Sunteți pe pagina 1din 3

Cyber Crime: Cyber Crime is a generic Term that refers to all criminal activities done using the medium

of communication devices computers, mobile phones , tablets etc. According to Cambridge Dictionary defines that cyber crime as crimes committed with the use of computers or relating to computer especially through the internet. There isnt really a fixed definition for cyber crime. The Indian law IT Act 2000, has not given any definition to the term cyber crime Types of cyber crime Hacking: Any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network. Every act committed towards breaking into a computer and/or network is hacking. Law & Punishment: Under IT Act, 2008, (Section 43(A) read with section 66 is applicable, if crime is proved under IT Act; accused shall be punished for imprisonment which may extend to three years or with fine which may extend to 5 lakh rupees or both. Hacking offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate Lady reported that she and her brothers e-mail IDS had been hacked by someone Already lodged a case against him for dowry and was pending for trial in Bhopal court Copied information and sent emails to prove case of dowry is a false one No evidence against him Cyber cell inquired with rediff.com Found guilty , convicted under section 66 IT Spreading Virus Malicious software that attaches itself to other software..(virus, worms, Trojan Horse, malicious software)

Law & Punishment: Under IT Act, 2008, Section 43(c) & 43(e) read with Section 66 is applicable, Spreading of Virus offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate

Software piracy Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.. Retail revenue losses worldwide are ever increasing due to this crime Can be done in various waysEnd user copying, Hard disk loading, Counterfeiting, illegal downloads from the internet etc.. Recently, the Delhi High Court awarded damages of approximately Rs. 2,000,000 (US$46500) to Microsoft Corporation (Microsoft) in a software piracy case, which is one of the highest damages award in such cases in India. In addition to awarding the damages, the court granted a permanent injunction against one, Mr.Yogesh Popat and others (the Defendants), from carrying out any infringement/passing off activities of Microsoft products, copyrights or trademarks. Identity Theft Identity theft - new provision Fraudulently or dishonestly using someone elses electronic signature, password or any other unique identification feature Law & Punishment: Under IT ( Amendment ) Act 2008, section 66-C, accused shall be punished with imprisonment for a term which may extend to three years or with fine which may extend to 1 lakh rupees identity theft is cognizable, bailable, compoundable with permission of the court Case example of Credit Card and BPO co. Phishing Phishing is a type of trick designed to steal your valuable personal data, such as credit card numbers, passwords, account data, or other information Actual Login Page

Deceptive Login Page e.g From: *****Bank [mailto:support@****Bank.com] Sent: 08 June 2004 03:25 To: India Subject: Official information from ***** Bank Dear valued ***** Bank Customer! For security purposes your account has been randomly chosen for verification. To verify your account information we are asking you to provide us with all the data we are requesting. Otherwise we will not be able to verify your identity and access to your account will be denied. Please click on the link below to get to the bank secure page and verify your account details. Thank you. https://infinity.*****bank.co.in/Verify.jsp ****** Bank Limited EMAIL SPOOFING:A spoofed email is one that appears to originate from one source but actually has been sent from another source .e.g. xyz has an e mail address xyz@abc.org. His enemy pqr spoofs his email and sends obscene message to all his acquaintances. Since the email appear to have originated from xyz, his friends could take offence and relationships could be spoiled for life. FORGERY:Counterfeit currency notes, postage & revenue stamps, mark sheet etc. by the help of computers, printers, and scanners. E.g. Outside many college across India, one finds touts soliciting the sale of fake mark sheets or even certificates. These are made using computer & high quality scanners and printers.

S-ar putea să vă placă și