blog




  • Essay / Cybercrime Laws in India

    Table of ContentsSummaryIntroductionCybercrime Categories: Cybercrime regulated under Cybercrime Laws or Internet LawsConclusionSummaryGenerally, to protect the confidentiality of information of the parties when sharing information over the Internet through a computer or any other electronic device, it forms an agreement on the procedure for processing the information and not to disclose this information to third parties or not to use it in such a way that it is disclosed to third parties. It often happens that parties or their employees disclose such valuable information for surveillance purposes and result in a breach of confidentiality contract. Special techniques such as social engineering are commonly used to obtain confidential information. In other words, the information is changed from the way it should be entered by a person entering the data, by a virus that modifies the data, by the database or application programmer, or by any other person involved in the process of storing information in a computer. deposit. This also includes automatically modifying financial information for a period of time before processing and then restoring the original information. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get the original essayIntroductionCybercrimes are illegal acts in which the computer is either a tool or a target, or both. Cybercrime can involve criminal activities of a traditional nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. Computer misuse is also behind a series of new-age crimes which are focused on by the Information Technology Act, 2000, which is the main legislation in India dealing with cybercrime and of electronic commerce. The law provides for the creation of quasi-judicial bodies, namely agents responsible for judging disputes (civil offenses and criminal offenses). The Adjudicating Officer has the power both to award damages in a civil remedy and to impose sanctions for violations of the Act. It therefore has powers both before civil and criminal courts. The first appellate body is the Cyber ​​Appellate Tribunal, consisting of a Chairman and such other members as may be prescribed by the Central Government. A second appeal may be filed before a competent High Court, within 60 days from the date of communication of the order of the Cyber ​​Appellate Tribunal. Cybercrime categories: Cybercrime regulated by Cyber ​​laws or Internet laws Computer as target: using a computer to attack other computers, e.g. hacking, virus/worm attacks, etc. Computer as a weapon: using a computer to commit real crimes, e.g. cyberterrorism, IPR violations, credit card fraud, EFT fraud, pornography, etc. Technical advances have created new opportunities for criminal activities, particularly the criminal misuse of information technology such as: Unauthorized access and hacking. Access means to access, instruct or communicate with the logical, arithmetic or memory function resources of a computer, computer system or computer. network. Unauthorized access therefore refers to any type of access without the authorization of the rightful owner or person in charge of a computer, computer system or networkcomputer science. Any act committed with the aim of breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. They possess the desire to destroy and they enjoy such destruction. Some hackers hack for personal monetary gains, such as stealing credit card information, transferring money from various bank accounts to their own account, followed by cash withdrawal. Hacking a web server by taking control of another person's website is called web hacking. Trojan attack The program acts like something useful but does silent things. Programs of this type are called Trojan horses. The name Trojan is popular. Trojans are divided into two parts, a client part and a server part. When the victim (unknowingly) runs the server on their machine, the attacker will then use the client to connect to the server and begin using the Trojan. TCP/IP is the type of protocol usually used for communications, but some Trojan horse functions also use UDP. Virus and Worm Attack A program that has the ability to infect other programs, make copies of itself and spread into other programs is called a virus. Programs that multiply like viruses but spread from one computer to another are called worms. Please read Email Spamming Email spam refers to sending emails to thousands and thousands of users - similar to a chain letter. Sending malicious codes via email Emails are used to send viruses, Trojans, etc. via email attachment or by sending a website link. which, upon visit, downloads malicious code. Email Bombing Email bombing is characterized by attackers repeatedly sending the same email message to a particular address. Sending Threatening Emails Defamatory Emails IRC Email Frauds Three main ways to attack IRC are: attacks, cloning attacks, and flooding attacks. Denial of Service Attacks Flooding an IT resource with more than requests than it can handle. This causes the resource to crash, denying authorized users access to the service. PornographyThe term "pornography" literally means "describing or showing sexual acts in order to cause sexual arousal through books, films, etc." » This would include pornographic websites; pornographic material produced using computers and use of the Internet to download and transmit videos, images, photos, writings, etc. pornographic. Adult entertainment is the largest industry on the Internet. There are over 420 million individual pornographic web pages in existence today. Research shows that 50% of websites containing potentially illegal content related to child abuse were Pay-Per-View. This indicates that abusive images of children on the Internet have been heavily commercialized. Pornography delivered to mobile phones is now a booming business, "driven by the increase in sophisticated services that provide video clips and streaming videos, in addition to text and images." Effects of Pornography Pornography and its messages help shape attitudes and encourage behaviors that can harm individual users and their families. Pornography is often viewed in secret, creating cheating in marriageswhich can lead to divorce in certain cases. Additionally, pornography promotes the lure of adultery, prostitution, and unreal expectations that can lead to dangerous promiscuous behavior. Pornography Addiction Dr. Victor Cline, a sex addiction expert, has found that there is a four-stage progression among many pornography consumers. Addiction: Pornography provides a powerful sexual stimulant or aphrodisiac effect, followed by sexual release, most often through masturbation. Escalation: Over time, addicts require more explicit and deviant material to satisfy their sexual needs. and disturbing, over time it becomes common and acceptable. Acting out sexually: There is a growing tendency to mimic behaviors seen in pornography. Counterfeiting Counterfeit banknotes, postage and tax stamps, mark sheets, etc. can be falsified using sophisticated computers, printers and scanners. Impersonating another person is also considered counterfeiting. IPR Violations. These include software piracy, copyright infringement, trademark violations, computer source code theft, and patent violations. etc.Cyber ​​SquattingDomain names are also registered trademarks and protected by ICANN's Domain Dispute Resolution System policy and also under trademark laws. Cyber ​​Squatters register a domain name identical to the popular service provider's domain in order to attract their users and make profit from them. CyberterrorismTargeted attacks on military installations, power plants, air traffic control, banks, highway traffic control, and telecommunications networks are the most likely targets. . Others like police, medical, fire and rescue systems, etc. Cyberterrorism is an attractive option for modern terrorists for several reasons. It is cheaper than traditional terrorist methods. Cyberterrorism is more anonymous than traditional terrorist methods. The variety and number of targets is enormous. Cyberterrorism can be carried out remotely, a feature particularly attractive to terrorists. Cyberterrorism has the potential to directly affect more people. in order to access confidential banking and financial information. Using stolen card information or fake credit/debit cards is common. Bank employees can recover money using programs to deduct a small amount of money from all customer accounts and add it to their own account, also called salami. E-Commerce/Investment FraudSales and investment fraud: an offer that uses false or fraudulent representations to solicit investments or loans, or that provides for the purchase, use, or dealing in falsified or counterfeit securities . Goods or services purchased or contracted by individuals online are never delivered. Fraud attributable to the false declaration of a product advertised for sale on an Internet auction site or to the non-delivery of products purchased via an Internet auction site. Investors are lured into investing in this fraudulent scheme by promises of abnormally high profits. Selling illegal items This would include trading in narcotics, weapons and wildlife etc. by posting information on websites, auction sites and bulletin boards or simply using the mail electronic. communication.Online gamesThere are millions of websites hosted on..