You are on page 1of 16

or cybercrime.Computer crime. refers to any crime that involves a COMPUTER and a NETWORK .

Such crimes may threaten a nation·s security and financial health. Particularly those . and child grooming. copyright infringement. lawfully or otherwise both governmental and non-state actors engage in cybercrimes. financial theft. Issues surrounding this type of crime have become high-profile. including espionage. There are also problems of privacy when confidential information is lost or intercepted. Internationally. and other crossborder . . child pornography.Netcrime This refers to criminal exploitation of the Internet.

Activity crossing international borders and involving the interests of at least one nationstate is referred to as CYBER WARFARE. . The international legal system is attempting to hold actors accountable for their actions through the INTERNATIONAL CRIMINAL COURT.

TYPES OF CYBER CRIMES .

Data diddlingThis kind of an attack involves altering raw data just before a computer processes it and then changing it back after the processing is completed. 4.3.Email bombingThis kind of activity refers to sending large numbers of mail to the victim. The electricity board faced similar problem of data diddling while the department was being computerized. which may be an individual or a company or even mail servers there by ultimately resulting into crashing. .

g. the Ziegler case wherein a logic bomb was introduced in the bank·s system.g. 6.Denial of Service attackThe computer of the victim is flooded with more requests than it can handle which cause it to crash. Amazon. Distributed Denial of Service (DDoS) attack is also a type of denial of service attack. E. which deducted 10 cents from every account and deposited it in a particular account.Salami attacksThis kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. in which the offenders are wide in number and widespread. E. Yahoo. .5. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed.

This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory. either by altering or deleting it. E.g. unlike viruses do not need the host to attach themselves to.g. . E. Logic bombsThese are event dependent programs.7. Worms. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date (like the Chernobyl virus). love bug virus 8. Virus / worm attacksViruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer.

which passively gains control over another·s system by representing itself as an authorized programmed. .9. This is done by gaining access to the login ID and the password. Trojan attacksThis term has its origin in the word ¶Trojan horse·. In software field this means an unauthorized programme. The most common form of installing a Trojan is through e-mail 10. . Internet time theftsNormally in these kinds of thefts the Internet surfing hours of the victim are used up by another person.

.Web jackingThis term is derived from the term hi jacking.11. He may even mutilate or change the information on the site. This may be done for fulfilling political objectives or for money. In these kinds of offences the hacker gains access and control over the web site of another.

.

AND 24.INFORMATION TECHNOLOGY ACT 2000 THE INFORMATION TECHNOLOGY ACT 2000 HAS BEEN SUBSTANTIALLY AMENDED THROUGH THE INFORMATION TECHNOLOGY AMENDMENT ACT 2008 WHICH WAS PASSED BY THE TWO HOUSES OF THE INDIAN PARLIAMENT ON DECEMBER 23. THIS ACT AIMS TO . 2008.

Essence of the Act INFORMATION TECHNOLOGY ACT 2000 ADDRESSED THE FOLLOWING ISSUES: ´ LEGAL RECOGNITION OF ELECTRONIC DOCUMENTS ´ LEGAL RECOGNITION OF DIGITAL SIGNATURES ´ OFFENSES AND CONTRAVENTIONS ´ PREVENTION OF CYBERCRIMES ´ FACILITATION OF ELECTRONIC FILING OF DOCUMENTS WITH GOVT AGENCIES .

irrespective of their nationality.LIMITATIONS OF IT ACT 2000 The Act extends the application of its penal provisions to person outside India.has also been left open . if the offence under the act relates to a computer located in India. Such extra territorial jurisdiction is full of limitations as to its enforcement The Act excludes property transactions to be carried out on-line due to the necessity of payments of stamp duty and registration of documents. The Act fails to address the issue of cross boarder taxation that may arise in international contracts .The question of jurisdiction of a particular country over on line transactions. which involves more than one jurisdiction .

The act binds digital signature to the symmetric encryption system.The act does not deal with internet privacy issues like prohibition of unsolicited commercial mail and unauthorized use of private data collected on line. This is the serious drawback especially since to the technology is being replaced with a more secure system soon The Act fails to cover control of cyber laundering of money . limiting the scope of innovation in technology.which can easily be used for criminal or terrorist activities .