26-08-2017, 12:42 PM
Cyber Law of India: Introduction
In a simple way we can say that cyber crime is an unlawful act in which the computer is a tool or an objective or both
Cyber crimes may involve criminal activities that are of a traditional nature, such as theft, fraud, counterfeiting, defamation and harm, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a range of new age crimes that are addressed by the Information Technology Act, 2000.
We can classify cyber crimes in two ways
The computer as a goal: - use a computer to attack other computers.
Eg:- Hacking, virus / worm attacks, DOS attack, etc.
The computer as a weapon: - using a computer to commit crimes of the real world.
Eg:- cyberterrorism, intellectual property rights violations, credit card fraud, EFT fraud, pornography, etc.
Cyber crime regulated by cyber laws or Internet laws.
Technical aspects
Technological advances have created new possibilities for criminal activity, in particular the misuse of information
a. Unauthorized access and Hacking: -
Access means gaining access to, instructing or communicating with the resources of the logical, arithmetic or memory function of a computer, computer system or computer network.
Therefore, unauthorized access means any type of access without the permission of the legitimate owner or the person in charge of a computer, computer system or computer network.
Every act committed to entering a computer and / or a network is hacking. Hackers write or use computer programs ready to attack the target computer. They have the desire to destroy and they get the kick of such destruction. Some hackers hack for personal monetary gains, such as stealing your credit card information, transferring money from several bank accounts to your account, followed by withdrawing money.
When hacking the web server taking control of another people website called as web hijacking
b. Trojan Attack
The program would act as something useful, but do things that are quiet cushioning. Programs of this type are called Trojans.
The known Trojan horse is popular.
Trojans come in two parts, one part of the client and one part of the server. When the victim (unknowingly) runs the server on your machine, the attacker will use the Client to connect to the Server and start using the Trojan.
The TCP / IP protocol is the usual protocol type used for communications, but some functions of the Trojan also use the UDP protocol.
c. Attack of viruses and worms: -
A program that has the ability to infect other programs and make copies of itself and spread to other programs is called viruses.
Programs that multiply as viruses, but spread from one computer to another, are called worms.
d. Crimes related to email and IRC: -
1. Email Spoofing
Email spoofing refers to email that appears to have been originated from a source when it was actually sent from another source. Please read
2. Email Spamming
Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain of letters.
3 Sending malicious codes by email
Emails are used to send viruses, trojans, etc. via emails as an attachment or by sending a website link that in the downloading of malicious code visits.
4. Email bombardment
Email "bombing" is characterized by abusers repeatedly sending an email message identical to a private address.
5. Sending threatening emails
6. Defamatory e-mails
7. Email Fraud
8. Relations related to IRC
Three main ways to attack IRC are: "verbal attacks, clone attacks and flood attacks".
f. Denial of service attacks: -
Flooding a computer resource with more requests than it can handle. This causes the resource to crash denying service access to authorized users.
Examples include
It tries to "flood" a network, thus avoiding legitimate network traffic
It tries to interrupt connections between two machines, thus preventing access to a service
Attempts to prevent a particular person from accessing a service
Attempts to disrupt service to a specific system or person.
In a simple way we can say that cyber crime is an unlawful act in which the computer is a tool or an objective or both
Cyber crimes may involve criminal activities that are of a traditional nature, such as theft, fraud, counterfeiting, defamation and harm, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a range of new age crimes that are addressed by the Information Technology Act, 2000.
We can classify cyber crimes in two ways
The computer as a goal: - use a computer to attack other computers.
Eg:- Hacking, virus / worm attacks, DOS attack, etc.
The computer as a weapon: - using a computer to commit crimes of the real world.
Eg:- cyberterrorism, intellectual property rights violations, credit card fraud, EFT fraud, pornography, etc.
Cyber crime regulated by cyber laws or Internet laws.
Technical aspects
Technological advances have created new possibilities for criminal activity, in particular the misuse of information
a. Unauthorized access and Hacking: -
Access means gaining access to, instructing or communicating with the resources of the logical, arithmetic or memory function of a computer, computer system or computer network.
Therefore, unauthorized access means any type of access without the permission of the legitimate owner or the person in charge of a computer, computer system or computer network.
Every act committed to entering a computer and / or a network is hacking. Hackers write or use computer programs ready to attack the target computer. They have the desire to destroy and they get the kick of such destruction. Some hackers hack for personal monetary gains, such as stealing your credit card information, transferring money from several bank accounts to your account, followed by withdrawing money.
When hacking the web server taking control of another people website called as web hijacking
b. Trojan Attack
The program would act as something useful, but do things that are quiet cushioning. Programs of this type are called Trojans.
The known Trojan horse is popular.
Trojans come in two parts, one part of the client and one part of the server. When the victim (unknowingly) runs the server on your machine, the attacker will use the Client to connect to the Server and start using the Trojan.
The TCP / IP protocol is the usual protocol type used for communications, but some functions of the Trojan also use the UDP protocol.
c. Attack of viruses and worms: -
A program that has the ability to infect other programs and make copies of itself and spread to other programs is called viruses.
Programs that multiply as viruses, but spread from one computer to another, are called worms.
d. Crimes related to email and IRC: -
1. Email Spoofing
Email spoofing refers to email that appears to have been originated from a source when it was actually sent from another source. Please read
2. Email Spamming
Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain of letters.
3 Sending malicious codes by email
Emails are used to send viruses, trojans, etc. via emails as an attachment or by sending a website link that in the downloading of malicious code visits.
4. Email bombardment
Email "bombing" is characterized by abusers repeatedly sending an email message identical to a private address.
5. Sending threatening emails
6. Defamatory e-mails
7. Email Fraud
8. Relations related to IRC
Three main ways to attack IRC are: "verbal attacks, clone attacks and flood attacks".
f. Denial of service attacks: -
Flooding a computer resource with more requests than it can handle. This causes the resource to crash denying service access to authorized users.
Examples include
It tries to "flood" a network, thus avoiding legitimate network traffic
It tries to interrupt connections between two machines, thus preventing access to a service
Attempts to prevent a particular person from accessing a service
Attempts to disrupt service to a specific system or person.