Documente Academic
Documente Profesional
Documente Cultură
Cyber Squatting
“ Cyber squatting is the act of registering a famous domain
name and then selling it in future. This is an issue that has
not been tackled in IT Act 2000.
Phishing
• Phishing is the just one of the many frauds on the internet
trying to fool people into parting with their money.
• Phishing refers to the receipt of unsolicited emails by
customer of financial institutions, requesting them to enter
their username password or other personal information to
access their account for some reason.
• The fraudster then has access to the customer’s online bank
account and to the funds contained in that account.
Cyber Stalking
• Cyber Stalking is use of the internet or other electronic
means to stalk someone.
• This term is used interchangeably with online harassment
and online abuse.
• Stalking generally involves harassing or threatening
behaviour that an individual engages in repeatedly.
• Such as following a person, appearing at person’s home or
place of business, making harassing phone calls, leaving
written messages or objects.
Vishing
• Vishing is the criminal practise of using social engineering
and voice over IP to gain access to private personal and
information from the public for the purpose of financial
reward.
• The term is a combination of “voice and phishing”. vishing
exploits the public’s trust in landline telephone services.
• Vishing is typically used to steal credit card numbers or other
inforrmation used in identify theft schemes from individuals.
• Trojan Horse: A Trojan as this program is called as an
unauthorized program which functions from inside what
seems to be an authorized program, thereby concealing
what it is actually doing
• Internet time theft: This connotes the usage by
unauthorized persons of the internet hours paid for by
another person
• Web Jacking: This occurs when someone forcefully takes
control of a website(By cracking the password).
• Salami Attacks: are used for the commission of financial
crimes. The key here to make the alteration so insignificant
in a single case it would go completely unnoticed e.g a bank
employee insert a program into bank’s servers that deducts
a small amount from the account of every customer.
• Click Jacking: Click jacking is a form of cyber attack where
the hacker uses an invisible layer over the embedded web
content.
Cyber laws in India
• Under the information technology act, 2000
• Whoever with the intent to cause or knowing that he is likely
to cause wrongful loss or damage to the public or any
person.
• Destroys or deletes or alter any information residing in a
computer resource or diminishes its value or affects it
injuriously by any means commits hack.
• Whoever commits hacking shall be punished with
imprisonment up to three years or with fine which may
extent up to two lakh rupees, or with both.
IT Amendment act 2008
• Section 66A: punishment for sending offensive message
through communication service ,etc
• Section 66C: Punishment for identity theft.
• Section 66D: Punishment for cheating by personation
by using computer resource
• Section 66E: Punishment for violation of privacy.
Preventions of cybercrime
• Anti virus and Anti spyware software:
• Anti virus software consists of computer programs that
attempt to identify and eliminate computer virus and other
malware software. Anti spywares are used to restrict
backdoor program.
• Firewalls:
• A firewall protects a computer network from unauthorized
access. Network firewalls may be hardware devices,
software programs or a combination of two.
Future Of Cyber crime
• Continued websites hacks.
• Data and information theft.
• Increasing phishing attacks on financial websites.
• Cybercriminals targeting social and professional networks.
• Threats directed at the mobile platform.
Computer Vulnerability
• Computer stores huge amount of data in small spaces
• Ease of access.
• Complexity of technology.
• Human error.
• Need new laws and upgraded technology to combat cyber
crimes.
Cyber Defamation
• Cyber defamation occours when defamation takes place
with the help of computers and from the internet
• Example- email containing defamation about that person by
making a false statement to another.
Crime Under IPC