0 ratings 0% found this document useful (0 votes) 21 views 16 pages InformaticsAndCyberLaws Module5
The document discusses the rise of cyber crimes due to advancements in technology and the internet, highlighting the various forms of cyber crime such as hacking, identity theft, and cyber terrorism. It emphasizes the challenges in detecting and prosecuting these crimes due to their complex and global nature. Additionally, it outlines the legal framework, specifically the IT Act of 2000, aimed at regulating cyber activities and protecting individuals and society from cyber threats.
AI-enhanced title and description
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items
Save InformaticsAndCyberLaws_Module5 For Later ) | CYBER CRIMES
— J
Advancement of technology has made man dep
Internet has given man easy access to social networking,
gaming, online studying, online jobs, etc. Easy access to
data, easy destroyal of data etc. have led to a great inc
crimes and unauthorised computer access.
| Meaning and Definition
Cyber crime or Computer crime refers
through the medium of communication tec
_ and the world wide web. Cyber:
3 Bpeetellon: sa dipids e
¥ - a ee 3 fs basic
The internet has originated and d ed | from a relatively oe,
ork set up to share information between trusted people and organisations. o ee
| this open and insecure system has evolved into a world wide network has beet 0
* committing cyber crimes.5.2
Computer crime is increasing in scope and in complexity. It pose
the security and safety, particularly to critical infrastructures such as th
system, etc. which are totally dependent on 0
system, defence
‘The nature and scope of cyber crime can be explained through
rime is a social and ec
1. Social and economic phenomenon:
and is as old as the human society. It is perhaps the most compli
cyber world. The world of computers have transformed the modern society
expectations. It has made it possible to have access to all corners of the World in
one’s finger tips. When compared to the physical world, cyber world is very wide
and the global dimension of cyber crime makes it difficult to handle with ease. It has
provided the scope for criminals to commit their crime with least chance of detection,
The human society has become vulnerable to cyber crimes due to more and more
dependence on technology. Cybercrime is a major concern for the global community.
The introduction, growth, and utilisation of information and communication
technologies have been accompanied by an increase in criminal activities.
‘Tnsecure nature: Cyber crimes flourish in the cyber world, because of the insecure
-hature of the internet. It leaves computers vulnerable to exploitation. The large number
af computers connected to the internet gives an opportunity for wide array of targets
s. The internet is an effective medium for Tunning automated systemswease in Cyber Crimes
Be eTeAse in the number of cyber crimes. The mai
its difficulty to identity the cyber criminals, Some 6
micyber crimes are the following ‘
Bee We Virtual world: Every activity of cyber er
B)yirmial world and not in the physical world. Hence, i is difficultto
aNo geographical limits: There is no limit as jaa
committing cyber crimes. It can be committed from any p
is difficult to detect the persons involved in it,
Difficult to collect evidence of cyber crime: In order to
sriminal, there should be evidence for the crime, But iti
evidence and prove them in court of law due to its
to this attack.
ms | Classification of Cyber Crimes anne
Cyber crimes can be broadly classified under 4 heads
gh Crime against individuals: Crime against individual is pease em
a "sing electronic domain, It includes child pornography, harassment, hacking
? crimes, etc, The potential harm of such a crime can hardly be higher.
; Cyber Crime against property: Cyber crime against property is — using
: an electronic device as a medium. Here, the property does not mean any immovable
Ree ikea Intellectual
= jovable and intangible property like computers,
Property but includes m‘
Property, etc.3. Cyber crime against Government: A cyber crime against
committed to threatening the unity, honour, and security of th
The criminals hack government websites and military Web
their target. Cyber crime against government includes Cy!
Terrorism etc.
Cyber crime against society: When a cyber crime is committed
individuals, itis known as cyber crime against society. It includes On
Cyber Trafficking, Web jacking, Salami attacks etc.
Inorder to regulate the criminal activities in the cyber world and to protec,
technological advancement system, there arises the need for strict statutory laws. These
Jaws came in the form of Cyber Law. The Act pertaining to it is the IT Act, 2000
Cyber Law and IT Act
Cyber law is the part of the overall legal system that deals with the internet
cyberspace, and their respective legal issues. Cyber law covers a fairly broad area,
encompassing several subtopics including freedom of expression, access to and usage
of the internet, and online privacy. It is the legislation focused on the acceptable
behavioural use of technology including computer hardware and software, the internet,
: circumstances Indian Parliament has passed its “Information
{17th October to have an exhaustive law to deal with the technologyect
se
Cyber terrorism Ps
ler the Information Technol
Hechnology (Amendment) Act)
Offence wy
Tampering with computer so
urce
documents
Computer related offences
Sending offensive messages through
communication device
Dishonestly receiving the stolen
computer resource —_ and
communication device
Theft of identity
computer Tesource
communication device
Violation of privacy
Cheating by personation by using
logy Act, 2000 as a
008
iron Ist Mereyiction with
mpri ynment upto 3 years and fine
upto <5 lakh; and upon 2nd ier
subsequent conviction with
imprisonment upto 5 years and fine
upto € 10 lakh.10.
| Publishing or transmitting material
67A
form
678 _| Publishing or transmitting material
depicting children in sexually explicit
act etc. in e-form
67C | Violating the directions to preserve
and retain the information by
intermediaries
Violating the directions of Controller
by Certifying Authority or his
employee
Violating the directions of the
Central Government or State
Government to a subscriber to extend
facilities to decrypt information
Violating the directions to block any
information for access by the public
containing sexually explicit act in e- | i
subsequent
imprisonment u
upto 10 lakh.
Ist
Upon con)
imprisonment upto 5
upto © 10 lakh; and upon 2nd or
subsequent conviction with
imprisonment upto 7 years and fine
upto 10 lakh.
Imprisonment upto 3 years and fine
Imprisonment upto 2 years or fine
upto @ 1 lakh or both
Imprisonment upto 7 years and fine
Imprisonment upto 7 years and fine
Imprisonment upto 3 years and fine
Imprisonment upto 10 years and fineViolating the direc
tions of the Indian
Penalty for misrepresentation
Penalty for breach of Confidentiality
and privacy
| Disclosure of information in breach
2nd or of lawful contract
with
nd fine
Penalty for publishing electronic
Signature certificate false in certain
particulars
d fine
Publication for fraudulent purpose
fine
Cyber Terrorism
Cyber terrorism is one ofthe serious threats to global security and information in the
2Istcentury. Terrorism has emerged as one ofthe most complex and perplexing phenomena
that the world has faced. In addition to the tactics and ideological complexities,
ine
the dynamic
‘ature of terrorism proves itself in the way terrorists adapt new technologies, like computers
and other IT tools. Terrorism refers to any deliberate creation and exploitation of fear
through violence or the threat of violence in the pursuit tof Political change.
Meaning and Definition :
ism and it covers
Oper terrorism refers to the convergence of cyberspace and a os.
si
Politically motivated hacking operations intended to cause grave harm ht
moti ‘
cause harm
Or Severe economic damage. It is the use of cyber space to
i t country.
Public and disrupt the integrity and sovereignty of the target c3000 defines cyber terrorism as, “a
integrity, g
mn with an intent to create :
a or aa terror in minds of people or une of people by
authorised access to a computer resource OF. getting access ue 0
unauthorised means or causing damage 10 COmPMET network”.
‘Acts of cyber terrorism can be carried out Over private computer se
devices and networks visible through the public internet as well as .
government networks or other restricted networks. Hackers who break into comput
rable networks, deface websites, launch denial-of.
Sec. 66F of the IT Act,
threat to the unity,
systems can introduce viruses to vulne:
service attacks or make terroristic threats electronically. Cyber attacks involve activities
that can disrupt, corrupt, deny, or destroy information stored in computers or computer
networks. Cyber terrorism attacks can be cyber attacks or physical attacks both affecting
the informational infrastructure.
Scope of Cyber Terrorism
Cyber terrorism covers unlawful attacks and threats of attack against computers,
networks, and the information stored therein. It is more than a virus that creates a mild
degree of annoyance such as a denial of service. It causes physical violence or significant
financial harm. Targets may include power plants, military installations, the banking
say, air traffic control centres, water systems, and other major centres affecting the
lives and well-being of many people and business organisations.
: ewe may operate from anywhere in the world and can conceal theit
oe a effectively, through the lack of capability of local law enforcement
BS = pea The injury caused by cyber terrorists may take place thousands
ly fic the physical location of the attacker.
terrorist actions,Warfare, 2 form of cyhe,
Tt consists of ni
through the use of con
vera. competing nation
state. It is used as a guj
iysieal damage t0 people and objects in the real worl
eal world,
"Types of Cyber Crimes
I, Hacking
puter
or Hacking is considered as one of the most common fom ofg
vite task that requires a high level of technical knowledge. Hacking
er meess oa COmpIter System or network by Breaking the page
ting computer s)stem, usage of faulty hardware or software in
apassword. It is made for the purpose of obtaining personal
steal, corrupt, or illegitimately view data.
= A Hacker is a person who finds and exploits the oe in computer systems and/
A or networks to gain access. ‘Cracker’ is the person trying to exploit the vulnerable parts
nt ofa system for malicious purposes.
: ‘Types of Hackers
1 The white hat hacker: The white hat hacker does not carry on any illegal activities.
He only learns about various information systems and seeks their vulnerabilities
inorder to provide security programs that protect the system from illegal penetration.
He uses his skill for good things and do not harm the computer.
The black hat hacker: The black hat hacker carries on illegal activities associated
ter with malicious
with computer crimes. He gains unauthorised access to a comput
intention for private gain. aa
ti, The grey hat hacker: The grey hat hacker is a hackers who is a combination of
a :
White hat hacker and the black hat hacker.5.10
2. Identity Theft a
is the unlawful use of personal identifying infor
to crimes, wherein, a person fraudulently ODISHS another perso
and uses it primarily for economic gain. Once victim’s identity
ais use the information to aboees (ie ViEual ag financial asset
their victimization. The
Identity theft
crimin
where the victims are often unaware of
either through Phishing or Pharming
a. Phishing: Phishing is a type of identity theft where the victims are contacted by
email, telephone or text message by someone posing as a legitimate institution 1g
attract individuals into providing sensitive data such as personally identifiable
information, banking and credit card details, and passwords.
harming: Pharming is more advanced technique of crime associated with cyber
crimes. Under pharming, a hacker infiltrates a computer system and installs malicious
code that causes website traffic from the system to be redirected to bogus sites
developed by the hacker with the intention of stealing a victim’s personal information,
Phishing lures victims through fictitious emails to get them to visit bogus sites and
teveal their sensitive information, but in Pharming there is absence of lure. This is
done without the victim’s knowledge or consent.
g a 10 repeated acts of harassment by using the internet, email, or
Me ic communications to stalk, harass, threaten, manipulate, control,
warrass or humiliate a person or business of another person. \t
assing emails, instant or text messages, or social media posts,
= sole purpose of tormenting the victim. Cyber stalking may beHarassment and Cyber By
term Cyber stalking
Harassment.
Cyber Bullying is defined as, “an aggre
carried out by a group or an individual, using electronic.
against z victim who cannot easily defend him”, Cyber
communication to bully a person, typically by sending
threatening nature. It might be ina text, e-mail, message,
4. Web Hijacking
5. Pornography __ sis ae ex
Pornography is the act of using cyber space as a medium for creating, distributing,
imparting, publishing, describing or showing sexual acts or obscene materials through
ver mobile phones, inorder to cause sexual
Pornographic websites, magazines or 0}
excitement or erotic feelings ealintis
Child Pornography can be classified as one ofthe most serious forms of cybercrime
inIndia. [tis defined as any visual depiction of sexually explicit conduct involving minor.
6. Denial of service attack ‘
In this of attack, the victim’s network is flooding with unnecessary traffic or
Be timate
fling the victim’s e-mail box with spam mail. Such an attack ismade1@ Prevent leg5.12
use of computer networks, to deprive a person from
connection between computers.
7. Malicious software
Ibis also called Malware. Malicious software is internet bast
designed to disrupt a network or harm the computer. It includes \
Horse, Spyware, Adware and other malicious programs. ’
Viruses are the programs that have the capability to infect other programs and
copies itself and spread into other programs.
Worms are programs that multiply like viruses but spread from computer to computer.
‘Trojen Horse is a computer program that pretends to be having a set of useful or
desirable features, but which later on gains control over the computer and causes damages
to the computer.
Spyware is a malicious software which is installed unknowingly without appropriate
issions while installing another program, which aims to steal personal or
information like email address, passwords, credit card number, etc.Online gambling: Online gambling is the electronie p
eredit card, debit card, electronic fund transfers, ete
millions of websites that offer online gambling, a
Cyber contraband: Cyber contraband refers iene fe
internet
Cyber laundering: Cyber laundering is the electronie
money with the goal of hiding its source and its destinal
9. Intellectual Property Crimes
Intellectual property crime is committed when
distributes counterfeit or pirated goods, such as patents
literary and artistic works for commercial gains. Then main
property crimes are as follows: wie
a. Software piracy: It is the stealing of legally protected software and is used for
reproducing, copying, distributing, modifying or selling it without the permission of
the owner. : : .
: ing the trademark of someone else to sell goods with
b. Cyber squatting: It refers to using the se acta
the intention of getting profits from the goodwill of another person.
¢. Meta tagging: It means using the well known trade mark word of another person in
his own domain name.
10. E-mail crimes :
; t i gainor to
4 E-mail frauds: It is the intentional deception of sending email for personal
damage another individual.5.14
bs «Email Spoofing: It refers o e-naail that PPS to have
put actually has been send from another source: é
E-mail Bombing: It refers to sending a large number
account resulting in crashing of that account.
‘ending thousands of e-mails
4. E-mail Spamming: It refers to s
flooding the internet from an unidentifiable source.
1. Cyber Defamation
If any one publishes defamatory matter about someone else on a website or
a ee
e-mails containing defamatory statements to lower his reputation, it is called
defamation. a
12.Cyber Terrorism
Cyber terrorism i ism i Vi
is the act of Internet terrorism in terrorist activities, including act
actsof cor ys
iS Pil€r system: This type of offence AVON
BES eomputer or a peripheral attached to a computer,
“Cyber Vandalism: e
yi ism: rs to damaging or destroying
misusing them.
QUESTIONS
Short Answer Questions (2 marks each)
1. What is cyber crime?
What is cyber terrorism?
What is hacking?
What is identity theft?
What is web hijacking?
What is child pornography?
What is phishing?
What is pharming?
10, What is malicious software?
11, What is financial crime?
12, What is intellectual property crime?
13. What is cyber defamation?
14. What is cyber vandalism?
15. What is an adware?
16. What is spyware?
17. What is Trojen Horse?
18. What is cyber laundering?
19. What is the penalty for cyber terrorism?
20, What are computer viruses?
a.
5
4.
5. What is cyber stalking?
6.
1.
8.
95.16
Short Essay or Paragraph Type Questions (5 marks each)
1. Explain the nature and scope of cyber crimes. a
2. _ Explain cyber terrorism.
3. What are the categories of cyber crimes?
Essay Type Questions (15 marks each)
1. Explain cyber crimes under IT Act, 2000. Discuss the mode
cyber crime.
2. Explain the major provisions under IT Act, 2000 dealing with penalties