Cyber Security Unit 3
Cyber Security Unit 3
Topics: Cyber Crime and Criminal justice: Concept of Cyber Crime and the IT Act, 2000, Hacking, Teenage
Web Vandals, Cyber Fraud and Cheating, Defamation, Harassment and E-mail Abuse, Other IT Act
Offences, Monetary Penalties, jurisdiction and Cyber Crimes, Nature of Criminality, Strategies to tackle
Cyber Crime and Trends.
Cyber-crime
Cyber-crime is a crime which is conducted by the use of computer, electronic devices, and network
(Internet) to offences against individual or group of individuals. A person, who is involved in such type of
crime, called as cyber-criminal. The motive of cyber-criminal may be:
1. To intentionally harm the reputation of the victim
2. Cause physical or mental harm
3. Loss, to the victim directly or indirectly, using Internet and mobile phones (Bluetooth/SMS/MMS)
4. Threaten a person
5. Nation's security
6. Financial health
7. Creating and distributing viruses
In the digital age, new technologies and methods of interaction with other humans and devices came into
play. A cyber-crime investigator is primarily concerned with gathering evidence from digital systems that
can be used in the prosecution of internet-based, or cyberspace, criminal activity. All cyber-crime includes
the uses of the World Wide Web. A cyber-crime investigator can use the crucial evidences to solve cyber-
crimes.
Cyber law is the part of the overall legal system that deals with the internet, cyber-space, and their
respective legal issues. Cyber law covers a fairly broad area covering several subtopics including freedom
of expression, access to and usage of the internet, and online privacy. Cyber law is referred to as the Law
of the Internet.
In 1996, the United Nations Commission on International Trade Law (UNCITRAL) adopted the model law on
electronic commerce (e-commerce) to bring uniformity in the law in different countries. The Information
Technology Act, 2000 or ITA, 2000 or IT Act, was notified on October 17, 2000. It is the law that deals with
1
lOMoARcPSD|28548391
While the first draft was created by the Ministry of Commerce, Government of India as the E Commerce
Act, 1998, it was redrafted as the ‘Information Technology Bill, 1999’, and passed in May 2000. Further,
this act amended the Indian Penal Code 1860, the Indian Evidence Act 1872, the Bankers’ Books Evidence
Act 1891, and the Reserve Bank of India Act 1934.
Hacking
Hacking is the act of finding the possible entry points that exist in a computer system or a computer
network and finally entering into them. Hacking is usually done to gain unauthorized access to a computer
system or a computer network, either to harm the systems or to steal sensitive information available on
2
lOMoARcPSD|28548391
Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for
testing purpose. This sort of hacking is called Ethical Hacking. A computer expert who does the act of
hacking is called a "Hacker".
Purpose of hacking
There could be various positive and negative intentions behind performing hacking activities. Here is a list
of some probable reasons why people indulge in hacking activities –
1. Just for fun
2. Show-off
3. Steal important information
4. Damaging the system
5. Hampering privacy
6. Money extortion
7. System security testing
8. To break policy compliance.
Types of hackers
Hackers can be classified into different categories such as white hat, black hat, and grey hat, based on their
intent of hacking a system.
3
lOMoARcPSD|28548391
4. Miscellaneous hackers
Apart from the above well-known classes of hackers, we have the following categories of hackers based
on what they hack and how they do it –
A. Red hat hackers: Red hat hackers are again a blend of both black hat and white hat hackers. They are
usually on the level of hacking government agencies, top-secret information hubs, and generally
anything that falls under the category of sensitive information.
B. Blue hat hackers: Blue hat hacker is someone outside computer security consulting firms who is used
to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close
these gaps. Microsoft also uses the term blue hat to represent a series of security briefing events.
C. Elite hackers: This is a social status among hackers, which is used to describe the most skilled hacker.
Newly discovered exploits will circulate among these hackers.
D. Script kiddie: A script kiddie is a non-expert who breaks into computer systems by using pre-packaged
automated tools written by others, usually with little understanding of the underlying concept, hence
the term Kiddie.
E. Hacktivist: A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious,
or political message. In general, most hacktivism involves website defacement or denial-of-service
attacks.
F. Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers.
4
lOMoARcPSD|28548391
Defamation
The term defamation is used to define the injury that is caused to the reputation of a person in the eyes of
a third person. The injury can be done by words oral or written, or by signs or by visible representations.
Cyber defamation is publishing of defamatory material against another person with the help of computers
or internet. If someone publishes some defamatory statement about some other person on a website or
send emails containing defamatory material to other persons with the intention to defame the other
person would amount to cyber defamation. The harm caused to a person by publishing a defamatory
statement about him on a website is widespread and irreparable as the information is available to the
entire world.
5
lOMoARcPSD|28548391
E-mail Abuse
E-mail Abuse, also known as junk e-mail, is a type of electronic spam where unsolicited messages are sent
by e-mail. Many email spam messages are commercial in nature but may also contain disguised links that
appear to be for familiar websites but in fact lead to phishing web sites or sites that are hosting malware.
Spam e-mail may also include malware as scripts or other executable file attachments (like Trojans).
Other IT Act Offences- The offences included in the IT Act 2000 are as follows:
Tampering with the computer source documents.
Hacking computer system.
Publishing of information which is obscene in electronic form.
Penalty for misrepresentation
Penalty for breach of confidentiality and privacy
Penalty for publishing false digital signature certificate
Publication for fraudulent purpose
Act to apply for offence or contravention committed outside India
Confiscation
Penalties or confiscation not to interfere with other punishments.
Power to investigate offences.
Monetary penalties
Monetary penalty is a civil penalty imposed by a regulator for a contravention of an Act, regulation or by
law. It is issued upon discovery of an unlawful event and is payable subject only to any rights of review. It
is regulatory in nature, rather than criminal and is intended to secure compliance with a regulatory
scheme, and it can be employed with the use of other administrative sanctions, such as demerit points
and license suspensions.
6
lOMoARcPSD|28548391
7
lOMoARcPSD|28548391
As such, a single transaction may involve the laws of at least three jurisdictions:
Cyber-crime
Cyber-crime is a crime which is conducted by the use of computer, electronic devices, and network
(Internet) to offences against individual or group of individuals. A person, who is involved in such type of
crime, called as cyber-criminal.
Types of cyber-crime:
1. Hacking
2. Spoofing
3. Salami Attack
4. Spam
5. Malware dissemination
6. Denial of Service
7. Software Piracy
8. Threatening
9. Forgery
10. Obscene or Offensive
11. Cyber Terrorism Content
12. Drug Trafficking
13. Pornography
14. Cyber Stalking
15. Fraud
16. Cyber Defamation
17. Phishing
Nature of criminality
The focus on crime is more evident in the study of criminology. In the definition of criminology, it has been
described as the “systematic study of the nature, extent and control of law-breaking behavior”. The focus
on the assessment of the concept of crime is dealt by the aspect of ‘criminology’. The nature of crime is
8
Downloaded by vishakha soni (vishakhasoni4u@gmail.com)
lOMoARcPSD|28548391
B. An individual criminality
On the other hand, there is also the perspective that the individuals’ criminality is not a question. Scholars
and the researchers alike argue that genetic factories such as the wrong genes and chromosomes can drive
the individuals to absence of self-control, aggressive attitudes as well as generally criminal behavior.
Focus on effects- It’s clear that organizations can’t prevent 100 percent of intrusions. A sophisticated
and determined adversary will eventually get in. This is why companies should focus on detecting the
effects (also called indicators of attack) of malware and adversary activity.
Remember that people are your weakest link- Even the most advanced technology can't prevent a
great employee from accidentally opening your doors to cyber-crime. These unintentional slip-ups
happen; combat them by reiterating common sense practices to all of your employees.
Prevention is always better than cure. It is always better to take certain precautions while working on
the net. One should make them a part of his cyber life.
One should avoid disclosing any personal information to strangers, the person whom they don’t know,
via e-mail or while chatting or any social networking site.
One must avoid sending any photograph to strangers by online as misusing or modification of
photograph incidents increasing day by day.
An updated anti-virus software to guard against virus attacks should be used by all the netizens and
should also keep back up volumes so that one may not suffer data loss in case of virus contamination.
9
lOMoARcPSD|28548391
A person should never send his credit card number or debit card number to any site that is not
secured, to guard against frauds.
10