You are on page 1of 7

Cyber Law Introduction Distributed DOS A distributed denial of service (DoS) attack is accomplished by using the Internet to break

into computers and using them to attack a network. Hundreds or thousands of computer systems across the Internet can be turned into “zombies” and used to attack another system or website. Types of DOS  There are three basic types of attack:

Search

a. Consumption of scarce, limited, or non-renewable resources like NW bandwith, RAM, CPU time. Even power, cool air, or water can affect. b. Destruction or Alteration of Configuration Information c. Physical Destruction or Alteration of Network Components e. Pornography:The literal mining of the term 'Pornography' is “describing or showing sexual acts in order to cause sexual excitement through books, films, etc.” This would include pornographic websites; pornographic material produced using computers and use of internet to download and transmit pornographic videos, pictures, photos, writings etc. Adult entertainment is largest industry on internet.There are more than 420 million individual pornographic webpages today. Research shows that 50% of the web-sites containing potentially illegal contents relating to child abuse were „Pay-Per-View‟. This indicates that abusive images of children over Internet have been highly commercialized. Pornography delivered over mobile phones is now a burgeoning business, “driven by the increase in sophisticated services that deliver video clips and streaming video, in addition to text and images.” Effects of Pornography Research has shown that pornography and its messages are involved in shaping attitudes and encouraging behavior that can harm individual users and their families. Pornography is often viewed in secret, which creates deception within marriages that can lead to divorce in some cases. In addition, pornography promotes the allure of adultery, prostitution and unreal

1.Addiction: Pornography provides a powerful sexual stimulant or aphrodisiac effect.Desensitization: What was first perceived as gross.Domain names are also trademarks and protected by ICANN‟s domain dispute resolution policy and also under trademark laws. found that there is a four-step progression among many who consume pornography.to meet the sexual demands of men. theft of computer source code.Acting out sexually: There is an increasing tendency to act out behaviors viewed in pornography. patent violations. 2. . h. shocking and disturbing. Pornography Addiction Dr. Cyber Squatters registers domain name identical to popular service provider‟s domain so as to attract their users and get benefit from it." 3. trademarks violations. mark sheets etc can be forged using sophisticated computers. followed by sexual release. 4.expectations that can result in dangerous promiscuous behavior. IPR Violations:These include software piracy. Victor Cline. printers and scanners. Forgery:Counterfeit currency notes. is beneficial and does not have negative consequences. Also impersonate another person is considered forgery. etc. an expert on Sexual Addiction. any way it is desired. under any circumstances. Cyber Squatting. copyright infringement. Marriage and children are obstacles to sexual fulfillment. most often through Masturbation. Sex with anyone. Everyone is involved in promiscuous sexual activity. postage and revenue stamps. g. Some of the common.Escalation: Over time addicts require more explicit and deviant material to meet their sexual "needs. infidelity and premarital sex. but false messages sent by sexualized culture. Women have one value . in time becomes common and acceptable.

or that provides for the purchase. Investors are enticed to invest in this fraudulent scheme by the promises of abnormally high profits. Internet hackers are continually looking for opportunities to compromise a company‟s security in order to gain access to confidential banking and financial information. air traffic control. use. Sale of illegal articles:This would include trade of narcotics. j. and bulletin boards or simply by using . Cyber Terrorism:Targeted attacks on military installations. Banking/Credit card Related crimes:In the corporate world. auction websites. banks. Merchandise or services that were purchased or contracted by individuals online are never delivered. 2. medical. 1. fire and rescue systems etc. 3. by posting information on websites. a feature that is especially appealing to terrorists.Cyberterrorism can be conducted remotely. An offering that uses false or fraudulent claims to solicit investments or loans. 4. 5. k. Use of stolen card information or fake credit/debit cards is common.It is cheaper than traditional terrorist methods. trail traffic control.Cyberterrorism is more anonymous than traditional terrorist methods. Cyberterrorism is an attractive option for modern terrorists for several reasons. Bank employee can grab money using programs to deduce small amount of money from all customer accounts and adding it to own account also called as salami. Others like police. telecommunication networks are the most likely targets.The variety and number of targets are enormous.. l.Cyberterrorism has the potential to affect directly a larger number of people. The fraud attributable to the misrepresentation of a product advertised for sale through an Internet auction site or the non-delivery of products purchased through an Internet auction site.i. power plants. or trade of forged or counterfeit securities. weapons and wildlife etc. E-commerce/ Investment Frauds:Sales and Investment frauds.

Information posted to a bulletin board can be accessed by anyone. m. the harasser intends to cause emotional distress and has no legitimate purpose to his communications. Defamation: Defamation can be understood as the intentional infringement of another person's right to his good name. q. Identity Theft :Identity theft is the fastest growing crime in countries like America. Research shows that number of people employed in this criminal area. that offer online gambling. Specially with a teen they will let the teen know that fully understand the feelings towards adult and in particular teen parents. then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions. Pedophiles:Also there are persons who intentionally prey upon children. This means that anyone can place Cyber defamation is also called as Cyber smearing.email communication. Daily peoples receiving so many emails with offer of banned or illegal products for sale. n. Online gambling:There are millions of websites hosted on servers abroad. it is believed that many of these websites are actually fronts for money laundering. In general.g. Cyber Defamation occurs when defamation takes place with the help of computers and / or the Internet. They earns teens trust and gradually seduce them into sexual or indecent acts. entering the chat-rooms frequented by the victim. In fact. constantly bombarding the victim with emails etc. p. someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information to all of that person's friends. Cyber Stacking:Cyber stalking involves following a persons movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim. Pedophiles lure the children by distributing pornographic material. E. Identity theft occurs when someone appropriates another's personal information .

Theft of Internet Hours:Unauthorized use of Internet hours paid for by another person. the programmer of the database or application. Confidentiality . Physically damaging a computer system:Physically damaging a computer or its peripheralseither by shock. financial status etc. sexual preferences. In other words. and counterfeiting or illicit reprogramming of stored value telephone cards. fire or excess electric supply etc. Data diddling:Data diddling involves changing data prior or during input into a computer. Breach of privacy means unauthorized use or distribution or disclosure of personal information like medical records. some part(s) of a computer or a peripheral attached to the computer.without their knowledge to commit theft or fraud. how and to what extent his or her personal data will be shared with others. s. Breach of Privacy and Confidentiality Privacy Privacy refers to the right of an individual/s to determine when. By gaining access to an organisation's telephone switchboard (PBX) individuals or criminal organizations can obtain access to dial-in/dial-out circuits and then make their own calls or sell call time to third parties. v. It also include automatic changing the financial information for some time before processing and then restoring original information. Identity theft is a vehicle for perpetrating other types of fraud schemes. information is changed from the way it should be entered by a person typing in the data. u. or anyone else involved in the process of having information stored in a computer file. Theft of computer system (Hardware):This type of offence involves the theft of a computer. a virus that changes data. r. Additional forms of service theft include capturing 'calling card' details and onselling calls charged to the calling card account. t.

Special techniques such as Social Engineering are commonly used to obtain confidential information. parties while sharing information forms an agreement about he procedure of handling of information and to not to disclose such information to third parties or use it in such a way that it will be disclosed to third parties. perhaps for compensation claims then try and find a solid no win no fee cyber lawyer to help.It means non disclosure of information to unauthorized or unwanted persons. Many times party or their employees leak such valuable information for monitory gains and causes breach of contract of confidentiality. Generally for protecting secrecy of such information. such information should be protected. (United Kingdom) . In addition to Personal information some other type of information which useful for business and leakage of such information to other persons may cause damage to business or person. If you're looking for other kinds of lawyers.

9:.574/:.425:9078 .078.9 98-00.981478.504508 70.8903903943.1743981472430 .:3/073  3 01.0.:7803/01.34907507843 8 7994844/3.70.330/470.2.3842.02.92.2.9434.2..09900541.-74.31730203941.943. .723.422:3...302.34190800-8908.8489..085.702438410-89084890/43807..2-3  %070.2-3  31.0  2  330.2.9439.0/9..70.9411074330.943  01..943  #080.894110741-.3/.20  -0701../ 9.3-0:3/078944/.7.93:2-07415045002540/398.

3430..090239480:.039..473/0..47903907309   84204305:-808/01.389.9438  5 !0/4508  849070.7389003897:89.9 744281706:0390/-90.4:397080207.3/3 5.94354890/94.2.570:543...35.8-07820.-4:9842043043.31472.91::3/0789.09073:/054947.7203.:78038420430..020393 80:...5489438  6 /0399%019   /039990198901./703 $50./:9.9003 9009909003349..439.7/..809..3-0.907.:/390703.  /039990194.7.79.2.08 84209208970.3/7.7/81706:0390/-90 .9033 4390-:093-4. 90.583.3/901003894.020398.0/..834092.5..9907./897088.92 03907390.  30307.8.33/01..2.419.908./:. 903909794 20099021478047949.73   -07$9.4.-:093-4.33.790035.557457.94731472.3/.422:3.98  !0/4508:7090..0 -07/01.7/8.70507843843903943.9472.7/390 ...3  -0789.9438.80/:.943 .92 .89089743.0880/-.4389.34907 8507843. 0-89047803/80 2.7488903907309- 548932088.9507843 8 1703/8 31472.92902.94394./703-/897-:93547347.2.88073903/894.70398  %00.:80024943.84.3430 %8 20.9.507843824..90 5:75480948.:.081443.9.39-42-.

9.9.0./:.3. .9.08894. 3..01475075097.47...93490795084117.943  8 %0194139073094:78  &3.943 47.34907507843  .9..347.339013.331472. 905747.38.55.31472.:/8.34300803.4.3.3/9037089473473.94389470/3.:/  /039990198..0883.984:/-0039070/-..0/390574.30/174290.7/ ! 3/.847 ..33/. .4..3.843.08894/.308/.08841.8047 .../147-.574747/:7335:9394.9...507843 953390/.9438.723.9.33.08.34-9.425:90710  9.-.943 8900543089.9.0208  7 .9438..22074190/.31472..:/0.:9470/:804139073094:785.:942..9431478420920-01470 574.422990194717.9.94:9907340/094.///33.///3  .425:907  3490747/8 31472.7:89..-4.

.2....41!7....03.090193.0890901941.4.9 705747./:.. 70.  ..3/.3/43 803.70/9490.7908  //943.59:73 ../.1472841807.425:90747.2.7/..7/8  9 %01941.79 8 41.. !7.425:9074798507507.425:907 84205./.3.425:90788902  !8.84780..:/0../.7/..80907-84. 170470...7...70107894907941..2234189470/.70   %89504141103.9209497/5..8.:98.8.0/9490.088 00.3..3/9032.33/. 507507.425:907  : !8. 4:9...:09005430..425:90788902 .7/ /09..4:3907109347..99..4:39 .3.0 90743.3/431/039..9 !7.8:5509.97...3.

894/090723003 4.47/8 80:.70..08 13.48:7041507843./..57010703.9 .3..-08.9.943020/.20..89.3/94.9 0903984707507843. 31472..38:3.:9470/:8047/897-:94347/8.  431/039.4157.70/949078  70.9:809.

3/.//94394!07843.70..480/9497/5.14757490.94394490750784382.4397.943.790847:80938:.3/34131472.392085.:801:147 -:83088.0418:.90/  0307.425038.8$4.-07.0/:7041.3.36:088:.41.9439497/5.943  14: 7044314749073/841.:80/.390/5078438  3.31472..-4:90574.418:.920.90.2..4808:.38.84/34334100...078 507.48:704131472.94394:3.7908  .943147243947 .94314728..431/039.58147.943..73 31472.943842049079504131472.943 5.31472.2890397 .431/039.42243:80/944-9.31472...330073.31472..3/13/.99 -0/8.9380.079405  &390/3/42  .943.790808..3 .7002039.-031472.94384:/-057490.31472.:808-70.3/0.:9470/47:3..9.31472.094 -:8308847507843 8:.:.941.8:.38343/8.9  $50..70.3/ 9434994/8.794790702540080..

 .