TODAY -

Cyber Law and Crime

Wangjam Devendra Singh *



How management view their organization security?
Attack at gunpoint, bombing, stealing of goods etc
How employees view their organization security?
Leakage of password to the colleagues, stealing of files, deleting of valuable document etc
How crackers view their organization security?
What if my software source code is stolen, what if my email id is flooded with spontaneous email. What if my organization's bank balance is manipulated? What if my organization's website is defamed with pornographic picture? What if my Integrated circuit design is copied? What if my server is attack by virus/worm/torjan. This is the case where we are going to discuss.

Cyber space is intangible in nature where the things are not all in physical in nature. Theft of traditional goods like gold, money, book, papers are covered by the traditional penal provisions laws. However theft of electronics record remains in the possession of the owner but the content gets stolen. Moreover Cyberspace has no boundary ; a complete disrespect of jurisdictional boundaries.

Hence we need a different law in this dimension. Here borns the cyber law.
Cyber law in India came into force on 17 october 2000 with the IT Act 2000.

Main purpose of the Cyber law 2000 was
1. Legal recognition of e-commerce
2. Electronics filling of records with the government
3. Penalty of cyber crime.
4. Digital signature certifying authority rules.

UNAUTHORIZED ACCESS : HACKING:-

Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network.
Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network.
Every act committed towards breaking into a computer and/or network is hacking. Generally hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money.

TROJAN, VIRUS AND WORM ATTACK :-

Trojan horses disguise themselves as valuable and useful software available for download on the internet. Most people are fooled by this ploy and end up downloading the virus disguised as some other application. The name comes from the mythical "Trojan Horse" that the Ancient Greeks set upon the city of Troy.

Trojans come in two parts, a Client part and a Server part. When the victim (unknowingly) runs the server on its machine, the attacker will then use the Client to connect to the Server and start using the trojan.

A program that has capability to infect other programs and spread with the human action, (such as running an infected program) to keep it spreading is called virus. A program that multiply itseft without intervention of human and eats up all the memory resource are called as worms.

E-MAIL RELATED CRIMES:- 1. Email spoofing
Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source.
2. Email Spamming
Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter.
3 Sending malicious codes through email
E-mails are used to send viruses,Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code.
4. Email bombing
E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address.
5. Sending threatening emails
6. Defamatory emails

DENIAL OF SERVICE (DOS) ATTACKS:- Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users.

Examples include
attempts to "flood" a network, thereby preventing legitimate network traffic
attempts to disrupt connections between two machines, thereby preventing access to a service
attempts to prevent a particular individual from accessing a service
attempts to disrupt service to a specific system or person.

Types of DOS
There are three basic types of attack:
a. Consumption of scarce, limited, or non-renewable resources like NW bandwith, RAM, CPU time. Even power, cool air, or water can affect.
b. Destruction or Alteration of Configuration Information
c. Physical Destruction or Alteration of Network Components

PORNOGRAPHY:-

The literal mining of the term 'Pornography' is "describing or showing sexual acts in order to cause sexual excitement through books, films, pictures etc." This would include pornographic websites; pornographic material produced using computers and use of internet to download and transmit pornographic videos, pictures, photos, writings etc.

Adult entertainment is largest industry on internet. There are more than 420 million individual pornographic webpages today.

Pedophiles:-
Also there are persons who intentionally prey upon children. Specially with a teen they will let the teen know that fully understand the feelings towards adult and in particular teen parents.
They earns teens trust and gradually seduce them into sexual or indecent acts.
Pedophiles lure the children by distributing pornographic material, then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions.

FORGERY:-

Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners. Also impersonate another person is considered forgery.

INTELLECTUAL PROPERTY RIGHT VIOLATIONS:-

These include software piracy, copyright infringement, trademarks violations, theft of computer source code, patent violations. Etc. Cyber Squatting- Domain names are also trademarks and protected by ICANN's domain dispute resolution policy and also under trademark laws. Cyber Squatters registers domain name identical to popular service provider's domain so as to attract their users and get benefit from it.

Cyber Terrorism:-

Targeted attacks on military installations, power plants, air traffic control, banks, trail traffic control, telecommunication networks are the most likely targets. Others like police, medical, fire and rescue systems etc. Cyberterrorism is an attractive option for modern terrorists for several reasons.

1. It is cheaper than traditional terrorist methods.
2. Cyberterrorism is more anonymous than traditional terrorist methods.
3. The variety and number of targets are enormous.
4. Cyberterrorism can be conducted remotely, a feature that is especially appealing to terrorists.
5. Cyberterrorism has the potential to affect directly a larger number of people.

BANKING/CREDIT CARD RELATED CRIMES:-

In the corporate world, Internet hackers are continually looking for opportunities to compromise a company's security in order to gain access to confidential banking and financial information.
Use of stolen card information or fake credit/debit cards are common.
Bank employee can grab money using programs to deduce small amount of money from all customer accounts and adding it to own account also called as salami.

E-COMMERCE/ INVESTMENT FRAUDS:- Sales and Investment frauds. An offering that uses false or fraudulent claims for investments or purchase but services that were purchased or contracted by individuals online are never delivered.
Investors are attracted to invest in this fraudulent scheme by the promises of abnormally high profits.

Sale of illegal articles:-
This would include trade of Drugs, narcotics, weapons and wildlife etc, by posting information on websites, auction websites, and bulletin boards or simply by using email communication.

ONLINE GAMBLING:-

There are millions of websites hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually run for money laundering ( to make black money white).

DEFAMATION: - Defamation can be understood as the intentional infringement of another person's right to his good name.
Cyber Defamation occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information to all of that person's friends.

CYBER STACKING:-

Cyber stalking involves following a persons movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. In general, the harasser intends to cause emotional distress and has no legitimate purpose to his communications.

DATA DIDDLING:-

Data diddling involves changing data prior or during input into a computer.
It also include changing the financial information for some time before processing and then restoring original information.

Since all sensitive information that is mostly stored on a computer that is connected to the Internet, there is a need for information assurance and security. So in order to have Cyber Security, everyone should follow the Cyber Security standards that enable us to protect various cyber threat




* Wangjam Devendra Singh contributes to e-pao.net for the first time. The writer works at Employees' Provident Fund Org, Ministry Of Labour Government of India as a System Sdministration. The writer can be reached at wangdev(at)gmail(dot)com
This article was webcasted on April 26th, 2009.


* Comments posted by users in this discussion thread and other parts of this site are opinions of the individuals posting them (whose user ID is displayed alongside) and not the views of e-pao.net. We strongly recommend that users exercise responsibility, sensitivity and caution over language while writing your opinions which will be seen and read by other users. Please read a complete Guideline on using comments on this website.




LATEST IN E-PAO.NET
  • Scientist of Manipur: Amom Ruhikanta
  • Violence in Manipur 2023-2024 : Timeline
  • Conspiracy, thy name is Kuki !
  • "ST status for Meetei" at Thounaojam
  • Ket Meth New Album "Ghost Stories"
  • World Hypertension Day
  • International Day of Families
  • Let the rule of law prevail
  • When donation becomes obligatory demand
  • Tourism of Manipur through Gastronomy
  • Beyond Eternity :: Poem
  • Patriarch subjugation on women
  • Celebrate Manipuri Cinema shine at Cannes
  • Training on cultivation of various mushroom
  • Transformative impact of Ayurveda & Yoga
  • War for over a year : Delhi is answerable
  • The logic behind illogical chargesheet
  • Preserving Thang-Ta :: Rare Photos
  • Regarding Human Rights Situation in Manipur
  • World Hypertension Day 2024
  • Article 355 of Constitution of India #3
  • Disinformation campaign touba thengnarey
  • Deeply mourn the demise of Oja Biren Lamba
  • Water Mimosa for sustainable development
  • Publicity drives of educational institutions
  • ED's revolutionary move!!!
  • Malemnganbi Laishram : Science Topper
  • Featured Front Page Photo 2024 #2: Gallery
  • Thokchom Sheityajit : Arts Topper
  • Aiena Naorem : Commerce Topper
  • AISSE 2024 Exam Result- RKM Imphal
  • Gold, new world currency !
  • Milk for hair and skin
  • Of illegal immigrants & the larger picture
  • The missive from Kamjong
  • Hr Secondary Exam 2024 : Science Topper
  • HSE 2024 : Subject Pass Percentage
  • HSE 2024 : District Pass Percentage
  • HSE 2024 : Candidates with Highest Marks
  • Hr Secondary Exam 2024: Science Full Result
  • Hr Secondary Exam 2024: Arts Full Result
  • Hr Secondary Exam 2024: Commerce Result
  • Hr Secondary Exam 2024 : Arts Topper
  • Hr Secondary Exam 2024 : Commerce Topper
  • Sezo Ringa- Debut Music Video "Revival"
  • Journalism - A thrilling career #2
  • After Class XII where? The eternal question
  • Entry of Arvind Kejriwal
  • Birth Centenary of Jananeta Irabat, 1996 : #1
  • Our nurses, our future: Power of care
  • Screenplay Writing course concluded
  • Workshop on IP & Patent Filing held
  • Let there be less Politics in Sports
  • Sam Pitroda is absolutely white
  • Motherhood: Soul & spirit of family & society
  • Time has come to criminalise ecocide
  • Meiteis, a disappearing community in Manipur
  • World Bamboo Congress @Taiwan : Gallery
  • Ima Manipur should smile more
  • 2nd National Lok Adalat at High Court
  • The Power of Poppy - 30 :: Poem
  • Army impact on Tamphasana Wushu odyssey
  • Aftermath of ferocious hailstorm #1 : Gallery
  • "Dynamic library service" :: Book Rvw
  • Radio E-pao: Manipuri Film OST (130+ song)
  • Artificial Intelligence & Environment
  • Article 355 of Constitution of India #2
  • Integrated Farming Systems for farmers #4
  • Delhi's stand after 1 year of clash
  • A new type of terrorism
  • Scientist of Manipur: Waikhom Vishwanath
  • SRF, JRF, RA @ Assam University
  • The Bleeding River :: Poem
  • Executive Meeting of WMC Assam Unit
  • Journalism - A thrilling career #1
  • Raising the call to replace Minister
  • A storm in a political teacup
  • Cheirao-chingkaba @ Chinga : Gallery
  • Happy Mother's Day
  • Empowering hill communities via U-Mangra
  • African Swine Fever
  • Free Training on Mushroom at Nagamapal
  • Harshit Dhingaun recieves award from Korea
  • Look for ways to restore normalcy
  • The danger of last kicks of a dying horse
  • Preserving Thang-Ta traditions
  • Resolving ST issue by democratic process
  • Top 5 songs to awaken your inner patriot
  • Project Assistant @ Manipur University
  • Leishemba Sanajaoba conferred Doctorate
  • Double tragedy: No time for red-tapism
  • A Youtuber called Dhruv
  • Nupi Landa Thaunaphabishing : Full Book
  • 174th Anniv Maharaj Narasingh #2 : Gallery
  • Challenges in Healthcare in rural Manipur
  • A salute to leadership quality of PM Modi
  • Career in press for freedom of expression
  • One day after devastating hailstorm
  • Understanding the suffering of others
  • A ferocious hailstorm @Imphal : Gallery
  • Article 355 of Constitution of India #1
  • Integrated Farming Systems for farmers #3
  • Election gossip & rumours
  • 'Melodic Minds' Tour in Guwahati
  • Leaving a trail of destruction
  • Political see-saw
  • A brand-new Scientific discovery
  • In memoriam of the happiness we shared !
  • Crop/animal for higher productivity in NE #5
  • "ST status for Meetei" at Sekmaijin
  • Oh Motherland :: Poem
  • Animal life should be treated with dignity
  • '365 Days of Chin-Kuki Aggression' : Gallery
  • Renaissance of politics in our youth
  • TB & tobacco co-epidemics in Indonesia
  • The Power of Poppy - 29 :: Poem
  • Advanced Charging Infrastructure in NE
  • Lessons learnt in the last one year
  • True colour of politics
  • World Heritage Day @ MU : Gallery
  • "ST status for Meetei" at Kakwa
  • Joint Combing Operations in Jiribam
  • Reboot PSUs for jobs: Task for new Govt
  • Ayurvedic remedies to keep healthy eyes
  • May 3, 2023 to May 3, 2024
  • One year of crisis, and what next ?
  • Scientist of Manipur: Nongmaithem Rajmuhon
  • Whither social justice & work for women?
  • Taiwan to enhancing economic ties with India
  • Integrated Farming Systems for farmers #2
  • Athoubasingi Numit #2 : Gallery
  • Privilege trap of While Male Meitei
  • Crop/animal for higher productivity in NE #4
  • 'Chizami Model' working in Gujarat ?
  • Racing towards the one year mark
  • On misattribution & falsifying history
  • Nupi Landa Thaunaphabishing #15 :: Book
  • May Calendar for Year 2024 : Tools
  • 12th World Bamboo Congress at Taiwan
  • Complex dance of democracy in Manipur
  • "ST status for Meetei" at Pangaltabi
  • Integrated Farming Systems for farmers #1
  • Showing ugly face of muscle power
  • Spare the rod, spoil the monster
  • Descent of Radha-Krishna #31: Download
  • Socio-Historical analysis on Ethnic Conflict
  • "ST status for Meetei" at Langmeidong
  • Ngangbam Dipapati- Gold @European Cup
  • Crop/animal for higher productivity in NE #3
  • Fresh surge in violence
  • The real culprit
  • National Science Teacher workshop
  • Livelihood Disaster in Mapithel Region
  • Condemns Killing of CRPF Personnel
  • "ST status for Meetei" at Manipur College
  • Huidrom Oliviya: Silver @Cadet European Cup
  • Election: Runner-up may spoil the joy
  • Scientists of Manipur : Laishram Ladu Singh
  • Imphal Ring Road Project to Transform
  • Crop/animal for higher productivity in NE #2
  • The Power of Poppy - 28 :: Poem
  • Condemned unabated illegal taxation
  • Watermelon : Super nutritious summer fruit
  • People have spoken, Manipur has voted
  • Skirting around core issues
  • Lok Sabha polls in Manipur #2 : Gallery
  • The Taj Mahal that bans Lovers !
  • Importance of bees !
  • Massive hailstorm in Jiribam
  • The messiah of hapless children
  • Attack on fuel tankers & blasting bridge
  • Blame it on Meetei
  • The Happiness Code : Download
  • NH-2 Bridge bombed @Sapermeina : Gallery
  • Crop/animal for higher productivity in NE #1
  • Training Programme under SPARK concluded
  • Why environment control is so difficult
  • 4th Foundation Day- Young Minds Collective
  • All set for second phase poll
  • The Nongsaba phenomenon
  • Khongjom Day @Khebaching #1 : Gallery
  • India's responsibility to end Manipur violence
  • Migrant worker could access TB services only
  • Importance of reading magazines as student
  • SHG pioneering agricultural innovation
  • Nearing the one year mark
  • The enemy within
  • Id-ul-Fitr @Hatta #2 : Gallery
  • Workshop @ NSU Manipur : Gallery
  • 15th Manipur State Film Awards 2023
  • "ST status for Meetei" at Panthoibi Shanglen
  • GSDP doubles, health shines
  • Vote has been cast, repoll held
  • Two faces of democracy
  • Laurels for Scientist Ngangkham Nimai
  • Crime against women in Manipur
  • "ST status for Meetei" at Sugnu
  • Creativity & innovation for vibrant career
  • 4th Foundation Day of YMC
  • Racing towards one year mark
  • Prophetic words, indeed
  • Nupi Landa Thaunaphabishing #14 :: Book
  • 174th Anniv Maharaj Narasingh #1 : Gallery
  • Ensuring Fair Voting in Hills of Manipur
  • Dr Irengbam Mohendra's latest book :: Rvw
  • NDA has the advantage in both
  • Lok Sabha polls in Manipur #1 : Gallery
  • L Rup's Robot 'Kangleinganbi' in Manipuri
  • Art- means of connecting hearts in Manipur
  • Is it Living Alive or Living Death ? :: Poem
  • Rabies - A preventable zoonotic disease
  • April 19, 2024: The blackest day of all
  • Ugly turns on voting day
  • Children Camp @JNMDA Imphal #2 : Gallery
  • The chasm between TB & HIV continues
  • Parliament and its Members
  • Kimchi for health and glowing skin
  • LS election with a difference
  • To vote, or not to vote ?
  • Sajibu Cheiraoba Chak Katpa #2 : Gallery
  • Scientists of Manipur : Laitonjam Warjeet
  • Community seed bank @Umathel : Gallery
  • Saving Manipur
  • Sajibu Cheiraoba: 1 occasion, 2 narratives #2
  • Athoubasingi Numit #1 : Gallery
  • Id-ul-Fitr @Hatta #1 : Gallery
  • 80th Anniv- Battle of Kanglatongbi @UK
  • Hun - Thadou Cultural Festival : Gallery
  • Scientists of Manipur : Ngangkham Nimai
  • Sajibu Cheiraoba Chak Katpa #1 : Gallery
  • Beating of the Retreat #1 : Gallery
  • Kenedy Khuman (Singer) : Gallery
  • Students @ Class X Exam : Gallery
  • Save Manipur : Protest [Feb 15] #3 : Gallery
  • GHOST of PEACE :: Download Booklet
  • List of Kings of Manipur: 33 - 1984 AD