Tuesday, 23 October 2012

CYBER CRIME AND LAWS AGAINST IT


                        CYBER CRIME

Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Net crime refers to criminal exploitation of the Internet. Cyber crimes are defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
Internationally, both governmental and non-state actors engage in cyber crimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions through the International Criminal Court.
            Cyber crime is vast and has wide ranges of activities involved in it. Therefore it can be divided into two parts:
                                 (1)- Crime which targets computers directly.
Are further subdivided into following:
                                              
·       MALWARE: Malware is a short form of malicious software which are designed to damage or do unwanted action on a computer system.  
                                        
·       VIRUSES: It is a piece of a code or a program which is loaded on are computer without we being aware of it and it runs against our wishes.
                                                         
·       DENIAL OF SREVICE ATTACKS: this are the cracker or hacker attacks on a computer system or website aimed to disrupt its normal functions.
                                 (2)- Crime by computer network or devices.
Are further subdivided into:
·       CYBER STALKING: Cyber stalking is a crime in which the stalker harasses the victim with the help of electronic communication such as Emails, Instant Messaging (IM), or messages posted on a website or at discussion groups.
                                          
·       IDENTITY THEFT: Identity theft is in which the thief uses the users identity like credit cards, driving license, or other number security to create new accounts or for accessing his existing accounts.

·       PHISING SPAMS: Phishing spam’s are spam’s which are sent to the predator which are legitimate spam’s to gather information about the  predators personal and financial information.

The Cyber Graph for the year 2001-2002 is as follows:



Cyber Graph For 2001-2010:






Cyber Graph from January to June 2012:

 To avoid the cyber crime there are laws known as cyber laws
CYBER LAW: Cyber law is a term used to describe the legal issues related to use of communications technology, particularly “cyberspace”, i.e. the Internet. It is less of a distinct field of law in the way that property or contract are, as it is an intersection of many legal fields, including intellectual property, privacy, freedom of expression, and jurisdiction. In essence, cyber law is an attempt to apply laws designed for the physical world, to human activity on the Internet. In India, The IT Act, 2000 as amended by The IT (Amendment) Act, 2008 is known as the Cyber law. It has a separate chapter XI entitled “Offences” in which various cyber crimes have been declared as penal offences punishable with imprisonment and fine.
The laws and punishment for different cyber crimes are as follows:
·      Hacking
Hacking is not defined in The amended IT Act, 2000. Hacking means unauthorized attempts to the security mechanisms of an information system or network. Also, in simple words Hacking is the unauthorized access to a computer system, programs, data and network resources. (The term “hacker” originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)

Law & Punishment: Under Information Technology (Amendment)Act, 2008, Section 43(a) read with section 66 is applicable and Section 379 & 406 of Indian Penal Code, 1860 alsoare applicable. If crime is proved under IT Act, accused shall be punished for imprisonment, which may extend to three years or with fine, which may extend to five lakh rupees or both. Hacking offence is cognizable, bailable , compoundable with permission of the court before which the prosecution of such offence is pending and trialble by any magistrate.


·      Data Theft
Data Theft is a growing problem, primarily perpetrated by office workers with access to technology such as desktop computers and handhelddevices, capable of storing digital information such as flash drives, iPods and even digital cameras. The damage caused by data theft can be considerable with today’s ability to transmit very large files via e-mail, web pages, USB devices, DVD storage and other hand-held devices. According to Information Technology (Amendment) Act, 2008, crime of data theft under Section 43 (b) is stated as -If any person without permission of  the owner or any other person, who is incharge of a computer, computer system of computer network - downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium, then it is data theft.

 Law & Punishment: UnderInformation Technology (Amendment)Act, 2008, Section 43(b) read with Section 66 is applicable and under Section379,405 & 420 of Indian Penal Code,1860 also applicable. Data Theft offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and trialble by any magistrate.


·      Spreading Virus or Worms
In most cases, viruses can do any amount of damage, the creator intends them to do. They can send your data to a third party and then delete your data from your computer. They can also ruin/mess up your system and render it unusable without a re-installation of the operating system. Most have not done this much damage in the past, but could easily do this in the future. Usually the virus will
install files on your system and then will change your system so that virus program is run every time you start your system. It will then attempt to replicate itself by sending itself to other potential victims.

Law & Punishment: Under Information Technology (Amendment) Act, 2008, Section 43(c) & 43(e) read with Section 66 is applicable and under Section 268 of Indian Penal Code, 1860 also applicable. Spreading of Virus offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.

·      Identity Theft
Identity theft is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name. Information Technology (Amendment)Act, 2008, crime of identity theft under Section 66-C, whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person known as Identity Theft. Identity theft is a term used to refer to fraud that involves stealing money or getting other benefits by pretending to be someone else. The term is relatively new and is actually a misnomer, since it is not inherently possible to steal an identity, only to use it. The person whose identity is used can suffer various consequences when they are held responsible for the perpetrator’s actions. At one time the only way for someone to steal somebody else’s identity was by killing that person and taking his place. It was typically a violent crime. However, since then, the crime has evolved and today’s white collared criminals are a lot less brutal. But the ramifications of an identity theft are still scary.

Law & Punishment: Under Information Technology (Amendment) Act, 2008, Section 66-C and Section 419of Indian Penal Code, 1860 also applicable.
Identity Theft offence is cognizable, bailable, compoundable with permission
of the court before which the prosecution of such offence is pending and triable by any magistrate.

·      E-Mail Spoofing
E-mail spoofing is e-mail activity in which the sender addresses and other parts of
the e-mail header are altered to appear as though the e-mail originated from
a different source. E-mail spoofing is sending an e-mail to another person in
such a way that it appears that the e-mail was sent by someone else. A spoof email is one that appears to originate from one source but actually has been sent from another source. Spoofing is the act of electronically disguising one computer
as another for gaining as the password system. It is becoming so common that
you can no longer take for granted that thee-mail you are receiving is truly from the person identified as the sender. Email spoofing is a technique used
by hackers to fraudulently send email messages in which the sender address and
other parts of the email header are altered to appear as though the email originated from a source other than its actual source.
Hackers use this method to disguise the actual email address from which phishing and spam messages are sent and often use email spoofing in conjunction with Web page spoofing to trick users into providing personal and confidential information.

Law & Punishment: Under Information Technology (Amendment)Act, 2008, Section 66-D and Section 417,419 & 465 of Indian Penal Code, 1860 also applicable. Email spoofing offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.

2 comments:

  1. http://copyscape.com/view.php?o=50517&u=http%3A%2F%2Fen.wikipedia.org%2Fwiki%2FComputer_crime&t=1354626367&s=http%3A%2F%2Fsiddhiredkar.blogspot.in%2F2012%2F10%2Fcyber-crime-and-laws-against-it_23.html&w=149&i=1&r=10

    ReplyDelete
  2. Very Impressive Cyber Security Blog. The content seems to be pretty exhaustive and excellent and will definitely help in learning Cyber Security.I'm also a learner taken up Cyber Security and I think your content has cleared some concepts of mine. While browsing for Cyber Security tutorials on YouTube i found this fantastic video on Cyber Security. Do check it out if you are interested to know more.:-https://www.youtube.com/watch?v=Dl7p-stFpoc&t=187s

    ReplyDelete