Professional Documents
Culture Documents
Whereas the term crime refers to an illegal act which causes harm either to person
physically, mentally or in any other way; or it harms the reputation of an individual.
When these two terms cyber and crime meets and forms a single term “cybercrime”
it is deadliest combination. Now-a-days cybercrime is the most reported crime in
the country and people of all age groups are present and connected on social media.
Relevant Legal Provisions
Cyber terrorism:
Section 66F of the IT Act prescribes punishment for cyber terrorism. Whoever, with
intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in
the people or any section of the people, denies or causes the denial of access to any person
essential to the life of the community or adversely affect critical information infrastructure,
Section 378 of the IPC relating to "theft" of movable property will apply to the
theft of any data, online or otherwise
Identity theft and cheating by personation: Section 66C of the IT Act prescribes
punishment for identity theft and provides that anyone who fraudulently or
dishonestly makes use of the electronic signature, password or any other unique
identification feature of any other person shall be punished with imprisonment of
either description for a term which may extend to 3 (three) years and shall also be
liable to fine which may extend to Rs. 1,00,000 (Rupees one lac).
Amendment: New sub-section (3) was inserted in section 4 of the IPC (relating to
the extension of the IPC to extra territorial offences) that states that the provisions
of the IPC shall be applicable to any person in any place "without and beyond
India", committing an offence targeting a computer resource located in India.
Comparative study of Indian
and Pakistani Cases:
INTRODUCTION
India and Pakistan have been regional rivals since their independence
in 1947
They may have participated in these campaigns for the thrill or to test their
knowledge.
Pakistani Hactivists and Patriotic Hackers
Similar to Indian hacktivists and patriotic hackers, Pakistani hackers
mostly targeted Indian government websites using defacement techniques.
The work of the Pakistan Cyber Army (PCA) was first observed in
November 2008 in the defacement of the Indian Oil and Natural Gas
Company.
The APT created counterfeit news websites and sent the link via email to
get their victims to click on malicious links to download infected
documents.
Though the Pakistani APT’s targets were also suspiciously in line with
the interests of the Pakistani government, neither Proof point nor Trend
Micro were able to link the Pakistani APT to the Government of Pakistan
TARGETS
Hacktivists and patriotic hackers from both states tended to target
government institutions and media websites, and their website
defacements were largely opportunistic.
2. Spear Phishing:
Spear phishing consists of sending an email that appears to come from a
trusted contact or organization. As soon as the attachment is downloaded, the
system gets infected.
3. Malware:
Malware are generally designed to take screenshots, steal documents, record
keystrokes, and self-update.
Effects
1. Social Effect:
The inconvenience created by website defacement affected the users of the defaced
websites, especially because hacktivists and patriotic hackers often targeted
government agencies’ websites. It creates the environment of distress and
annoyance amoug people specially if it effects their daily work and lifestyle.
2. Economic Effects:
Defacements result in lost customers due to the unavailability of the webpages and
damages to the businesses’ reputation. It also results to lack of trust in case of
government website being hacked and people shift to private websites which
result in loss of government revenue .
...contd
3. Technological Effects:
Cyber security experts that studied APT groups from India and Pakistan found that it
4. International Effects:
minimal as it is considered to be their personal matter but still it taints the already
In addition, website defacement monitoring and detection tools could help website
owners react faster in the event of a defacement.
THANK YOU