0% found this document useful (0 votes)
2 views

InformaticsAndCyberLaws_Module5

The document discusses the rise of cyber crimes due to advancements in technology and the internet, highlighting the various forms of cyber crime such as hacking, identity theft, and cyber terrorism. It emphasizes the challenges in detecting and prosecuting these crimes due to their complex and global nature. Additionally, it outlines the legal framework, specifically the IT Act of 2000, aimed at regulating cyber activities and protecting individuals and society from cyber threats.

Uploaded by

Leslie Qwer
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
2 views

InformaticsAndCyberLaws_Module5

The document discusses the rise of cyber crimes due to advancements in technology and the internet, highlighting the various forms of cyber crime such as hacking, identity theft, and cyber terrorism. It emphasizes the challenges in detecting and prosecuting these crimes due to their complex and global nature. Additionally, it outlines the legal framework, specifically the IT Act of 2000, aimed at regulating cyber activities and protecting individuals and society from cyber threats.

Uploaded by

Leslie Qwer
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 16
) | CYBER CRIMES — J Advancement of technology has made man dep Internet has given man easy access to social networking, gaming, online studying, online jobs, etc. Easy access to data, easy destroyal of data etc. have led to a great inc crimes and unauthorised computer access. | Meaning and Definition Cyber crime or Computer crime refers through the medium of communication tec _ and the world wide web. Cyber: 3 Bpeetellon: sa dipids e ¥ - a ee 3 fs basic The internet has originated and d ed | from a relatively oe, ork set up to share information between trusted people and organisations. o ee | this open and insecure system has evolved into a world wide network has beet 0 * committing cyber crimes. 5.2 Computer crime is increasing in scope and in complexity. It pose the security and safety, particularly to critical infrastructures such as th system, etc. which are totally dependent on 0 system, defence ‘The nature and scope of cyber crime can be explained through rime is a social and ec 1. Social and economic phenomenon: and is as old as the human society. It is perhaps the most compli cyber world. The world of computers have transformed the modern society expectations. It has made it possible to have access to all corners of the World in one’s finger tips. When compared to the physical world, cyber world is very wide and the global dimension of cyber crime makes it difficult to handle with ease. It has provided the scope for criminals to commit their crime with least chance of detection, The human society has become vulnerable to cyber crimes due to more and more dependence on technology. Cybercrime is a major concern for the global community. The introduction, growth, and utilisation of information and communication technologies have been accompanied by an increase in criminal activities. ‘Tnsecure nature: Cyber crimes flourish in the cyber world, because of the insecure -hature of the internet. It leaves computers vulnerable to exploitation. The large number af computers connected to the internet gives an opportunity for wide array of targets s. The internet is an effective medium for Tunning automated systems wease in Cyber Crimes Be eTeAse in the number of cyber crimes. The mai its difficulty to identity the cyber criminals, Some 6 micyber crimes are the following ‘ Bee We Virtual world: Every activity of cyber er B)yirmial world and not in the physical world. Hence, i is difficultto aNo geographical limits: There is no limit as jaa committing cyber crimes. It can be committed from any p is difficult to detect the persons involved in it, Difficult to collect evidence of cyber crime: In order to sriminal, there should be evidence for the crime, But iti evidence and prove them in court of law due to its to this attack. ms | Classification of Cyber Crimes anne Cyber crimes can be broadly classified under 4 heads gh Crime against individuals: Crime against individual is pease em a "sing electronic domain, It includes child pornography, harassment, hacking ? crimes, etc, The potential harm of such a crime can hardly be higher. ; Cyber Crime against property: Cyber crime against property is — using : an electronic device as a medium. Here, the property does not mean any immovable Ree ikea Intellectual = jovable and intangible property like computers, Property but includes m‘ Property, etc. 3. Cyber crime against Government: A cyber crime against committed to threatening the unity, honour, and security of th The criminals hack government websites and military Web their target. Cyber crime against government includes Cy! Terrorism etc. Cyber crime against society: When a cyber crime is committed individuals, itis known as cyber crime against society. It includes On Cyber Trafficking, Web jacking, Salami attacks etc. Inorder to regulate the criminal activities in the cyber world and to protec, technological advancement system, there arises the need for strict statutory laws. These Jaws came in the form of Cyber Law. The Act pertaining to it is the IT Act, 2000 Cyber Law and IT Act Cyber law is the part of the overall legal system that deals with the internet cyberspace, and their respective legal issues. Cyber law covers a fairly broad area, encompassing several subtopics including freedom of expression, access to and usage of the internet, and online privacy. It is the legislation focused on the acceptable behavioural use of technology including computer hardware and software, the internet, : circumstances Indian Parliament has passed its “Information {17th October to have an exhaustive law to deal with the technology ect se Cyber terrorism Ps ler the Information Technol Hechnology (Amendment) Act) Offence wy Tampering with computer so urce documents Computer related offences Sending offensive messages through communication device Dishonestly receiving the stolen computer resource —_ and communication device Theft of identity computer Tesource communication device Violation of privacy Cheating by personation by using logy Act, 2000 as a 008 iron Ist Mereyiction with mpri ynment upto 3 years and fine upto <5 lakh; and upon 2nd ier subsequent conviction with imprisonment upto 5 years and fine upto € 10 lakh. 10. | Publishing or transmitting material 67A form 678 _| Publishing or transmitting material depicting children in sexually explicit act etc. in e-form 67C | Violating the directions to preserve and retain the information by intermediaries Violating the directions of Controller by Certifying Authority or his employee Violating the directions of the Central Government or State Government to a subscriber to extend facilities to decrypt information Violating the directions to block any information for access by the public containing sexually explicit act in e- | i subsequent imprisonment u upto 10 lakh. Ist Upon con) imprisonment upto 5 upto © 10 lakh; and upon 2nd or subsequent conviction with imprisonment upto 7 years and fine upto 10 lakh. Imprisonment upto 3 years and fine Imprisonment upto 2 years or fine upto @ 1 lakh or both Imprisonment upto 7 years and fine Imprisonment upto 7 years and fine Imprisonment upto 3 years and fine Imprisonment upto 10 years and fine Violating the direc tions of the Indian Penalty for misrepresentation Penalty for breach of Confidentiality and privacy | Disclosure of information in breach 2nd or of lawful contract with nd fine Penalty for publishing electronic Signature certificate false in certain particulars d fine Publication for fraudulent purpose fine Cyber Terrorism Cyber terrorism is one ofthe serious threats to global security and information in the 2Istcentury. Terrorism has emerged as one ofthe most complex and perplexing phenomena that the world has faced. In addition to the tactics and ideological complexities, ine the dynamic ‘ature of terrorism proves itself in the way terrorists adapt new technologies, like computers and other IT tools. Terrorism refers to any deliberate creation and exploitation of fear through violence or the threat of violence in the pursuit tof Political change. Meaning and Definition : ism and it covers Oper terrorism refers to the convergence of cyberspace and a os. si Politically motivated hacking operations intended to cause grave harm ht moti ‘ cause harm Or Severe economic damage. It is the use of cyber space to i t country. Public and disrupt the integrity and sovereignty of the target c 3000 defines cyber terrorism as, “a integrity, g mn with an intent to create : a or aa terror in minds of people or une of people by authorised access to a computer resource OF. getting access ue 0 unauthorised means or causing damage 10 COmPMET network”. ‘Acts of cyber terrorism can be carried out Over private computer se devices and networks visible through the public internet as well as . government networks or other restricted networks. Hackers who break into comput rable networks, deface websites, launch denial-of. Sec. 66F of the IT Act, threat to the unity, systems can introduce viruses to vulne: service attacks or make terroristic threats electronically. Cyber attacks involve activities that can disrupt, corrupt, deny, or destroy information stored in computers or computer networks. Cyber terrorism attacks can be cyber attacks or physical attacks both affecting the informational infrastructure. Scope of Cyber Terrorism Cyber terrorism covers unlawful attacks and threats of attack against computers, networks, and the information stored therein. It is more than a virus that creates a mild degree of annoyance such as a denial of service. It causes physical violence or significant financial harm. Targets may include power plants, military installations, the banking say, air traffic control centres, water systems, and other major centres affecting the lives and well-being of many people and business organisations. : ewe may operate from anywhere in the world and can conceal theit oe a effectively, through the lack of capability of local law enforcement BS = pea The injury caused by cyber terrorists may take place thousands ly fic the physical location of the attacker. terrorist actions, Warfare, 2 form of cyhe, Tt consists of ni through the use of con vera. competing nation state. It is used as a guj iysieal damage t0 people and objects in the real worl eal world, "Types of Cyber Crimes I, Hacking puter or Hacking is considered as one of the most common fom ofg vite task that requires a high level of technical knowledge. Hacking er meess oa COmpIter System or network by Breaking the page ting computer s)stem, usage of faulty hardware or software in apassword. It is made for the purpose of obtaining personal steal, corrupt, or illegitimately view data. = A Hacker is a person who finds and exploits the oe in computer systems and/ A or networks to gain access. ‘Cracker’ is the person trying to exploit the vulnerable parts nt ofa system for malicious purposes. : ‘Types of Hackers 1 The white hat hacker: The white hat hacker does not carry on any illegal activities. He only learns about various information systems and seeks their vulnerabilities inorder to provide security programs that protect the system from illegal penetration. He uses his skill for good things and do not harm the computer. The black hat hacker: The black hat hacker carries on illegal activities associated ter with malicious with computer crimes. He gains unauthorised access to a comput intention for private gain. aa ti, The grey hat hacker: The grey hat hacker is a hackers who is a combination of a : White hat hacker and the black hat hacker. 5.10 2. Identity Theft a is the unlawful use of personal identifying infor to crimes, wherein, a person fraudulently ODISHS another perso and uses it primarily for economic gain. Once victim’s identity ais use the information to aboees (ie ViEual ag financial asset their victimization. The Identity theft crimin where the victims are often unaware of either through Phishing or Pharming a. Phishing: Phishing is a type of identity theft where the victims are contacted by email, telephone or text message by someone posing as a legitimate institution 1g attract individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. harming: Pharming is more advanced technique of crime associated with cyber crimes. Under pharming, a hacker infiltrates a computer system and installs malicious code that causes website traffic from the system to be redirected to bogus sites developed by the hacker with the intention of stealing a victim’s personal information, Phishing lures victims through fictitious emails to get them to visit bogus sites and teveal their sensitive information, but in Pharming there is absence of lure. This is done without the victim’s knowledge or consent. g a 10 repeated acts of harassment by using the internet, email, or Me ic communications to stalk, harass, threaten, manipulate, control, warrass or humiliate a person or business of another person. \t assing emails, instant or text messages, or social media posts, = sole purpose of tormenting the victim. Cyber stalking may be Harassment and Cyber By term Cyber stalking Harassment. Cyber Bullying is defined as, “an aggre carried out by a group or an individual, using electronic. against z victim who cannot easily defend him”, Cyber communication to bully a person, typically by sending threatening nature. It might be ina text, e-mail, message, 4. Web Hijacking 5. Pornography __ sis ae ex Pornography is the act of using cyber space as a medium for creating, distributing, imparting, publishing, describing or showing sexual acts or obscene materials through ver mobile phones, inorder to cause sexual Pornographic websites, magazines or 0} excitement or erotic feelings ealintis Child Pornography can be classified as one ofthe most serious forms of cybercrime inIndia. [tis defined as any visual depiction of sexually explicit conduct involving minor. 6. Denial of service attack ‘ In this of attack, the victim’s network is flooding with unnecessary traffic or Be timate fling the victim’s e-mail box with spam mail. Such an attack ismade1@ Prevent leg 5.12 use of computer networks, to deprive a person from connection between computers. 7. Malicious software Ibis also called Malware. Malicious software is internet bast designed to disrupt a network or harm the computer. It includes \ Horse, Spyware, Adware and other malicious programs. ’ Viruses are the programs that have the capability to infect other programs and copies itself and spread into other programs. Worms are programs that multiply like viruses but spread from computer to computer. ‘Trojen Horse is a computer program that pretends to be having a set of useful or desirable features, but which later on gains control over the computer and causes damages to the computer. Spyware is a malicious software which is installed unknowingly without appropriate issions while installing another program, which aims to steal personal or information like email address, passwords, credit card number, etc. Online gambling: Online gambling is the electronie p eredit card, debit card, electronic fund transfers, ete millions of websites that offer online gambling, a Cyber contraband: Cyber contraband refers iene fe internet Cyber laundering: Cyber laundering is the electronie money with the goal of hiding its source and its destinal 9. Intellectual Property Crimes Intellectual property crime is committed when distributes counterfeit or pirated goods, such as patents literary and artistic works for commercial gains. Then main property crimes are as follows: wie a. Software piracy: It is the stealing of legally protected software and is used for reproducing, copying, distributing, modifying or selling it without the permission of the owner. : : . : ing the trademark of someone else to sell goods with b. Cyber squatting: It refers to using the se acta the intention of getting profits from the goodwill of another person. ¢. Meta tagging: It means using the well known trade mark word of another person in his own domain name. 10. E-mail crimes : ; t i gainor to 4 E-mail frauds: It is the intentional deception of sending email for personal damage another individual. 5.14 bs «Email Spoofing: It refers o e-naail that PPS to have put actually has been send from another source: é E-mail Bombing: It refers to sending a large number account resulting in crashing of that account. ‘ending thousands of e-mails 4. E-mail Spamming: It refers to s flooding the internet from an unidentifiable source. 1. Cyber Defamation If any one publishes defamatory matter about someone else on a website or a ee e-mails containing defamatory statements to lower his reputation, it is called defamation. a 12.Cyber Terrorism Cyber terrorism i ism i Vi is the act of Internet terrorism in terrorist activities, including act acts of cor ys iS Pil€r system: This type of offence AVON BES eomputer or a peripheral attached to a computer, “Cyber Vandalism: e yi ism: rs to damaging or destroying misusing them. QUESTIONS Short Answer Questions (2 marks each) 1. What is cyber crime? What is cyber terrorism? What is hacking? What is identity theft? What is web hijacking? What is child pornography? What is phishing? What is pharming? 10, What is malicious software? 11, What is financial crime? 12, What is intellectual property crime? 13. What is cyber defamation? 14. What is cyber vandalism? 15. What is an adware? 16. What is spyware? 17. What is Trojen Horse? 18. What is cyber laundering? 19. What is the penalty for cyber terrorism? 20, What are computer viruses? a. 5 4. 5. What is cyber stalking? 6. 1. 8. 9 5.16 Short Essay or Paragraph Type Questions (5 marks each) 1. Explain the nature and scope of cyber crimes. a 2. _ Explain cyber terrorism. 3. What are the categories of cyber crimes? Essay Type Questions (15 marks each) 1. Explain cyber crimes under IT Act, 2000. Discuss the mode cyber crime. 2. Explain the major provisions under IT Act, 2000 dealing with penalties

You might also like