TODAY -

Cyber Law and Crime

Wangjam Devendra Singh *



How management view their organization security?
Attack at gunpoint, bombing, stealing of goods etc
How employees view their organization security?
Leakage of password to the colleagues, stealing of files, deleting of valuable document etc
How crackers view their organization security?
What if my software source code is stolen, what if my email id is flooded with spontaneous email. What if my organization's bank balance is manipulated? What if my organization's website is defamed with pornographic picture? What if my Integrated circuit design is copied? What if my server is attack by virus/worm/torjan. This is the case where we are going to discuss.

Cyber space is intangible in nature where the things are not all in physical in nature. Theft of traditional goods like gold, money, book, papers are covered by the traditional penal provisions laws. However theft of electronics record remains in the possession of the owner but the content gets stolen. Moreover Cyberspace has no boundary ; a complete disrespect of jurisdictional boundaries.

Hence we need a different law in this dimension. Here borns the cyber law.
Cyber law in India came into force on 17 october 2000 with the IT Act 2000.

Main purpose of the Cyber law 2000 was
1. Legal recognition of e-commerce
2. Electronics filling of records with the government
3. Penalty of cyber crime.
4. Digital signature certifying authority rules.

UNAUTHORIZED ACCESS : HACKING:-

Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network.
Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network.
Every act committed towards breaking into a computer and/or network is hacking. Generally hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money.

TROJAN, VIRUS AND WORM ATTACK :-

Trojan horses disguise themselves as valuable and useful software available for download on the internet. Most people are fooled by this ploy and end up downloading the virus disguised as some other application. The name comes from the mythical "Trojan Horse" that the Ancient Greeks set upon the city of Troy.

Trojans come in two parts, a Client part and a Server part. When the victim (unknowingly) runs the server on its machine, the attacker will then use the Client to connect to the Server and start using the trojan.

A program that has capability to infect other programs and spread with the human action, (such as running an infected program) to keep it spreading is called virus. A program that multiply itseft without intervention of human and eats up all the memory resource are called as worms.

E-MAIL RELATED CRIMES:- 1. Email spoofing
Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source.
2. Email Spamming
Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter.
3 Sending malicious codes through email
E-mails are used to send viruses,Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code.
4. Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address.
5. Sending threatening emails
6. Defamatory emails

DENIAL OF SERVICE (DOS) ATTACKS:- Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users.

Examples include
attempts to "flood" a network, thereby preventing legitimate network traffic
attempts to disrupt connections between two machines, thereby preventing access to a service
attempts to prevent a particular individual from accessing a service
attempts to disrupt service to a specific system or person.

Types of DOS
There are three basic types of attack:
a. Consumption of scarce, limited, or non-renewable resources like NW bandwith, RAM, CPU time. Even power, cool air, or water can affect.
b. Destruction or Alteration of Configuration Information
c. Physical Destruction or Alteration of Network Components

PORNOGRAPHY:-

The literal mining of the term 'Pornography' is "describing or showing sexual acts in order to cause sexual excitement through books, films, pictures etc." This would include pornographic websites; pornographic material produced using computers and use of internet to download and transmit pornographic videos, pictures, photos, writings etc.

Adult entertainment is largest industry on internet. There are more than 420 million individual pornographic webpages today.

Pedophiles:-
Also there are persons who intentionally prey upon children. Specially with a teen they will let the teen know that fully understand the feelings towards adult and in particular teen parents.
They earns teens trust and gradually seduce them into sexual or indecent acts.
Pedophiles lure the children by distributing pornographic material, then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions.

FORGERY:-

Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners. Also impersonate another person is considered forgery.

INTELLECTUAL PROPERTY RIGHT VIOLATIONS:-

These include software piracy, copyright infringement, trademarks violations, theft of computer source code, patent violations. Etc. Cyber Squatting- Domain names are also trademarks and protected by ICANN's domain dispute resolution policy and also under trademark laws. Cyber Squatters registers domain name identical to popular service provider's domain so as to attract their users and get benefit from it.

Cyber Terrorism:-

Targeted attacks on military installations, power plants, air traffic control, banks, trail traffic control, telecommunication networks are the most likely targets. Others like police, medical, fire and rescue systems etc. Cyberterrorism is an attractive option for modern terrorists for several reasons.

1. It is cheaper than traditional terrorist methods.
2. Cyberterrorism is more anonymous than traditional terrorist methods.
3. The variety and number of targets are enormous.
4. Cyberterrorism can be conducted remotely, a feature that is especially appealing to terrorists.
5. Cyberterrorism has the potential to affect directly a larger number of people.

BANKING/CREDIT CARD RELATED CRIMES:-

In the corporate world, Internet hackers are continually looking for opportunities to compromise a company's security in order to gain access to confidential banking and financial information.
Use of stolen card information or fake credit/debit cards are common.
Bank employee can grab money using programs to deduce small amount of money from all customer accounts and adding it to own account also called as salami.

E-COMMERCE/ INVESTMENT FRAUDS:- Sales and Investment frauds. An offering that uses false or fraudulent claims for investments or purchase but services that were purchased or contracted by individuals online are never delivered.
Investors are attracted to invest in this fraudulent scheme by the promises of abnormally high profits.

Sale of illegal articles:-
This would include trade of Drugs, narcotics, weapons and wildlife etc, by posting information on websites, auction websites, and bulletin boards or simply by using email communication.

ONLINE GAMBLING:-

There are millions of websites hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually run for money laundering ( to make black money white).

DEFAMATION: - Defamation can be understood as the intentional infringement of another person's right to his good name.
Cyber Defamation occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information to all of that person's friends.

CYBER STACKING:-

Cyber stalking involves following a persons movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. In general, the harasser intends to cause emotional distress and has no legitimate purpose to his communications.

DATA DIDDLING:-

Data diddling involves changing data prior or during input into a computer.
It also include changing the financial information for some time before processing and then restoring original information.

Since all sensitive information that is mostly stored on a computer that is connected to the Internet, there is a need for information assurance and security. So in order to have Cyber Security, everyone should follow the Cyber Security standards that enable us to protect various cyber threat




* Wangjam Devendra Singh contributes to e-pao.net for the first time. The writer works at Employees' Provident Fund Org, Ministry Of Labour Government of India as a System Sdministration. The writer can be reached at wangdev(at)gmail(dot)com
This article was webcasted on April 26th, 2009.


* Comments posted by users in this discussion thread and other parts of this site are opinions of the individuals posting them (whose user ID is displayed alongside) and not the views of e-pao.net. We strongly recommend that users exercise responsibility, sensitivity and caution over language while writing your opinions which will be seen and read by other users. Please read a complete Guideline on using comments on this website.




LATEST IN E-PAO.NET
  • Khongjom Day @Khebaching #1 : Gallery
  • Violence in Manipur 2023-2024 : Timeline
  • India's responsibility to end Manipur violence
  • Migrant worker could access TB services only
  • Importance of reading magazines as student
  • SHG pioneering agricultural innovation
  • Nearing the one year mark
  • The enemy within
  • Id-ul-Fitr @Hatta #2 : Gallery
  • Workshop @ NSU Manipur : Gallery
  • 15th Manipur State Film Awards 2023
  • "ST status for Meetei" at Panthoibi Shanglen
  • GSDP doubles, health shines
  • Vote has been cast, repoll held
  • Two faces of democracy
  • Laurels for Scientist Ngangkham Nimai
  • Crime against women in Manipur
  • "ST status for Meetei" at Sugnu
  • Creativity & innovation for vibrant career
  • 4th Foundation Day of YMC
  • Racing towards one year mark
  • Prophetic words, indeed
  • Nupi Landa Thaunaphabishing #14 :: Book
  • 174th Anniv Maharaj Narasingh #1 : Gallery
  • Ensuring Fair Voting in Hills of Manipur
  • Dr Irengbam Mohendra's latest book :: Rvw
  • NDA has the advantage in both
  • Lok Sabha polls in Manipur #1 : Gallery
  • L Rup's Robot 'Kangleinganbi' in Manipuri
  • Art- means of connecting hearts in Manipur
  • Is it Living Alive or Living Death ? :: Poem
  • Rabies - A preventable zoonotic disease
  • April 19, 2024: The blackest day of all
  • Ugly turns on voting day
  • Children Camp @JNMDA Imphal #2 : Gallery
  • The chasm between TB & HIV continues
  • Parliament and its Members
  • Kimchi for health and glowing skin
  • LS election with a difference
  • To vote, or not to vote ?
  • Sajibu Cheiraoba Chak Katpa #2 : Gallery
  • "ST status for Meetei" at Lamjao, Kakching
  • The Power of Poppy - 27 :: Poem
  • Mother Language based education essential
  • Modi's warriors wear regional hats
  • Nest Asia promoting Northeastern Cuisine
  • Now look beyond LS poll
  • The rot in the system
  • Scientists of Manipur : Laitonjam Warjeet
  • Community seed bank @Umathel : Gallery
  • 10 candidates cracked Civil Services Exam
  • Milk of Paradise: History of Opium : Rvw
  • How plastics find their way into our bodies
  • Condemning attack on Trucks along NH-37
  • Cong looking to buck the trend
  • Saving Manipur
  • Sajibu Cheiraoba: 1 occasion, 2 narratives #2
  • Election Duty :: Travellog
  • 1st Nagas' Meet in Punjab
  • How to select right MP to represent Manipur
  • "ST status for Meetei" at Tejpur
  • Bats are Keystone species for the Planet
  • The '15 days' conundrum
  • Free but not so fair
  • Descent of Radha-Krishna #30: Download
  • Before You Vote : My Rumbling Thoughts
  • "ST status for Meetei" at Kakching
  • Meiraba wins All India Sr tournament
  • Finding light in dark through my daughter
  • Navigating life's unreasonable expectations
  • Test of people's character
  • BJP's election manifesto
  • Athoubasingi Numit #1 : Gallery
  • Black rice & Glycemic Index
  • What Nadda should speak at Dimapur rally
  • Open Letter to CM Office Manipur
  • Meghalaya unveils Strawberry festival
  • Benefits of maths newspapers for students
  • Id-ul-Fitr @Hatta #1 : Gallery
  • Are you a good person ?
  • Physics Academy of NE : Executive Body
  • "ST status for Meetei" at Moirang
  • Cherrapunji Eastern Craft Gin launched
  • Cong on cautious path
  • Botox for Hair
  • Posers voters should raise now
  • The lull before the storm
  • 80th Anniv- Battle of Kanglatongbi @UK
  • Vir Chakra Ngangom Joydutta's bust unveiled
  • Hun - Thadou Cultural Festival : Gallery
  • "ST status for Meetei" at Singjamei
  • Election Eclipses: Ballad of Battle & Loss
  • Our voices are equal at the ballot box
  • Scientists of Manipur : Ngangkham Nimai
  • Urgent Call for Solidarity in Manipur
  • Meitei Nongsha #2 :: An Artwork
  • "ST status for Meetei" at Waikhong
  • About NPF-BJP-NPP alliance & why ?
  • World Veterinary Day, 2024
  • The heavy stake behind the LS polls
  • The politics of lying & deception
  • Sajibu Cheiraoba Chak Katpa #1 : Gallery
  • Hun-Thadou Cultural Fest @ Delhi: Report
  • Appeal to Parties & Candidates
  • "ST status for Meetei" at Wangoo
  • Establishment of community seed bank
  • Awareness Programme on new Criminal Laws
  • Make a right choice at the Lok Sabha election
  • Sajibu Cheiraoba: 1 occasion, 2 narratives #1
  • RIST talk-58 : Support systems of elderly
  • "ST status for Meetei" at Hiyanglam
  • Vote, do not boycott !
  • Lok Sabha election: A new dawn in politics ?
  • IIT-Guwahati Half Marathon report
  • Taking ST demand to the election ring
  • Lesson to be learnt from across border
  • Mirabai: Poised for Paris Olympics
  • Legal position for protection of environment
  • "ST status for Meetei" at Keisamthong
  • Heterocyclic compound & biochemical science
  • Inner, torn between two lovers
  • Certification Music Therapy Workshop
  • NOTA as a choice
  • Caesar's wife must be above suspicion
  • Descent of Radha-Krishna #29: Download
  • World Health Day 2024
  • "ST status for Meetei" at Pangantabi
  • The Power of Poppy - 26 :: Poem
  • Fulbright Fellowship Outreach at Arunachal
  • Id-ul Fitr da namaz nattana..
  • Nupi Landa Thaunaphabishing #13 :: Book
  • Lok Sabha election is coming, be prepared
  • 6th Hun-Thadou Cultural Festival
  • Let There Be Free & Fair Election
  • "ST status for Meetei" at Lamlong
  • Science magazines are important for student
  • Interesting choice of candidates
  • The power of We, the voters
  • Inspirations from Scientists of Manipur #1
  • The Case for Amendment of Article 371-C
  • Meitei Nongsha #1 :: Artwork
  • Link between forest & conflict in Manipur
  • Final Call for Application MFA - Phase-2
  • ST for Meiteis call before elections
  • Passing the buck
  • Beating of the Retreat #1 : Gallery
  • Life of our Lives in Ethnic Strife Era! :: Poem
  • IIT-Guwahati annual Half Marathon
  • Follow up: European Parliament on Manipur
  • Yoga & Kegel exercise: Pelvic floor workout
  • Opting for the NOTA button
  • Yearning of the displaced people
  • Kenedy Khuman (Singer) : Gallery
  • 5th NE Women's Peace Congregation
  • World Autism Awareness Day 2024
  • Election fever grips Manipur despite unrest
  • Looking for a decent election hustings
  • Clock ticking towards voting day
  • An exemplary directive
  • Children Camp @JNMDA Imphal #1 : Gallery
  • Memo to Election Commission of India
  • Easter & Holi echo in Nilgiris
  • Holiday Camp for children at JNMDA, Imphal
  • Zero waste is our moral responsibility
  • Elections & loyalty vis-a-vis Manipur crisis
  • Show of strength without unity
  • Yaoshang Pichakari #2 : Gallery
  • Panthoi Chanu : 1st to play in Australia
  • Intensive labs in film preservation
  • Building bridges with books
  • Need of the hour: Political maturity
  • Accepting defeat before the election
  • Descent of Radha-Krishna #28: Download
  • April Calendar for Year 2024 : Tools
  • Natural packaging from bamboo : Gallery
  • The Power of Poppy - 25 :: Poem
  • Everyone has their own Bharat Ratna
  • Nupi Landa Thaunaphabishing #12 :: Book
  • Demand- Manipuri as classical language
  • The Drummer from Odisha
  • Beauty benefits of lemon
  • Yaoshang Mei Thaba #2 : Gallery
  • Manipur's original Ponies : Gallery
  • Yaoshang & Dance of Democracy loom
  • Symposium on Jagadguru Shankaracharya
  • Choosing ITI as a campus after X
  • Yaoshang Pichakari #1 : Gallery
  • Yaoshang @Nabadwip Dham : Gallery
  • How oral health affects your pregnancy
  • Two faces of Holi
  • Prawaas 4.0, Multimodal Transport Show
  • A decade of development of higher education
  • Yaoshang Mei Thaba #1 : Gallery
  • Our Eternal Kangleipak :: Poem
  • Micro-livestock for livelihoods: For NE States
  • The fun of Holi used to be monotonous
  • 2nd Annual Art Exhibition #1 : Gallery
  • About the "Meitei" community from Manipur
  • Unveiling the medicinal benefits of honey
  • The incalculable value of wildlife
  • Promises of true love
  • Trends, Alliances, & Challenges in Elections
  • Meitei Goddess Ngaleima : An Artwork
  • Water is the most precious gift of God
  • Bharat needs a strong 'India'
  • Transformation of railway stations
  • Not quite the final countdown
  • Missing of 'The Saffron' from electoral colour
  • Descent of Radha-Krishna #27: Download
  • 3rd North East Games: Manipur champion
  • The Power of Poppy - 24 :: Poem
  • EBTC & JCRE signed MoU
  • Early Detection Program at Toubul
  • How Holi affects our mood & mental health
  • Lamta Thangja @ Imphal : Gallery
  • Manipur cinema legacy shines at ARCUREA
  • The pulse of politics amidst conflict
  • Forest is most important vital organ of Earth
  • Tips to play safe Holi
  • Politics of naming candidates
  • Disappearing of spring from season cycle
  • Meira Paibis of Manipur
  • Demand for ST status by Meiteis
  • Project Personal Opening @Assam University
  • World Poetry Day at Manipur University
  • Green skills for sustainable world
  • Supportive interventions during exam time
  • Interesting run up to LS polls
  • Onus definitely on PM to restore peace
  • Nupi Landa Thaunaphabishing #11 :: Book
  • Water, water everywhere ...
  • 21st March - A special day for Forest
  • RI imprisonment to Rapists at Silchar
  • Arrests threaten fragile ceasefire
  • The Valor Within :: Poem
  • Monitoring the rehab centres
  • True colour of politicians
  • North East Film Festival #2 : Gallery
  • Linthoingambi- 'Jury Honourable Mention'
  • Meitei Goddess Phouoibi : An Artwork #3
  • Formation of Wesean Student Federation
  • 20th March- International Day of Happiness
  • A call to first time voter youths
  • Playing the card close to its chest
  • Targeting FOCS and ITLF
  • Students @ Class X Exam : Gallery
  • Saroi Khangba @ Kangla : Gallery
  • Special scholarship scheme for girls
  • Imphal Book Fair 2023 #3 : Gallery
  • Protest for scrapping SoO #2 :Gallery
  • Maharaj Narasingh Statue @Kangla :Gallery
  • Shopping List for Shivaratri : Gallery
  • N Tombi Equestrian C'ships #1 : Gallery
  • Featured Front Page Photo 2024 #1: Gallery
  • Radio E-pao: Manipuri Film OST (130+ song)
  • Save Manipur : Protest [Feb 15] #3 : Gallery
  • Naorem Roshibina- Wushu Medallist : Gallery
  • GHOST of PEACE :: Download Booklet
  • List of Kings of Manipur: 33 - 1984 AD