Professional Documents
Culture Documents
JIS UNIVERSITY
NAME-AKASH DUTTA
ROLL: 20JS011022
STREAM: BBA.LLB
Page|2
ACKNOWLEDGEMENT
I would like to express my gratitude and appreciation to all those who gave me the
possibility to complete this Assignment. Special thanks to due to our It offences
and cyber crime Assistant Professor Ms. Somdatta Mukherjee, whose help,
stimulating suggestions and encouragement helped me in all time of fabrication
process and in writing this Assignment. I also sincerely thanks for the time spent
proofreading and correcting my many mistakes. I also thank to all my friends who
have more or less contributed to the preparation of this Assignment. I will always
be indebted to them. Although, this Assignment has been prepared with utmost
care and deep routed interest, Even then I accept respondent and imperfection.
Page|3
HACKING
The Information Technology Act, 2000 (IT Act) is the primary law in India that
deals with cyber crimes. The Act defines cyber crimes as “any offence committed
against the confidentiality, integrity or availability of computer resources”.
Methods of hacking
▪ Phishing – This simply means duplicating the original website to gain access
to the users’ information like account password, credit card details etc. It is
the most common hacking technique in which the hackers will either send
you a fake message with a fake invoice or ask to confirm some personal
information or entice the person with some free stuff.
▪ Virus attack – By this method of hacking, the hackers release the virus into
the files of the website which can corrupt or destroy the important
information stored in our computer if they are downloaded or get inside our
computer system.
▪ UI redress – In this method, a fake user interface is created by which when
the user clicks on it, it redirects them to another vulnerable website. For
instance, if we have to download a song, as soon as we click on the
“download” tab, a new page is redirected which is usually a fake website.
▪ Cookie theft – Sometimes, the website containing information about the
users in the form of cookies is hacked using special tools. These cookies can
be decrypted and read to reveal one’s identity which can be further used to
impersonate the person online. Cookies are generally stored as plain text or
in some form of encryption.
▪ DNS spoofing – The cache data of a website which the user might have
forgotten is used by hackers to gather information about users. Here, a user
is forced to navigate to a fake website disguised to look like a real one, with
the intention of diverting traffic or stealing the credentials of the users
Page|5
Section 43 and Section 66 of the Information Technology Act, 2000 cover the
civil and criminal offenses of data theft and hacking respectively.
According to Section 66 of the IT Act, the following are the essentials for an
offence to count as hacking:
▪ There should be the malicious intention of the accused to tamper or break
into the computer of the other person and steal or destroy its data or sources.
▪ A wrongful act or damage to the data must be done pursuant to the wrong
intention.
▪ Also, according to Section 378 of the Indian Penal Code,1860 which
relates to “theft” of movable property also applies to theft of any data online
or otherwise with the two most important parts of crime i.e., mens rea and
actus reus. When a person takes away or steals the information in order to
move it away from the access of the authorised user, it can be termed as theft
under Section 378 of IPC. If such an act fulfills all the essentials of the theft,
the act committed will attract penal consequences under IPC as well.
▪ Furthermore, laws of torts as well, such as trespass to the person and
property,can be applied, as well, since there is trespass to a computer system
which is an intangible property. Therefore, any kind of unauthorised
intrusion in the computer sources governed by a bad intention can come
under the purview of criminal trespass which can make a person liable for
the tortious liability as well.
Page|6
Punishment
Under the Information and Technology Act, According to Section 66, the
punishment is imprisonment up to 3 years, or a fine which may extend up to 2 lakh
rupees, or both.
According to Section 43, liability is to pay damages by way of compensation to
the person affected by the stealing of the data. Section 66B entails punishment for
receiving stolen computer resources or information. The punishment includes
imprisonment for one year or a fine of rupees one lakh or both. The maximum
punishment for theft under Section 378 of the IPC is imprisonment of up to 3
(three) years or a fine or both.
Remedies
As soon as cybercrime i.e., hacking is committed, a person should complain about
the same to the cyber cell.
Following are the steps to be followed for reporting hacking in India:
STEP 1: Visit https://cyber crime.gov.in/Accept.aspx
STEP 2: Select ‘Report other cyber crimes’ from the menu.
STEP 3: Choose ‘File a Complaint.’
STEP 4: Read the conditions thoroughly and acknowledge them.
STEP 5: Mobile number needs to be registered along with name and State.
STEP 6: Complete all the relevant details about the offence witnessed.
Conclusion
As it is rightly said, “It is not that we use technology, we live technology.” This era
is indeed known as the technological era and there is no aspect of life that is not
touched upon by the technological developments and the comfort in which we are
living. But since every coin has two sides, similarly, these developments have both
pros and cons. Cybercrime has increased annually and with the advancement, there
have been developments in cyber-attacks too.
Therefore, the need of the hour is that the legislative body of India has to also move
ahead with the change in the surrounding and frame laws which are effective and
useful in curbing the rate of cybercrimes in India. Indian legislature can get
inspiration from GDPR (General Data Protection Regulation) of the European
Union, Laws from the US, and other countries to frame a stringent and effective
law for India. Further, it will be the duty and responsibility of the executive body
to implement the laws.
Page|9