Professional Documents
Culture Documents
Cyberlaw 131202052204 Phpapp01 PDF
Cyberlaw 131202052204 Phpapp01 PDF
2-5
6-7
9-11
12
12-15
16-17
18-22
23
Conclusion
24
1971
1972
1973
1978
1981
1982
1983
1984
1985
1986:
1987
1988
Kevin Mitnick secretly monitors the e-mail of MCI and DEC security
officials. He is convicted and sentenced to a year in jail.
Kevin Poulsen is indicted on phone-tampering charges. He goes on the
run and avoids capture for 17 months.
First National Bank of Chicago is the victim of $70-million computer
theft.
1989
1990
A computer crime is any illegal act, the commission of which (in whole or
in part):
targets computer hardware or software as its focal point, or
utilizes computer hardware or software to accomplish or assist in
accomplishing the act, or
involves or uses computer hardware or software to store,
preserve, assimilate, or secrete any evidence or any fruits of the
act, or
unlawfully accesses, invades or violates computer hardware or
software integrity in accomplishing or in attempting to perform
the act
notice by this definition, that a murder committed by
bashing someones head with a computer monitor would be
considered a computer crime!
Cyber harassment is a distinct Cyber crime. Various kinds of harassment can and
do occur in cyberspace, or through the use of cyberspace. Harassment can be
sexual, racial, religious, or other.
The growth of internet has shown that the medium of Cyberspace is being used
by individuals and groups to threaten the international governments as also to
terrorize the citizens of a country.
Technical Aspects
Technological advancements have created new possibilities for criminal
activity, in particular the criminal misuse of information technologies such as
a) Unauthorized access & Hacking:o Access means gaining entry into, instructing or communicating with the
logical, arithmetical, or memory function resources of a computer,
computer system or computer network.
o Unauthorized access would therefore mean any kind of access without
the permission of either the rightful owner or the person in charge of a
computer, computer system or computer network.
o By hacking web server taking control on another persons website called
as web hijacking
b) Trojan Attack:o The program that act like something useful but do the things that are
quiet damping. The programs of this kind are called as Trojans.
o Trojans come in two parts, a Client part and a Server part. When the
victim (unknowingly) runs the server on its machine, the attacker will
then use the Client to connect to the Server and start using the trojan.
c) Virus and Worm attack:o A program that has capability to infect other programs and make copies
of itself and spread into other programs is called virus.
o Programs that multiply like viruses but spread from computer to
computer are called as worms.
Email spoofing
Email spoofing refers to email that appears to have been originated from one
source when it was actually sent from another source. Please Read
Email Spamming
Email "spamming" refers to sending email to thousands and thousands of users
- similar to a chain letter.
Sending malicious codes through email
E-mails are used to send viruses, Trojans etc through emails as an attachment
or by sending a link of website which on visiting downloads malicious code.
Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an identical
email message to a particular address.
Sending threatening emails
Sending any threatening Email to any Person regarding his live or property is
also a Crime.
Defamatory emails
Making of false, derogatory statement(s) in private or public about a person's
business practices, character, financial status, morals, or reputation. Oral
defamation is a slander whereas printed or published defamation is a libel.
Email frauds
Email fraud is the intentional deception made for personal gain or to damage
another individual through email.
10
e) Internet Relay Chat (IRC) related crimes:Three main ways to attack IRC are: Denial of service attacks, clone attacks, and
flood attacks.
Denial of Service attacks:Flooding a computer resource with more requests than it can handle. This
causes the resource to crash thereby denying access of service to authorized
users.
Examples include
Attempts to "flood" a network, thereby preventing legitimate network traffic
Attempts to disrupt connections between two machines, thereby preventing
access to a service
Attempts to prevent a particular individual from accessing a service
Attempts to disrupt service to a specific system or person.
g) Online gambling
There are millions of websites; all hosted on servers abroad, that offer online
gambling. In fact, it is believed that many of these websites are actually fronts
for money laundering.
11
Why India?
India stands 11th in the ranking for Cyber Crime in the World, constituting 3%
of the Global Cyber Crime.
12
13
A total number of 90, 119, 252 and 219 Government websites tracked by the
Indian Computer Emergency Response Team (CERT-In) were hacked / defaced
by various hacker groups in the year 2008, 2009, 2010 and JanOct 2011
respectively.
14
The police have recorded 3,038 cases but made only 2,700 arrests in 3
years (between 2007 and 2010)
India registered only 1,350 cases under the IT Act and IPC in 2010
50% of cybercrimes are not even reported.
15
16
17
18
Two important guidelines relating to CAs were issued. The first are
the Guidelines for submission of application for license to operate
as a Certifying Authority under the IT Act. These guidelines were
issued on 9th July 2001.
Next were the Guidelines for submission of certificates and
certification revocation lists to the Controller of Certifying
Authorities for publishing National Repository of Digital
Certificates. These were issue on 16th December 2002.
These rules prescribe the appointment and working of the Cyber Regulations
Appellate Tribunal (CRAT) whose primary role is to hear appeals against
orders of the Adjudicating Officers.
The Cyber Regulations Appellate Tribunal (Salary, Allowances and other
terms and conditions of service of Presiding Officer) Rules, 2003 prescribe
the salary, allowances and other terms for the Presiding Officer of the
CRAT.
Information Technology (Other powers of Civil Court vested in Cyber
Appellate Tribunal) Rules 2003 provided some additional powers to the
CRAT.
19
20
21
CODE,1860
INDIAN EVIDENCE ACT,1872
BANKERS BOOK EVIDENCE ACT,1891
GENERAL CLAUSES ACT,1897
22
23
CONCLUSION
24