TODAY -

Cyber Law and Crime

Wangjam Devendra Singh *



How management view their organization security?
Attack at gunpoint, bombing, stealing of goods etc
How employees view their organization security?
Leakage of password to the colleagues, stealing of files, deleting of valuable document etc
How crackers view their organization security?
What if my software source code is stolen, what if my email id is flooded with spontaneous email. What if my organization's bank balance is manipulated? What if my organization's website is defamed with pornographic picture? What if my Integrated circuit design is copied? What if my server is attack by virus/worm/torjan. This is the case where we are going to discuss.

Cyber space is intangible in nature where the things are not all in physical in nature. Theft of traditional goods like gold, money, book, papers are covered by the traditional penal provisions laws. However theft of electronics record remains in the possession of the owner but the content gets stolen. Moreover Cyberspace has no boundary ; a complete disrespect of jurisdictional boundaries.

Hence we need a different law in this dimension. Here borns the cyber law.
Cyber law in India came into force on 17 october 2000 with the IT Act 2000.

Main purpose of the Cyber law 2000 was
1. Legal recognition of e-commerce
2. Electronics filling of records with the government
3. Penalty of cyber crime.
4. Digital signature certifying authority rules.

UNAUTHORIZED ACCESS : HACKING:-

Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network.
Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network.
Every act committed towards breaking into a computer and/or network is hacking. Generally hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money.

TROJAN, VIRUS AND WORM ATTACK :-

Trojan horses disguise themselves as valuable and useful software available for download on the internet. Most people are fooled by this ploy and end up downloading the virus disguised as some other application. The name comes from the mythical "Trojan Horse" that the Ancient Greeks set upon the city of Troy.

Trojans come in two parts, a Client part and a Server part. When the victim (unknowingly) runs the server on its machine, the attacker will then use the Client to connect to the Server and start using the trojan.

A program that has capability to infect other programs and spread with the human action, (such as running an infected program) to keep it spreading is called virus. A program that multiply itseft without intervention of human and eats up all the memory resource are called as worms.

E-MAIL RELATED CRIMES:- 1. Email spoofing
Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source.
2. Email Spamming
Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter.
3 Sending malicious codes through email
E-mails are used to send viruses,Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code.
4. Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address.
5. Sending threatening emails
6. Defamatory emails

DENIAL OF SERVICE (DOS) ATTACKS:- Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users.

Examples include
attempts to "flood" a network, thereby preventing legitimate network traffic
attempts to disrupt connections between two machines, thereby preventing access to a service
attempts to prevent a particular individual from accessing a service
attempts to disrupt service to a specific system or person.

Types of DOS
There are three basic types of attack:
a. Consumption of scarce, limited, or non-renewable resources like NW bandwith, RAM, CPU time. Even power, cool air, or water can affect.
b. Destruction or Alteration of Configuration Information
c. Physical Destruction or Alteration of Network Components

PORNOGRAPHY:-

The literal mining of the term 'Pornography' is "describing or showing sexual acts in order to cause sexual excitement through books, films, pictures etc." This would include pornographic websites; pornographic material produced using computers and use of internet to download and transmit pornographic videos, pictures, photos, writings etc.

Adult entertainment is largest industry on internet. There are more than 420 million individual pornographic webpages today.

Pedophiles:-
Also there are persons who intentionally prey upon children. Specially with a teen they will let the teen know that fully understand the feelings towards adult and in particular teen parents.
They earns teens trust and gradually seduce them into sexual or indecent acts.
Pedophiles lure the children by distributing pornographic material, then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions.

FORGERY:-

Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners. Also impersonate another person is considered forgery.

INTELLECTUAL PROPERTY RIGHT VIOLATIONS:-

These include software piracy, copyright infringement, trademarks violations, theft of computer source code, patent violations. Etc. Cyber Squatting- Domain names are also trademarks and protected by ICANN's domain dispute resolution policy and also under trademark laws. Cyber Squatters registers domain name identical to popular service provider's domain so as to attract their users and get benefit from it.

Cyber Terrorism:-

Targeted attacks on military installations, power plants, air traffic control, banks, trail traffic control, telecommunication networks are the most likely targets. Others like police, medical, fire and rescue systems etc. Cyberterrorism is an attractive option for modern terrorists for several reasons.

1. It is cheaper than traditional terrorist methods.
2. Cyberterrorism is more anonymous than traditional terrorist methods.
3. The variety and number of targets are enormous.
4. Cyberterrorism can be conducted remotely, a feature that is especially appealing to terrorists.
5. Cyberterrorism has the potential to affect directly a larger number of people.

BANKING/CREDIT CARD RELATED CRIMES:-

In the corporate world, Internet hackers are continually looking for opportunities to compromise a company's security in order to gain access to confidential banking and financial information.
Use of stolen card information or fake credit/debit cards are common.
Bank employee can grab money using programs to deduce small amount of money from all customer accounts and adding it to own account also called as salami.

E-COMMERCE/ INVESTMENT FRAUDS:- Sales and Investment frauds. An offering that uses false or fraudulent claims for investments or purchase but services that were purchased or contracted by individuals online are never delivered.
Investors are attracted to invest in this fraudulent scheme by the promises of abnormally high profits.

Sale of illegal articles:-
This would include trade of Drugs, narcotics, weapons and wildlife etc, by posting information on websites, auction websites, and bulletin boards or simply by using email communication.

ONLINE GAMBLING:-

There are millions of websites hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually run for money laundering ( to make black money white).

DEFAMATION: - Defamation can be understood as the intentional infringement of another person's right to his good name.
Cyber Defamation occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information to all of that person's friends.

CYBER STACKING:-

Cyber stalking involves following a persons movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. In general, the harasser intends to cause emotional distress and has no legitimate purpose to his communications.

DATA DIDDLING:-

Data diddling involves changing data prior or during input into a computer.
It also include changing the financial information for some time before processing and then restoring original information.

Since all sensitive information that is mostly stored on a computer that is connected to the Internet, there is a need for information assurance and security. So in order to have Cyber Security, everyone should follow the Cyber Security standards that enable us to protect various cyber threat




* Wangjam Devendra Singh contributes to e-pao.net for the first time. The writer works at Employees' Provident Fund Org, Ministry Of Labour Government of India as a System Sdministration. The writer can be reached at wangdev(at)gmail(dot)com
This article was webcasted on April 26th, 2009.


* Comments posted by users in this discussion thread and other parts of this site are opinions of the individuals posting them (whose user ID is displayed alongside) and not the views of e-pao.net. We strongly recommend that users exercise responsibility, sensitivity and caution over language while writing your opinions which will be seen and read by other users. Please read a complete Guideline on using comments on this website.




LATEST IN E-PAO.NET
  • Nupi Landa Thaunaphabishing : Full Book
  • Violence in Manipur 2023-2024 : Timeline
  • 174th Anniv Maharaj Narasingh #2 : Gallery
  • Challenges in Healthcare in rural Manipur
  • A salute to leadership quality of PM Modi
  • Career in press for freedom of expression
  • One day after devastating hailstorm
  • Understanding the suffering of others
  • A ferocious hailstorm @Imphal : Gallery
  • Article 355 of Constitution of India #1
  • Integrated Farming Systems for farmers #3
  • Election gossip & rumours
  • 'Melodic Minds' Tour in Guwahati
  • Leaving a trail of destruction
  • Political see-saw
  • A brand-new Scientific discovery
  • In memoriam of the happiness we shared !
  • Crop/animal for higher productivity in NE #5
  • "ST status for Meetei" at Sekmaijin
  • Oh Motherland :: Poem
  • Animal life should be treated with dignity
  • '365 Days of Chin-Kuki Aggression' : Gallery
  • Renaissance of politics in our youth
  • TB & tobacco co-epidemics in Indonesia
  • The Power of Poppy - 29 :: Poem
  • Advanced Charging Infrastructure in NE
  • Lessons learnt in the last one year
  • True colour of politics
  • World Heritage Day @ MU : Gallery
  • "ST status for Meetei" at Kakwa
  • Joint Combing Operations in Jiribam
  • Reboot PSUs for jobs: Task for new Govt
  • Ayurvedic remedies to keep healthy eyes
  • May 3, 2023 to May 3, 2024
  • One year of crisis, and what next ?
  • Scientist of Manipur: Nongmaithem Rajmuhon
  • Whither social justice & work for women?
  • Taiwan to enhancing economic ties with India
  • Integrated Farming Systems for farmers #2
  • Athoubasingi Numit #2 : Gallery
  • Privilege trap of While Male Meitei
  • Crop/animal for higher productivity in NE #4
  • 'Chizami Model' working in Gujarat ?
  • Racing towards the one year mark
  • On misattribution & falsifying history
  • Nupi Landa Thaunaphabishing #15 :: Book
  • May Calendar for Year 2024 : Tools
  • 12th World Bamboo Congress at Taiwan
  • Complex dance of democracy in Manipur
  • "ST status for Meetei" at Pangaltabi
  • Integrated Farming Systems for farmers #1
  • Showing ugly face of muscle power
  • Spare the rod, spoil the monster
  • Descent of Radha-Krishna #31: Download
  • Socio-Historical analysis on Ethnic Conflict
  • "ST status for Meetei" at Langmeidong
  • Ngangbam Dipapati- Gold @European Cup
  • Crop/animal for higher productivity in NE #3
  • Fresh surge in violence
  • The real culprit
  • National Science Teacher workshop
  • Livelihood Disaster in Mapithel Region
  • Condemns Killing of CRPF Personnel
  • "ST status for Meetei" at Manipur College
  • Huidrom Oliviya: Silver @Cadet European Cup
  • Election: Runner-up may spoil the joy
  • Scientists of Manipur : Laishram Ladu Singh
  • Imphal Ring Road Project to Transform
  • Crop/animal for higher productivity in NE #2
  • The Power of Poppy - 28 :: Poem
  • Condemned unabated illegal taxation
  • Watermelon : Super nutritious summer fruit
  • People have spoken, Manipur has voted
  • Skirting around core issues
  • Lok Sabha polls in Manipur #2 : Gallery
  • The Taj Mahal that bans Lovers !
  • Importance of bees !
  • Massive hailstorm in Jiribam
  • The messiah of hapless children
  • Attack on fuel tankers & blasting bridge
  • Blame it on Meetei
  • The Happiness Code : Download
  • NH-2 Bridge bombed @Sapermeina : Gallery
  • Crop/animal for higher productivity in NE #1
  • Training Programme under SPARK concluded
  • Why environment control is so difficult
  • 4th Foundation Day- Young Minds Collective
  • All set for second phase poll
  • The Nongsaba phenomenon
  • Khongjom Day @Khebaching #1 : Gallery
  • India's responsibility to end Manipur violence
  • Migrant worker could access TB services only
  • Importance of reading magazines as student
  • SHG pioneering agricultural innovation
  • Nearing the one year mark
  • The enemy within
  • Id-ul-Fitr @Hatta #2 : Gallery
  • Workshop @ NSU Manipur : Gallery
  • 15th Manipur State Film Awards 2023
  • "ST status for Meetei" at Panthoibi Shanglen
  • GSDP doubles, health shines
  • Vote has been cast, repoll held
  • Two faces of democracy
  • Laurels for Scientist Ngangkham Nimai
  • Crime against women in Manipur
  • "ST status for Meetei" at Sugnu
  • Creativity & innovation for vibrant career
  • 4th Foundation Day of YMC
  • Racing towards one year mark
  • Prophetic words, indeed
  • Nupi Landa Thaunaphabishing #14 :: Book
  • 174th Anniv Maharaj Narasingh #1 : Gallery
  • Ensuring Fair Voting in Hills of Manipur
  • Dr Irengbam Mohendra's latest book :: Rvw
  • NDA has the advantage in both
  • Lok Sabha polls in Manipur #1 : Gallery
  • L Rup's Robot 'Kangleinganbi' in Manipuri
  • Art- means of connecting hearts in Manipur
  • Is it Living Alive or Living Death ? :: Poem
  • Rabies - A preventable zoonotic disease
  • April 19, 2024: The blackest day of all
  • Ugly turns on voting day
  • Children Camp @JNMDA Imphal #2 : Gallery
  • The chasm between TB & HIV continues
  • Parliament and its Members
  • Kimchi for health and glowing skin
  • LS election with a difference
  • To vote, or not to vote ?
  • Sajibu Cheiraoba Chak Katpa #2 : Gallery
  • "ST status for Meetei" at Lamjao, Kakching
  • The Power of Poppy - 27 :: Poem
  • Mother Language based education essential
  • Modi's warriors wear regional hats
  • Nest Asia promoting Northeastern Cuisine
  • Now look beyond LS poll
  • The rot in the system
  • Scientists of Manipur : Laitonjam Warjeet
  • Community seed bank @Umathel : Gallery
  • 10 candidates cracked Civil Services Exam
  • Milk of Paradise: History of Opium : Rvw
  • How plastics find their way into our bodies
  • Condemning attack on Trucks along NH-37
  • Cong looking to buck the trend
  • Saving Manipur
  • Sajibu Cheiraoba: 1 occasion, 2 narratives #2
  • Election Duty :: Travellog
  • 1st Nagas' Meet in Punjab
  • How to select right MP to represent Manipur
  • "ST status for Meetei" at Tejpur
  • Bats are Keystone species for the Planet
  • The '15 days' conundrum
  • Free but not so fair
  • Descent of Radha-Krishna #30: Download
  • Before You Vote : My Rumbling Thoughts
  • "ST status for Meetei" at Kakching
  • Meiraba wins All India Sr tournament
  • Finding light in dark through my daughter
  • Navigating life's unreasonable expectations
  • Test of people's character
  • BJP's election manifesto
  • Athoubasingi Numit #1 : Gallery
  • Black rice & Glycemic Index
  • What Nadda should speak at Dimapur rally
  • Open Letter to CM Office Manipur
  • Meghalaya unveils Strawberry festival
  • Benefits of maths newspapers for students
  • Id-ul-Fitr @Hatta #1 : Gallery
  • Are you a good person ?
  • Physics Academy of NE : Executive Body
  • "ST status for Meetei" at Moirang
  • Cherrapunji Eastern Craft Gin launched
  • Cong on cautious path
  • Botox for Hair
  • Posers voters should raise now
  • The lull before the storm
  • 80th Anniv- Battle of Kanglatongbi @UK
  • Vir Chakra Ngangom Joydutta's bust unveiled
  • Hun - Thadou Cultural Festival : Gallery
  • "ST status for Meetei" at Singjamei
  • Election Eclipses: Ballad of Battle & Loss
  • Our voices are equal at the ballot box
  • Scientists of Manipur : Ngangkham Nimai
  • Urgent Call for Solidarity in Manipur
  • Meitei Nongsha #2 :: An Artwork
  • "ST status for Meetei" at Waikhong
  • About NPF-BJP-NPP alliance & why ?
  • World Veterinary Day, 2024
  • The heavy stake behind the LS polls
  • The politics of lying & deception
  • Sajibu Cheiraoba Chak Katpa #1 : Gallery
  • Hun-Thadou Cultural Fest @ Delhi: Report
  • Appeal to Parties & Candidates
  • "ST status for Meetei" at Wangoo
  • Establishment of community seed bank
  • Awareness Programme on new Criminal Laws
  • Make a right choice at the Lok Sabha election
  • Sajibu Cheiraoba: 1 occasion, 2 narratives #1
  • RIST talk-58 : Support systems of elderly
  • "ST status for Meetei" at Hiyanglam
  • Vote, do not boycott !
  • Lok Sabha election: A new dawn in politics ?
  • IIT-Guwahati Half Marathon report
  • Taking ST demand to the election ring
  • Lesson to be learnt from across border
  • Mirabai: Poised for Paris Olympics
  • Legal position for protection of environment
  • "ST status for Meetei" at Keisamthong
  • Heterocyclic compound & biochemical science
  • Inner, torn between two lovers
  • Certification Music Therapy Workshop
  • NOTA as a choice
  • Caesar's wife must be above suspicion
  • Descent of Radha-Krishna #29: Download
  • World Health Day 2024
  • "ST status for Meetei" at Pangantabi
  • The Power of Poppy - 26 :: Poem
  • Fulbright Fellowship Outreach at Arunachal
  • Id-ul Fitr da namaz nattana..
  • Nupi Landa Thaunaphabishing #13 :: Book
  • Lok Sabha election is coming, be prepared
  • 6th Hun-Thadou Cultural Festival
  • Let There Be Free & Fair Election
  • "ST status for Meetei" at Lamlong
  • Science magazines are important for student
  • Interesting choice of candidates
  • The power of We, the voters
  • Inspirations from Scientists of Manipur #1
  • The Case for Amendment of Article 371-C
  • Beating of the Retreat #1 : Gallery
  • Kenedy Khuman (Singer) : Gallery
  • Show of strength without unity
  • Yaoshang Pichakari #2 : Gallery
  • Natural packaging from bamboo : Gallery
  • Yaoshang Mei Thaba #2 : Gallery
  • Lamta Thangja @ Imphal : Gallery
  • Students @ Class X Exam : Gallery
  • Saroi Khangba @ Kangla : Gallery
  • Protest for scrapping SoO #2 :Gallery
  • Shopping List for Shivaratri : Gallery
  • Featured Front Page Photo 2024 #1: Gallery
  • Radio E-pao: Manipuri Film OST (130+ song)
  • Save Manipur : Protest [Feb 15] #3 : Gallery
  • Naorem Roshibina- Wushu Medallist : Gallery
  • GHOST of PEACE :: Download Booklet
  • List of Kings of Manipur: 33 - 1984 AD