TODAY -

Cyber Law and Crime

Wangjam Devendra Singh *



How management view their organization security?
Attack at gunpoint, bombing, stealing of goods etc
How employees view their organization security?
Leakage of password to the colleagues, stealing of files, deleting of valuable document etc
How crackers view their organization security?
What if my software source code is stolen, what if my email id is flooded with spontaneous email. What if my organization's bank balance is manipulated? What if my organization's website is defamed with pornographic picture? What if my Integrated circuit design is copied? What if my server is attack by virus/worm/torjan. This is the case where we are going to discuss.

Cyber space is intangible in nature where the things are not all in physical in nature. Theft of traditional goods like gold, money, book, papers are covered by the traditional penal provisions laws. However theft of electronics record remains in the possession of the owner but the content gets stolen. Moreover Cyberspace has no boundary ; a complete disrespect of jurisdictional boundaries.

Hence we need a different law in this dimension. Here borns the cyber law.
Cyber law in India came into force on 17 october 2000 with the IT Act 2000.

Main purpose of the Cyber law 2000 was
1. Legal recognition of e-commerce
2. Electronics filling of records with the government
3. Penalty of cyber crime.
4. Digital signature certifying authority rules.

UNAUTHORIZED ACCESS : HACKING:-

Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network.
Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network.
Every act committed towards breaking into a computer and/or network is hacking. Generally hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money.

TROJAN, VIRUS AND WORM ATTACK :-

Trojan horses disguise themselves as valuable and useful software available for download on the internet. Most people are fooled by this ploy and end up downloading the virus disguised as some other application. The name comes from the mythical "Trojan Horse" that the Ancient Greeks set upon the city of Troy.

Trojans come in two parts, a Client part and a Server part. When the victim (unknowingly) runs the server on its machine, the attacker will then use the Client to connect to the Server and start using the trojan.

A program that has capability to infect other programs and spread with the human action, (such as running an infected program) to keep it spreading is called virus. A program that multiply itseft without intervention of human and eats up all the memory resource are called as worms.

E-MAIL RELATED CRIMES:- 1. Email spoofing
Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source.
2. Email Spamming
Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter.
3 Sending malicious codes through email
E-mails are used to send viruses,Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code.
4. Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address.
5. Sending threatening emails
6. Defamatory emails

DENIAL OF SERVICE (DOS) ATTACKS:- Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users.

Examples include
attempts to "flood" a network, thereby preventing legitimate network traffic
attempts to disrupt connections between two machines, thereby preventing access to a service
attempts to prevent a particular individual from accessing a service
attempts to disrupt service to a specific system or person.

Types of DOS
There are three basic types of attack:
a. Consumption of scarce, limited, or non-renewable resources like NW bandwith, RAM, CPU time. Even power, cool air, or water can affect.
b. Destruction or Alteration of Configuration Information
c. Physical Destruction or Alteration of Network Components

PORNOGRAPHY:-

The literal mining of the term 'Pornography' is "describing or showing sexual acts in order to cause sexual excitement through books, films, pictures etc." This would include pornographic websites; pornographic material produced using computers and use of internet to download and transmit pornographic videos, pictures, photos, writings etc.

Adult entertainment is largest industry on internet. There are more than 420 million individual pornographic webpages today.

Pedophiles:-
Also there are persons who intentionally prey upon children. Specially with a teen they will let the teen know that fully understand the feelings towards adult and in particular teen parents.
They earns teens trust and gradually seduce them into sexual or indecent acts.
Pedophiles lure the children by distributing pornographic material, then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions.

FORGERY:-

Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners. Also impersonate another person is considered forgery.

INTELLECTUAL PROPERTY RIGHT VIOLATIONS:-

These include software piracy, copyright infringement, trademarks violations, theft of computer source code, patent violations. Etc. Cyber Squatting- Domain names are also trademarks and protected by ICANN's domain dispute resolution policy and also under trademark laws. Cyber Squatters registers domain name identical to popular service provider's domain so as to attract their users and get benefit from it.

Cyber Terrorism:-

Targeted attacks on military installations, power plants, air traffic control, banks, trail traffic control, telecommunication networks are the most likely targets. Others like police, medical, fire and rescue systems etc. Cyberterrorism is an attractive option for modern terrorists for several reasons.

1. It is cheaper than traditional terrorist methods.
2. Cyberterrorism is more anonymous than traditional terrorist methods.
3. The variety and number of targets are enormous.
4. Cyberterrorism can be conducted remotely, a feature that is especially appealing to terrorists.
5. Cyberterrorism has the potential to affect directly a larger number of people.

BANKING/CREDIT CARD RELATED CRIMES:-

In the corporate world, Internet hackers are continually looking for opportunities to compromise a company's security in order to gain access to confidential banking and financial information.
Use of stolen card information or fake credit/debit cards are common.
Bank employee can grab money using programs to deduce small amount of money from all customer accounts and adding it to own account also called as salami.

E-COMMERCE/ INVESTMENT FRAUDS:- Sales and Investment frauds. An offering that uses false or fraudulent claims for investments or purchase but services that were purchased or contracted by individuals online are never delivered.
Investors are attracted to invest in this fraudulent scheme by the promises of abnormally high profits.

Sale of illegal articles:-
This would include trade of Drugs, narcotics, weapons and wildlife etc, by posting information on websites, auction websites, and bulletin boards or simply by using email communication.

ONLINE GAMBLING:-

There are millions of websites hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually run for money laundering ( to make black money white).

DEFAMATION: - Defamation can be understood as the intentional infringement of another person's right to his good name.
Cyber Defamation occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information to all of that person's friends.

CYBER STACKING:-

Cyber stalking involves following a persons movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. In general, the harasser intends to cause emotional distress and has no legitimate purpose to his communications.

DATA DIDDLING:-

Data diddling involves changing data prior or during input into a computer.
It also include changing the financial information for some time before processing and then restoring original information.

Since all sensitive information that is mostly stored on a computer that is connected to the Internet, there is a need for information assurance and security. So in order to have Cyber Security, everyone should follow the Cyber Security standards that enable us to protect various cyber threat




* Wangjam Devendra Singh contributes to e-pao.net for the first time. The writer works at Employees' Provident Fund Org, Ministry Of Labour Government of India as a System Sdministration. The writer can be reached at wangdev(at)gmail(dot)com
This article was webcasted on April 26th, 2009.


* Comments posted by users in this discussion thread and other parts of this site are opinions of the individuals posting them (whose user ID is displayed alongside) and not the views of e-pao.net. We strongly recommend that users exercise responsibility, sensitivity and caution over language while writing your opinions which will be seen and read by other users. Please read a complete Guideline on using comments on this website.




LATEST IN E-PAO.NET
  • Protests - AT arrest [Jun 8 night] : Gallery
  • Violence in Manipur 2023-2025 : Timeline
  • Review of 'Rain Stopping in Manipur'
  • Highway blockades trigger soaring prices
  • Voice of the Masses :: Poem
  • Congress may claim if none
  • Learning new skills related to AI
  • Delhi, Raj Bhavan: Losing the plot ?
  • CBI arrest after Governor clemency assurance
  • Aftermath of flooding @ Khurai #1 : Gallery
  • Amuthoiba, Gaisimpu, Horyaola : eMing
  • Appeals Home Minister not to renew SoO
  • Self-defence :: Poem
  • When will humans learn nature's lessons ?
  • Forgotten voices of drug users in Manipur
  • High-yielding RC Manichakhao-1
  • PC Editorial Blank Space : June 09 2025
  • TSE Editorial Blank Space : June 09 2025
  • Flooding at JNIMS Hospital #2 : Gallery
  • North East NSS Festival @ MU : Gallery
  • Namphakey - A Thai Tradition in Assam
  • Understanding Manipur's recurring floods
  • Constitutional role, professional functions
  • Moscow Wushu C'ship: Manipur - 16 medals
  • The Power of Poppy - 84 :: Poem
  • 27th Meira Paibi Numit : Gallery
  • Micromanager vs Leader
  • Valedictory Function of NE NSS Festival
  • WED at various campuses in Manipur
  • World Environment Day 2025
  • Trump's tariff legacy & its global echo
  • Skin Cycling
  • MU: On reaching a milestone
  • WED observance amid flood crisis
  • Flooding at JNIMS Hospital #1 : Gallery
  • Environment Day @Chingmeirong : Gallery
  • Manipur's unyielding struggle for identity
  • Manipur youth lead the way in organic farming
  • Moscow Wushu : Manipur 2 gold & 16 medals
  • World Environment Day at MTI-HUB
  • World Environment Day at Ukhrul
  • Local actions for a global plastic-free future
  • Raj Bhavan since Feb 13, 2025
  • Time to focus on post-flood activities
  • Colonial Knowledge in NE India #3
  • Manipur is more than a name
  • Manipur Hill Areas Act, 1967 : Download
  • Cervical cancer remains 4th biggest cancer
  • Frontline Lessons of entrepreneurial burnout
  • Till death do us apart :: Poem
  • Pelvic Inflammatory Disease: Hidden enemy
  • The rain from May 28 to Jun 3
  • Resettlement assurance by ministry officials
  • Flooding Imphal East [31 May] #3 : Gallery
  • Strategic erosion of State authority in Manipur
  • Application : Film Appreciation Course
  • H Ranita leads revolution through SMILE
  • Water logging and floods of MLAs
  • NE In-Charge: Shri Sharda Sarvagya Peeth
  • Stand against border fencing
  • Lessons to learn from consecutive flood
  • Flooding Imphal East [31 May] #2 : Gallery
  • Call for permanent solution to recurring Flood
  • Manipur : Champions 25th Natl Wushu C'ship
  • North East NSS Festival 2025 at MU
  • Healing with Art for children at Relief Camps
  • Restricted movement on NH-02 stalls growth
  • The cadence of life :: Poem
  • The other side of the tragedy
  • Fund misuse slur as Imphal faces flood
  • Flooding Imphal East [31 May] #1 : Gallery
  • Precedent Rodent: The new architect of flood
  • Declare flood in Manipur as "State Calamity"
  • Commitment to end tobacco must translate...
  • The World Goes On :: Poem
  • Tracing the arc of tool making
  • Of rain & more rain & flood
  • NE no more immune to natural disasters
  • Sarangthem Nirupama at Miss Universe India
  • S Nirupama @Miss Universe : Gallery
  • Leimapokpam Ranjita: Nightingale Award
  • Dina Oinam transforming "Waste to Wealth"
  • The Power of Poppy - 83 :: Poem
  • Stop Targeting Against Meetei IDPs
  • Urges Action on Flood Negligence
  • Manipur Hill Areas Act, 1967 #4
  • Helpless Meiteis in their own land, Manipur
  • 9 Signs of a Person Who Truly Leads
  • Open Letter to Prime Minister
  • My life journey: Texas - Lone Star State
  • Summer hair masks
  • 'Free movement will take time'
  • Food grain sufficiency amid flood threat
  • Colonial Knowledge in NE India #2
  • June Calendar for Year 2025 : Tools
  • Women entrepreneurs on biodiversity
  • Management: Etymology- academic discipline
  • Quiet Things :: Poem
  • Condemns attack on NE Shopowner in Delhi
  • Shifting goalpost : Emerging political experts
  • Peaceful protest, so far
  • 2nd Emoinu Fish Festival #2 : Gallery
  • INNOTECH Fest 2025 for Manipur Startup
  • Condolence of Prof J V Narlikar at MU
  • Toxic politics of selling addiction to children
  • Citizens pay, officials delay
  • Tripura Esports Championship Season 1
  • Back from Delhi on 'positive' notes
  • Rooting for withdrawal of PR post Gwaltabi
  • Protesters to Raj Bhavan [May 25]: Gallery
  • The silent guardian of Manipur's environment
  • Strengthening Emergency Medicine in Manipur
  • Manipur's fragile truce between identity
  • Manipur Budget 2025-26: Unequal sharing #2
  • NE youths jobseeker in Delhi : Hospitality
  • My mother, Miss World :: Poem
  • A popular Govt: A better option ?
  • Governor skirts protesters, heightens tension
  • Human Chain @Airport road [May 26]: Gallery
  • Sanatan Sammelan in Manipur
  • 'Great Myna' conservation reaping success
  • WMC Manipur Unit AGM held
  • Wabi Sabi: A unique Japanese philosophy
  • Rescind Siang Dam, Arunachal
  • Another round of talk at Delhi
  • COCOMI-MHA meeting amid Gwaltabi
  • Manipur Hill Areas Act, 1967 #3
  • MoU signed between MDB & GPR Law
  • Guide for Job Seekers & Emerging Leaders
  • NERIST & NIELIT Itanagar Sign MoU
  • The Last Step: Celebrating Manipuri Dance
  • Faint Cries :: Poem
  • Reservation: Privilege or Real Justice ?
  • The virus is still very much alive
  • Bitter, sweet moments of Shirui Lily fest
  • Miss Shirui Pageant Contestant: Gallery
  • Meetei Mayek Summer Camp in Kolkata
  • Where hills hum hope, but ground trembles
  • Manipur railway driving growth & connectivity
  • Point-of-care health technologies
  • The Power of Poppy - 82 :: Poem
  • Colonial Knowledge in NE India #1
  • Manipur Budget 2025-26: Unequal sharing #1
  • Edible insects in biodiversity conservation
  • Mukesh Ambani at NE Investors Summit
  • Bees inspired by nature to nourish us all
  • Influencers! Responsibility should also go viral
  • Natural sunscreen: Exploring safe alternatives
  • Central forces dictating terms in the plains
  • Land of Shirui Lily: Manipur is this & more
  • 48 hrs Bandh: protest security forces: Gallery
  • Manipur is no empty word to be played with
  • Admission for B.Tech, M.Tech at DUIET
  • Condemnation: Govt & Mahar Regiment
  • Dress code, debating etiquette in democracy
  • Cervical cancer prevention through HPV
  • Beauty :: Poem
  • Utter disregard of public sentiment
  • Whispers between Beads & Silences #2
  • Bonds of love across the Burmese border
  • Investigate the action of Mahar Regiment
  • Shirui Lily Festival fosters brotherhood
  • Shining a light on retinoblastoma
  • Trump for Nobel peace prize
  • Protest Rally: Journalist harassment: Gallery
  • Action against harassment to journalists
  • Still, believe :: Poem
  • Change How You Think About Time
  • Nagas preserve heritage through handloom
  • India's declared undeclared war
  • Sanatan Sammelan 2025 at Imphal
  • No 'Manipur' in Manipur order
  • Improvised security steps for Shirui Lily fest !
  • Purul (Hiimai) Paoki Fest #3 : Gallery
  • Youth Empowerment at Shirui Lily Festival
  • Indo-Naga Talks (From 2012) :: Timeline
  • Justice Bhushan Ramkrishna Gavai
  • Audit for TB deaths is missing in #EndTB
  • Realm of Power :: Poem
  • Hospitals: Learn a bit about hospitality
  • Keeping the ST for Meiteis demand alive
  • Raking up ST issue as tension grips state
  • Manipur Hill Areas Act, 1967 #2
  • Welcome & Appeal from Shirui Village
  • Thoudam Akashini: Champion master athlete
  • National Endangered Species Day 2025
  • Avert Ego, Soul Near Me :: Poem
  • Clarification regarding News Coverage on AIR
  • Coming back after 4 years: Shirui Lily Fest
  • Festival to test efficiency of SFs
  • 76th Indian Republic Day #5 : Gallery
  • Khuraijam Phulendra Singh
  • Media role in preserving culture & harmony
  • World Hypertension Day 2025
  • Army Veterans pay tribute to Martyr Constable
  • The Power of Poppy - 81 :: Poem
  • Yaoshang Cooking competition : Gallery
  • Rejoice Singh: Makeup / Prosthetic: Gallery
  • Project Associate @ Assam University
  • Internship @ IEEE CIS Kolkata Chapter
  • Article 371C : Role of Governor & HAC #2
  • Recognize real ability, not marks
  • The rise of information warfare
  • Skin care routine for summer
  • Over three months of President's Rule
  • Toiling to reinstate Govt sans consensus
  • Whispers between Beads & Silences #1
  • Just to See :: Poem
  • Artisan blends craft to empower women
  • Chief Justice at Moirang Relief Camp
  • Lalruattluanga win at TrendVision Finale
  • Manipur mourn Deepak Chingakham
  • Strategic shift to underdeveloped regions
  • Candid NSCN (IM) make stand clear
  • Tourism festival under threat
  • 'Yelhou Yangkok Artist' Exhibit #3 : Gallery
  • Cultural @ Tri-Nation Football #2 : Gallery
  • HSLC 2025: Full Result (Check Roll No)
  • HSLC 2025: Important Info & Grading System
  • HSLC 2025 : Compartmental candidates
  • HSLC 2025 : Comparative Statement
  • HSLC 2025 : Statistical Abstract
  • HSLC 2025 : District Pass Percentage
  • HSLC 2025 : Govt School Pass %
  • HSLC 2025 : Aided School Pass %
  • HSLC 2025 : Private School Pass %
  • 21st Ningtham Kumhei #2 : Gallery
  • People's Convention on 3rd May #2 : Gallery
  • Interview with Rejoice Singh- Makeup Artist
  • Featured Front Page Photo 2025 #2: Gallery
  • Nongkhrang Ehanba @ Lilong : Gallery
  • People's Convention on 3rd May #1 : Gallery
  • Radio E-pao: New Channel - Khunung Eshei
  • Khongjom Day - April 23 #2 : Gallery
  • The Waterbirds of Loktak Lake
  • Imoinu Erat Thouni @Kangla : Gallery
  • Statues of 7 Maichous @Kyamgei : Gallery
  • Riya Khwairakpam : HSE Science Topper
  • Keisham Hannah : HSE Arts Topper
  • Warepam Lidia : HSE Commerce Topper
  • HSE 2025 Result : Science Full Result
  • HSE 2025 Result : Arts Full Result
  • HSE 2025 Result : Commerce Full Result
  • HSE 2025 Information / Abbreviation
  • HSE 2025 Topper : Science
  • HSE 2025 Topper : Arts
  • HSE 2025 Topper : Commerce
  • HSE 2025 : Pass Percentage
  • HSE 2025 : Result Abstract
  • HSE 2025 : Candidates with Highest Marks
  • Khongjom Day - April 23 #1 : Gallery
  • Cheiraoba by Manipuri in Korea : Gallery
  • Ougri Lirol :: Part 1 : Ooba Video
  • President's Rule in Manipur : 1967 - 2025
  • Downloadable Manipuri Calendar :: 2025