPECTED MISS S. S. NAIK MADAM FOR HER GUIDANCE AND SUPPORT DURING MICRO PROJECT ON NETWORK AND INFORMATION SECURITY (NIS). YOUR ENCOURAGEMENT AND INSIGTES HAVE BEEN VALUABLE TO ME.INTRODUCTION Cybercrime is the use of a computer as an instrument to further illegal ends, such as committing fraud, stealing identities, or violating privacy. It can involve a wide range of activities, including hacking, identity theft, online fraud, cyberbullying, cyberterrorism, and more. Cybercrime is a global concern due to its non local nature, making it challenging for law enforcement to investigate. The Council of Europe Convention on Cybercrime, signed in 2001, is an international treaty aimed at combating cybercrime. Cybercrime can be classified into various types, such as hacking, identity theft, online fraud, cyberbullying, cyberterrorism, and more. Each type of cybercrime involves different methods, motives, and legal implications, making itchallenging to create a comprehensive definition that covers them all HACK THIEF SPY FRAUD INFORMATION HACKING ean i uae [oe)p)a COMMUNICATION PC x ° E 4 8 y fa] g fia] SNe a eS iste} PSS U0 5B) PHISHING DIGITAL DANGERTYPES OF CYBER CRIME Cyber Terrorism: Involves using computers and the internet to perform violent acts that threaten the lives of citizens. It can be defined as an act of terrorism committed through cyberspace or computer resources. Cyber Extortion: Occurs when websites, email servers, or computer systems are subjected to or threatened with repeated denial of service attacks by hackers who demand significant sums of money for protection. Cyber Warfare: Involves using computers, online control systems, and networks in a battle space context for offensive and defensive operations related to cyber attacks, espionage, and sabotage. Internet Fraud: Involves d it or fraud using the internet, which could include hiding information or providing false information to deceive victims for financial gain.Cyber Stalking: Online harassment where victims are bombarded with online messages and emails. Cyber stalkers use the internet to harass victims, and if unsuccessful, may resort to offline stalking in conjunction with cyber stalking. sou —FOLWER = VIRUS TROJAN CLOUD oos © BRUTEFORCE LOGINCYBER LAWS SECTION 65 - Tampering with Computer Source Documents: A person who intentionally conceals, destroys or alters any computer source code (such as programmes, computer commands, design and layout), when it is required to be maintained by law commits an offence and can be punished with 3 years’ imprisonment or a fine of 2 Lakhs INR or both SECTION 66 - Using Password of another person: Ifa person fraudulently uses the password, digital signature or other unique identification of another person, he/she can face imprisonment up to 3 years or/and a fine of 1 Lakh INR.SECTION 66D - Cheating using Computer Resources: If a person cheats someone using a computer resource or a communication device, he/she could face imprisonment up to 3 years or/and fine up to | Lakh INR SECTION 66E - Publishing Private Images of others: Ifa person captures, transmits or publishes images of a person’s private parts without his/her consent or knowledge, the person is entitled to imprisonment up to 3 years of fine up to 2 Lakhs INR or both SECTION 66F - Acts of Cyber Terrorism A person can face life imprisonment if he/she denies an authorized person the access to the computer resource or attempts to penetrate/access a computer resource without authorization, with an aim to threaten the unity, integrity, security or sovereignty of the nation. This is a non- bailable offence.SECTION 67 - Publishing child Porn or predating children online Ifa person captures, publishes or transmits images of a child in a sexually explicit act or induces anyone under the age of 18 into a sexual act, then the person can face imprisonment up to 7 years or fine up to 10 lakhs INR or both SECTION 69 - Government’s Power to block websites If the government feel it necessary in the interest of sovereignty and integrity of India, it can intercept, monitor or decrypt any information generated, transmitted, received or stored in any computer resource. The power is subject to compliance of procedure. Under section 69A, the central government can also block any information from public access.SECTION 434 - Data protection at Corporate level If a body corporate is negligent in implementing reasonable security practices which causes wrongful loss or gain to any person, such body corporate shall be liable to pay damages to the affection person. IT ACT 2000: The Information Technology Act, 2000 is an Act of the Indian Parliament that was notified on October 17, 2000. It aims to provide legal recognition for transactions carried out by electronic means and to facilitate electronic filing of documents with the government agencies. The Act also provides for the establishment of a Controller of Certifying Authorities to regulate the issuance of digital signatures. The Act has been amended several times since its enactment, most notably in 2008 with the introduction of the Information Technology (Amendment) Act, 2008. This amendment expanded the scope of the Act to include new offenses related to cyber terrorism, data protection, and electronic signatures. The Information Technology Act, 2000 is an important piece of legislation that has helped to promote the growth of the IT industry in India and has provided a legal framework for electronic _ transactions and communicationsIT ACT 2008: The Information Technology (Amendment) Act, 2008, commonly referred to as the IT Act 2008, is an amendment to the Information Technology Act, 2000 (IT Act 2000) in India. It was enacted to address emerging iss in the field of information technology and electronic commerce. The IT Act 2008 introduced several new provisions and amendments to the original Act, including: 1.Cyber Terrorism: The IT Act 2008 introduced new provisions related to cyber terrorism, including the definition of cyber terrorism and the penalties for committing cyber terrorism-related offenses. 2.Data Protection: The IT Act 2008 introduced new provisions related to data protection and_ privacy, including the requirement for companies to implement reasonable security practices and procedures to protect sensitive personal data. It also introduced new penalties for offenses related to data theft, hacking, and cyber terrorism. 3.Electronic Signatures: The IT Act 2008 introduced new provisions related to electronic signatures, including the recognition of electronic signatures as legally valid and the establishment of the Controller of Certifying Authorities (CCA) to regulate the issuance of digital signatures.4.Intermediary Liability: The IT Act 2008 introduced the concept of "intermediaries" and provided legal immunity to intermediaries for third-party content hosted on their platforms, subject to certain conditions. 5.Offenses and Penalties: The IT Act 2008 introduced new offen: and penalties related to electronic transactions, including the transmission of offensive or menacing messages through electronic communication. Overall, the IT Act 2008 was a significant amendment to the original IT Act 2000 and played a crucial role in shaping India's legal framework for electronic transactions and communications.CASE STUDY Mumbai businessman, loses over 3 crores in online fraud A garment unit owner has been arrested after a 73-year- old businessman from Mumbai fell prey to an online investment fraud and ended up losing 2 3.61 crore, police said on Wednesday. The Cyber Police have so far frozen an amount of 2 2.20 crore and 330 bank accounts, an official said. The alleged transactions took place between May 20 and October 7 last year after the businessman was contacted by three persons, including two women, online who lured him into investing in a scheme by promising hefty returns, the official said. "They also created a WhatsApp group, made an online agreement with the businessman, and sent it to his email ID. The agreement mentioning the returns on the investments was shared in the group to gain the trust of the businessman," he said. The victim invested & 3.61 crore. As he didn't get any returns on his. investment, he approached the West Region Cyber PoliceStation in Bandra Kurla Complex (BKC) and lodged a complaint. The name of the garment unit owner,Ketab Ali Kabil Biswas, came to the fore during the investigation and he was arrested on charges of cheating and forgery under the Indian Penal Code and the Information Technology Act on Monday. "During the investigation, the cyber police froze % 2.20 crore which had been diverted into two bank accounts. Prima facie, as many as 330 bank accounts used by fraudsters have also been frozen," the official added.ANALYSIS AND SOLUTION OF CASE STUDY Analysis of the Case Study: Incident: A 73-year-old businessman from Mumbai fell victim to an online investment fraud, losing 23.61 crore. The fraudsters lured him into investing by promising high returns. Arrest: The garment unit owner, Ketab Ali Kabil Biswas, was arrested on charges of cheating and forgery under the Indian Penal Code and the Information Technology Act after investigations by the Cyber Police. Recovery: The Cyber Police froze %2.20 crore diverted into two bank accounts and froze 330 bank accounts used by the fraudsters.Solutions: Awareness: Educate individuals about common online scams and the importance of verifying investment opportunities before committing funds. Vigilance: Encourage individuals to be cautious when approached for investments online and to conduct thorough due diligence before transferring money. Reporting: Prompt reporting of suspicious activities to cybercrime authorities like the Cyber Police can help prevent further financial losses and apprehend fraudsters. Legal Action: Strict enforcement of laws related to cybercrimes is essential to deter fraudulent activities and hold perpetrators accountable for their actions.Preventive Measures of Cyber Crime: Keep Security Software Updated: Ensure your security software is current and regularly updated to protect against viruses, malware, and other online threats Secure Your Devices: Activate firewalls, use anti- virus/malware software, and install anti-spyware software to prevent unauthorized access and infections on your devices Use Strong Passwords: Create complex passwords with a combination of letters, numbers, and special characters. Avoid using the same password for multiple accounts and change them regularly Protect Your Data: Encrypt sensitive files, make regular backups, and store them in a secure location to prevent data loss in case of cyber attacks Secure Your Network: Secure your wireless network, review default settings, and avoid conducting sensitivetransactions on public Wi-Fi networks to prevent unauthorized access Be Cautious Online: Avoid sharing personal information online, be mindful of what you post on social media, and verify the authenticity of emails or messages before clicking on links or providing information Stay Informed: lay updated on the latest cyber threats, educate yourself on common online scams, and report any suspicious activities to the relevant authorities for prompt actionREFRENCES Digest_202403011834588558366.pdf Cyber Crime Portal https://www.bing.com/ck/a?!& &p=2c9642126399cf40J mltdHM9MTewOTIIMTIWMCZpZ3 VpZD0xNTMwND EzOS0SNmlyLTY INZUtM2JjOS01Mjk20TewMDY0M GlmaW5zaWQONTMWMQ&pin=3&ver=2&hsh=3& feli d=15304139-96b2-6575-3bc9- 52969700640b&psq=CYBER+CRIME+TYPES&u=ala HROcHMG6Ly93d3cuZ2Vla3Nmb3JnZW VreySvemevY3 1iZXItY3JpbWUvéentb=1THANK YOU !
You might also like
Cyber Law and Cyber Security PDF
PDF
No ratings yet
Cyber Law and Cyber Security PDF
34 pages
Laws and Ethics in Information Security
PDF
No ratings yet
Laws and Ethics in Information Security
25 pages
Cyber Crime Laws in India
PDF
No ratings yet
Cyber Crime Laws in India
19 pages
Cyber Security Laws in India PDF
PDF
No ratings yet
Cyber Security Laws in India PDF
4 pages
Cyber Crimes: Law and Practice : Prepared by Dr.A. Prasanna, Associate Fellow IMG, Thiruvananthapuram
PDF
No ratings yet
Cyber Crimes: Law and Practice : Prepared by Dr.A. Prasanna, Associate Fellow IMG, Thiruvananthapuram
7 pages
Cyber Law Notes
PDF
No ratings yet
Cyber Law Notes
17 pages
IT Act-Notes
PDF
No ratings yet
IT Act-Notes
6 pages
Cyber Crimes Against Individual, Property and Organization
PDF
No ratings yet
Cyber Crimes Against Individual, Property and Organization
9 pages
Paper 3 Information Technology Act 2000-1
PDF
No ratings yet
Paper 3 Information Technology Act 2000-1
20 pages
Cyber Crime in IPC
PDF
No ratings yet
Cyber Crime in IPC
5 pages
White Collar Crime
PDF
No ratings yet
White Collar Crime
25 pages
The Computer Fraud and Abuse Act of 1986
PDF
No ratings yet
The Computer Fraud and Abuse Act of 1986
16 pages
Cyber LAW
PDF
No ratings yet
Cyber LAW
43 pages
Provisions of Cyber Law: Topics Covered Presented by
PDF
100% (2)
Provisions of Cyber Law: Topics Covered Presented by
18 pages
Module 5 - Icf
PDF
No ratings yet
Module 5 - Icf
16 pages
Law and Information Technology
PDF
No ratings yet
Law and Information Technology
22 pages
Cyber
PDF
No ratings yet
Cyber
32 pages
BR - Cyber Law
PDF
No ratings yet
BR - Cyber Law
6 pages
Cyber Crime in India (Autorecovered) - 5
PDF
No ratings yet
Cyber Crime in India (Autorecovered) - 5
20 pages
Information Technology Act
PDF
No ratings yet
Information Technology Act
12 pages
CYBERCRIME
PDF
No ratings yet
CYBERCRIME
18 pages
Cyber Law Big
PDF
No ratings yet
Cyber Law Big
43 pages
Amendment in Other Conventional Laws
PDF
No ratings yet
Amendment in Other Conventional Laws
11 pages
Cyber Crime PPT by SJ
PDF
No ratings yet
Cyber Crime PPT by SJ
34 pages
Unit 5 Cyberlaws
PDF
No ratings yet
Unit 5 Cyberlaws
9 pages
Cyber Violation
PDF
No ratings yet
Cyber Violation
5 pages
Cyber Law
PDF
No ratings yet
Cyber Law
7 pages
IT Act LMS by Deepak Sir
PDF
No ratings yet
IT Act LMS by Deepak Sir
26 pages
CS 5
PDF
No ratings yet
CS 5
12 pages
Cyber Crime-1
PDF
No ratings yet
Cyber Crime-1
8 pages
Information Technology Act, 2000
PDF
0% (1)
Information Technology Act, 2000
24 pages
Subhankar Neogy - Cyber Law & Ethics
PDF
No ratings yet
Subhankar Neogy - Cyber Law & Ethics
10 pages
MBA Law - IT Act
PDF
No ratings yet
MBA Law - IT Act
32 pages
Unit-1 Cyber Crimes
PDF
No ratings yet
Unit-1 Cyber Crimes
8 pages
Legal Method Psda
PDF
No ratings yet
Legal Method Psda
14 pages
Cyber
PDF
No ratings yet
Cyber
11 pages
Impact of Cyber Law in Modern Era With Advancement in Technology and Protection From Rising Threats of Cyber Crimes in Our Socio Economic Sector
PDF
No ratings yet
Impact of Cyber Law in Modern Era With Advancement in Technology and Protection From Rising Threats of Cyber Crimes in Our Socio Economic Sector
6 pages
Print Media - 203
PDF
No ratings yet
Print Media - 203
7 pages
Adi Cyber RP
PDF
No ratings yet
Adi Cyber RP
14 pages
Cyberspace
PDF
No ratings yet
Cyberspace
4 pages
Cybercrime
PDF
No ratings yet
Cybercrime
13 pages
Cyber Laws, Saftety and Security
PDF
No ratings yet
Cyber Laws, Saftety and Security
4 pages
Nformation Echnology CT 000: R T G I A T G R T M C C
PDF
No ratings yet
Nformation Echnology CT 000: R T G I A T G R T M C C
33 pages
Technology Act, 2000: Data Theft - Information
PDF
No ratings yet
Technology Act, 2000: Data Theft - Information
29 pages
Cybercrime
PDF
No ratings yet
Cybercrime
30 pages
Cyber Law
PDF
No ratings yet
Cyber Law
17 pages
Sumit Cyber
PDF
No ratings yet
Sumit Cyber
17 pages
Legal Regulation of Cyber Crimes in India
PDF
No ratings yet
Legal Regulation of Cyber Crimes in India
9 pages
Cyber Laws, Act and Policies: Computer Crime
PDF
No ratings yet
Cyber Laws, Act and Policies: Computer Crime
15 pages
Cyber Security and Safety Sneha Das Mandal
PDF
No ratings yet
Cyber Security and Safety Sneha Das Mandal
11 pages
Combating Cyber Crimes-Law & Enforcement in India
PDF
No ratings yet
Combating Cyber Crimes-Law & Enforcement in India
14 pages
Cyber Crime ND Security
PDF
No ratings yet
Cyber Crime ND Security
4 pages
08-Cyberlaw Assignment Final
PDF
No ratings yet
08-Cyberlaw Assignment Final
5 pages
Primer On Cyber Laws in India - Rajnish Kumar
PDF
No ratings yet
Primer On Cyber Laws in India - Rajnish Kumar
9 pages
Cyber Crime
PDF
No ratings yet
Cyber Crime
32 pages
What Is A Cyber Crime?: Cybercrime in A Narrow Sense (Computer Crime) : Any Illegal Behavior Directed by Means of
PDF
No ratings yet
What Is A Cyber Crime?: Cybercrime in A Narrow Sense (Computer Crime) : Any Illegal Behavior Directed by Means of
11 pages
Security and Legal Issues:: by Dr. Priyadarshi Patni
PDF
No ratings yet
Security and Legal Issues:: by Dr. Priyadarshi Patni
30 pages