Professional Documents
Culture Documents
Overriding effects of getting into anything will lead you to the definitely an unsafe root. What if
anything which contains a way to catch up something which is hilarious and you could not get
oppose off. This is exactly transpire what crime says- CYBER. Cyber crimes are such viruses that
attach themselves to destroy or disable what internet access through certain plots such as
hacking, phishing, email bombing and spamming, dissemination etc perpetrating by certain
software. Cyber space often know as web is an environment that is intangible and dynamic.
Thus, what exactly cyber crime is a form of internet crime which is pursued online. In this
research paper, I, argue first that, till what extent our society is ready to get over upon this web
hacking. I, argue, that the processes till further cyber partnerships are paid by rooting the ways.
I argue further, that how much does the police have the grit for such cyber crime. I, argue, that
what is the need behind such malicious acts and denying of such services. I, then find such
interpretations as to what extent or until what purviews the Sections of Information Technology
Rules, 2003 falls.
Serial No. White Hat Black Hat Hacker Grey Hat Hacker Blackmail
Hacker Hacker
1. It generally Pivot The hacker It is a It is the most
on securing IT generally focuses professional dangerous
systems. upon the hacker acts hacker who
computer system legally or in a spreads
with malicious good will. detrimental
intent. information
through the
internet or vis-à-
vis private
communication
routes.
2. It includes the It includes the Due to the The hacker may
process of hack act whose are technological commit such
with the consent uncertain and feat, the hacker cyber crimes
of the owner to concealed. sometimes may from where they
do such process. commit such could make
internet crimes money at a big
as kidnapping, scale through
phishing, cyber bank or
terrorism etc. operational
accounts.
3. These They are usually They are a clutch They may
professionals are known as the of white and threaten the
particularly software black hacker. population to
called as the cracking hackers. commit such
sneakers who crimes.
are the
employees of
security
companies.
1. You must have to conclude with your online sessions which require passwords like
emails and Facebook completely.
2. Logging into another account like when you sign in a Google browser and at the same time
you will sign in into an another account without signing out to the first account, do not do
that as by using a PGP key.
3. Always put end button into your online chapter by clicking on the "Log out or Sign Out"
button.
4. Steer clear off the way of "remember" when you enter into the details and password
information.
5. You must have the backup of whatever files you had created in your PC or Laptop whether
it may be personal or professional.
6. You must have used the WHOIS private service to keep hidden your personal details
like name, city’s name, number, residential address etc.
ILLUSTRATIONS:
In 2013-2016, A data breach or theft of around 3 billion population’s private information and
passwords has been experienced by a great platform called Yahoo.
In 2014, US retailer Home Depot’s point of sale systems had been attacked and of around 50
million credit cards swiped at Home Depot stores and Modus Vivendi by the attackers.
In 2016, That software vulnerabilities had done by the attackers over 1 billion users account
running over the internet of things including services like Netflix, Twitter etc and that attack
took place was DDoS.
In 2017, The Wanna Cry, launched by the North Korea, unbridled the cyber crime of
Ransomware and infected 300,000 computers around the world, and hundreds of dollars had
been demanded to decrypt their data.
LANDMARK CASES-
1. Section 43: Penalty and Compensation for damage to computer, computer system,
etc Case Law-
Poona Auto Anillaries Pvt. Ltd., Pune Versus Punjab National Bank, HO New Delhi &
Others
Summary: In 2013 Maharashtra’s IT secretary Rajesh Aggarwal had ordered PNB to pay Rs 45
lakh to the Complainant Manmohan Singh Matharu, facing the one of the biggest compensation
due to a cyber crime of phishing mail. A fraud had been done when transferred of Rs 80.10 lakh
from Matharu’s account in PNB, by responded to an email.
1
https://www.itlaw.in/syed-asifuddin-and-others-vs-the-state-of-andhra-pradesh-2005/
2
https://www.cyberralegalservices.com/detail- casestudies.php#:~:text=In%20a%20landmark%20judgment
%20in,injunction%20and%20recovery%20of%20damag es.
pay a fine of Rs.500/- and for the offence u/s 67 of the IT Act 2000 to undergo RI for 2
years and to pay a fine of Rs.4000/-. All sentences to run concurrently." 3
In Justice K.S. Puttuswamy (Retd) v Union of India, 4 Hon’ble Supreme Court of India held that
“The right to privacy is protected as an intrinsic part of the right to life and personal liberty
under Article 21 and as a part of the freedoms guaranteed by Part III of the Constitution”.
Cyber Securities are the growing concern among businesses, as highlighted by the very recent
issue of “Zoom Application” in this pandemic of covid-19.
Over 200 millions of population is using the zoom application to conduct their meetings, to join
their classes and even doing personal chit chats over there. But we did hear the news that the
zoom application is not safe and were continuously in the hands of white hackers and hence
around 50% of population had uninstalled the application for same.
This was really hitting for us and thus, the matter took by the Cyber security very gravely. In
April 2020, Cyber Crime Branch with such legal policies done this very wisely and therefore,
they have nominated the application “ZOOM-5.0.” with an AES 256-Bit GCM encryption
standards- an algorithm to further protection.
CONCLUSION
Henceforth, many of the policies have been illustrated by our Cyber Law such as software,
email, internet usage, cyber insurance, e-writing policies etc. The Privacy Bill, 2011 has codified
muscles to the data protection along with the Information Technology Act, 2000 and Indian
Penal Code, 1860. These include interception of communication or unauthorized personal data,
taking and using of photographs, fingertips etc. We will find such interpretations upon the
above mentioned acts and may further elaborate in deep how much big trap it is.
3
https://www.cyberralegalservices.com/detail- casestudies.php#:~:text=In%20a%20landmark%20judgment
%20in,injunction%20and%20recovery%20of%20damag es.
4
Justice K.S. Puttuswamy (Retd) v Union of India AIR 494 SC 2012