Practical File Cyber Laws and IPR Lab (BTIT513-18) : Bachelor of Technology IN Information Technology
Practical File Cyber Laws and IPR Lab (BTIT513-18) : Bachelor of Technology IN Information Technology
BACHELOR OF TECHNOLOGY
IN
INFORMATION TECHNOLOGY
Submitted By:
Jalandhar - 144008
Dec 2021
INDEX
PRACTICAL – 1
Cybercrime is criminal activity that either targets or uses a computer, a computer network or
a networked device.
Most, but not all, cybercrime is committed by cybercriminals or hackers who want to make
money. Cybercrime is carried out by individuals or organizations.
Some cybercriminals are organized, use advanced techniques and are highly technically
skilled. Others are novice hackers.
Rarely, cybercrime aims to damage computers for reasons other than profit. These could be
political or personal.
Cybercriminals are known to access the cybercriminal underground markets found in the
deep web to trade malicious goods and services, such as hacking tools and stolen data.
Cybercriminal underground markets are known to specialize in certain products or services.
Laws related to cybercrime continue to evolve across various countries worldwide. Law
enforcement agencies are also continually challenged when it comes to finding, arresting,
charging, and proving cybercrimes.
1
Anmol Sharma
2003927
• Government- This is the least common cybercrime but is the most serious offence. A
crime against the government is also known as cyber terrorism. It includes hacking
government websites, military websites, or disturbing propaganda.
• Spyware – Malware that collects information about the usage of the infected
computer and communicates it back to the attacker. The term includes botnets,
adware, backdoor behavior, keyloggers, data theft and net-worms.
2
Anmol Sharma
2003927
• Now what happened, when someone insert the card in an ATM machine. The moment
card is been inserted; two things happens:-
• If any transaction request is done, it get approved by checking in to the bank account
balance.
• Hacker created a proxy switch which automatically start approving both the above
requirements and by this money got stolen.
• And by this way, they made a request of 14849 transaction on 11th and 13th august
across 28 countries. And through this around 78 crore got stolen.
1.5.2 Investigation
• Police have arrested 18 people in connection with this case so far. In December 2018,
a special investigation team (SIT) probing the case filed a 1,700-page chargesheet
against nine accused. Later, two supplementary chargesheets were filed against nine
other accused.
• Police said most of those arrested were mainly involved in withdrawing money from
different ATMs using cloned cards of Cosmos Bank, as per instructions from
handlers. Police suspect that racketeers gave them some part of the money they
withdrew as commission.
• Four persons are wanted in the case, of whom three, identified as Kunal Shukla,
Abdul Bhai and Sumer Shaikh, are suspected to be in Dubai, police said.
• The Department must ensure that the operating system on all PC’s receives security
updates on a regular basis.
• All PC’s must be installed with anti-virus and anti-spyware software to detect any
malware or malicious programs in the network.
• All wireless networks must be secured, and their passwords must be well-protected.
3
Anmol Sharma
2003927
• The Cortex XDR agent combines multiple methods of prevention at critical phases
within the attack lifecycle to halt the execution of malicious programs and stop the
exploitation of legitimate applications, regardless of operating system, the endpoint’s
online or offline status, and whether it is connected to an organization’s network or
roaming. Because the Cortex XDR agent does not depend on signatures, it can
prevent zero-day malware and unknown exploits through a combination of prevention
methods.
Malware Detection:
• Advanced malware analysis and detection tools exist such as firewalls, Intrusion
Prevention Systems (IPS), and sandboxing solutions. Some malware types are easier
to detect, such as ransomware, which makes itself known immediately upon
encrypting your files. Other malware like spyware, may remain on a target system
silently to allow an adversary to maintain access to the system. Regardless of the
malware type or malware meaning, its detectability or the person deploying it, the
intent of malware use is always malicious.
Malware Removal:
• Antivirus software can remove most standard infection types and many options exist
for off-the-shelf solutions. Cortex XDR enables remediation on the endpoint
following an alert or investigation giving administrators the option to begin a variety
of mitigation steps starting with isolating endpoints by disabling all network access on
compromised endpoints except for traffic to the Cortex XDR console, terminating
processes to stop any running malware from continuing to perform malicious activity
on the endpoint, and blocking additional executions, before quarantining malicious
files and removing them from their working directories if the Cortex XDR agent has
not already done so.
Malware Protection:
• To protect your organization against malware, you need a holistic, enterprise-wide
malware protection strategy. Commodity threats are exploits that are less
sophisticated and more easily detected and prevented using a combination of
4
Anmol Sharma
2003927
antivirus, anti-spyware, and vulnerability protection features along with URL filtering
and Application identification capabilities on the firewall.
5
Anmol Sharma
2003927
6
Anmol Sharma
2003927
PRACTICAL – 2
Copyright:
Copyright is a free and automatic legal right given to the authors or creators of original
works. You can copyright works but not ideas.
7
Anmol Sharma
2003927
Patent:
A patent is an exclusive right granted for an invention. A patent provides the patent owner
with the right to decide how - or whether - the invention can be used by others. In exchange
for this right, the patent owner makes technical information about the invention publicly
available in the published patent document.
Trademark:
A trademark is a sign capable of distinguishing the goods or services of one enterprise from
those of other enterprises. Trademarks date back to ancient times when artisans used to put
their signature or "mark" on their products.
Industrial Design:
An industrial design constitutes the ornamental or aesthetic aspect of an article. A design may
consist of three-dimensional features, such as the shape or surface of an article, or of two-
dimensional features, such as patterns, lines, or color.
Geographical Indications:
Geographical indications and appellations of origin are signs used on goods that have a
specific geographical origin and possess qualities, a reputation or characteristics that are
essentially attributable to that place of origin. Most commonly, a geographical indication
includes the name of the place of origin of the goods.
Trade Secrets:
Trade secrets are IP rights on confidential information which may be sold or licensed. The
unauthorized acquisition, use or disclosure of such secret information in a manner contrary to
honest commercial practices by others is regarded as an unfair practice and a violation of the
trade secret protection
Copyright Infringement:
8
Anmol Sharma
2003927
Copyright infringement is the use of works protected by copyright law without permission for
a usage where such permission is required, thereby infringing certain exclusive rights granted
to the copyright. Creating merchandise for sale which features copyrighted words or
images. Downloading music or films without paying for their use. Copying any literary or artistic
work without a license or written agreement.
Copyright Protection:
The law in the UK defines the things which copyright automatically applies to. Original
works, for example writing, music, drama, art and photography, are protected by copyright.
Films, sound recordings, typographical arrangements and broadcasts are also covered as long
as they are not copied from a previous work of the same kind. To receive copyright
protection in the UK a literary, music or dramatic work must be recorded in writing or
otherwise.
Introduction:
In 2009 Gucci sued Guess for infringing on five Gucci trademarks, including the use of
similar logos. This is perhaps unsurprising given that Guess has been subject to 12 copyright
complaints over the last ten years. But they have successfully managed to resolve all previous
situations almost immediately… until they messed with Gucci.
9
Anmol Sharma
2003927
Of course, Gucci came out on top, but not in the way they had hoped for. Initially asking for
$221m in damages, the judge told Gucci they were only entitled to an accounting of profits
and limited the damages. In the end, Gucci only received $4.7m.
Guess was also barred from using most of their designs ever again, primarily the Quattro G
patterns in brown and beige colours and the CRG stripe.
10