Documente Academic
Documente Profesional
Documente Cultură
CYBER CRIME
activities done with criminal intent in cyberspace.
Types of cybercrimes : Unauthorized access
WHAT IS PHLASHING?
CAUSES ?
Large number of NEEDS across corporate/gov.
networks
NEEDS ignored during audits Poor security updation Lack of solutions
PHLASH DANCE
is a generic fuzzing framework
Phlash Dance tool fuzzes binaries in firmware and the
firmwares update application protocol to cause a PDOS, and it detects PDOS weaknesses across multiple embedded systems.
1996
Information Technology Act 2000
damage
NIIPA
Enacted by U.S govt.
Consists of several subsections against:-
Unauthorized access
Extraction of information Bans accessing computers without permission
IT ACTS 2000
Accept files in digital format
Legalizes E-mails Digital signature and records E-governance
IT ACT 2000(CONT.)
Internet services on license
Sets territorial jurisdiction of Adjudicating officers
S. 506
Forgery of electronic records
S.465
Bogus websites, cyber frauds, phishing
S.420
Email spoofing
S. 465, 419
DRAWBACKS OF IT ACT
Doesnt talk about rights and liabilities of DNS holder
Electronic payment gateway Internet is a borderless medium Lacks implementation
cyber theft
Chat room abuse Misuse of credit card numbers implimentation
CONCLUSION
The new legislation which can cover all the aspects of
the Cyber Crimes should be passed so the grey areas of the law can be removed.
The softwares are easily available for download should
FUTURE SCOPE
Indian needs a good techno-legal expertise to tackle the growing menace of cyber crimes.
REFERENCES
1.http://arstechnica.com/security/news/2008/05/phlash ing-attacks-could-render-network-hardwareuseless.ars 2.http://www.darkreading.com/authentication/16790107 2/security/clientsecurity/211201088/permanentdenial-of-service-attack-sabotages-hardware.html 3.http://www.infosecwriters.com/text_resources/pd f/Defense_DDoS.pdf
THANK
YOU
QUERIES??