Cyber Security Unit 3
Cyber Security Unit 3
Topics: Cyber Crime and Criminal justice: Concept of Cyber Crime and the IT Act, 2000, Hacking, Teenage
Web Vandals, Cyber Fraud and Cheating, Defamation, Harassment and E-mail Abuse, Other IT Act
Offences, Monetary Penalties, jurisdiction and Cyber Crimes, Nature of Criminality, Strategies to tackle
Cyber Crime and Trends.
Cyber-crime
Cyber-crime is a crime which is conducted by the use of computer, electronic devices, and network
(Internet) to offences against individual or group of individuals. A person, who is involved in such type of
crime, called as cyber-criminal. The motive of cyber-criminal may be:
1. To intentionally harm the reputation of the victim
2. Cause physical or mental harm
3. Loss, to the victim directly or indirectly, using Internet and mobile phones (Bluetooth/SMS/MMS)
4. Threaten a person
5. Nation's security
6. Financial health
7. Creating and distributing viruses
In the digital age, new technologies and methods of interaction with other humans and devices came into
play. A cyber-crime investigator is primarily concerned with gathering evidence from digital systems that
can be used in the prosecution of internet-based, or cyberspace, criminal activity. All cyber-crime includes
the uses of the World Wide Web. A cyber-crime investigator can use the crucial evidences to solve cyber-
crimes.
Cyber law is the part of the overall legal system that deals with the internet, cyber-space, and their
respective legal issues. Cyber law covers a fairly broad area covering several subtopics including freedom
of expression, access to and usage of the internet, and online privacy. Cyber law is referred to as the Law
of the Internet.
In 1996, the United Nations Commission on International Trade Law (UNCITRAL) adopted the model law
on electronic commerce (e-commerce) to bring uniformity in the law in different countries. The
Information Technology Act, 2000 or ITA, 2000 or IT Act, was notified on October 17, 2000. It is the law
that deals with
1
Downloaded by vishakha soni
CS- 503 (C) Cyber Security Unit III
cyber-crime and electronic commerce in India. India became the 12th country to enable cyber law after it
passed the Information Technology Act, 2000.
While the first draft was created by the Ministry of Commerce, Government of India as the E Commerce
Act, 1998, it was redrafted as the ‘Information Technology Bill, 1999’, and passed in May 2000. Further,
this act amended the Indian Penal Code 1860, the Indian Evidence Act 1872, the Bankers’ Books Evidence
Act 1891, and the Reserve Bank of India Act 1934.
Hacking
Hacking is the act of finding the possible entry points that exist in a computer system or a computer
network and finally entering into them. Hacking is usually done to gain unauthorized access to a
computer system or a computer network, either to harm the systems or to steal sensitive information
available on
2
Downloaded by vishakha soni
CS- 503 (C) Cyber Security Unit III
the computer. Hacking is identifying weakness in computer systems or networks to exploit its weaknesses
to gain access.
Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for
testing purpose. This sort of hacking is called Ethical Hacking. A computer expert who does the act of
hacking is called a "Hacker".
Purpose of hacking
There could be various positive and negative intentions behind performing hacking activities. Here is a list
of some probable reasons why people indulge in hacking activities –
1. Just for fun
2. Show-off
3. Steal important information
4. Damaging the system
5. Hampering privacy
6. Money extortion
7. System security testing
8. To break policy compliance.
Types of hackers
Hackers can be classified into different categories such as white hat, black hat, and grey hat, based on their
intent of hacking a system.
3
Downloaded by vishakha soni
CS- 503 (C) Cyber Security Unit III
of its bad intent which includes stealing corporate data, violating privacy, damaging the system, blocking
network communication etc.
3. Grey hat hackers
Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent
but for their fun, they exploit a security weakness in a computer system or network without the owner’s
permission or knowledge. Their intent is to bring the weakness to the attention of the owners and
getting appreciation or a little bounty from the owners.
4. Miscellaneous hackers
Apart from the above well-known classes of hackers, we have the following categories of hackers based
on what they hack and how they do it –
A. Red hat hackers: Red hat hackers are again a blend of both black hat and white hat hackers. They are
usually on the level of hacking government agencies, top-secret information hubs, and generally
anything that falls under the category of sensitive information.
B. Blue hat hackers: Blue hat hacker is someone outside computer security consulting firms who is used
to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close
these gaps. Microsoft also uses the term blue hat to represent a series of security briefing events.
C. Elite hackers: This is a social status among hackers, which is used to describe the most skilled hacker.
Newly discovered exploits will circulate among these hackers.
D. Script kiddie: A script kiddie is a non-expert who breaks into computer systems by using pre-packaged
automated tools written by others, usually with little understanding of the underlying concept, hence
the term Kiddie.
E. Hacktivist: A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious,
or political message. In general, most hacktivism involves website defacement or denial-of-service
attacks.
F. Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers.
4
Downloaded by vishakha soni
CS- 503 (C) Cyber Security Unit III
Defamation
The term defamation is used to define the injury that is caused to the reputation of a person in the eyes
of a third person. The injury can be done by words oral or written, or by signs or by visible
representations. Cyber defamation is publishing of defamatory material against another person with the
help of computers or internet. If someone publishes some defamatory statement about some other
person on a website or send emails containing defamatory material to other persons with the intention to
defame the other person would amount to cyber defamation. The harm caused to a person by publishing
a defamatory statement about him on a website is widespread and irreparable as the information is
available to the entire world.
5
Downloaded by vishakha soni
CS- 503 (C) Cyber Security Unit III
reasonable
6
Downloaded by vishakha soni
CS- 503 (C) Cyber Security Unit III
restriction and any comment or remark which hampers the reputation of another person (unless the
statement is true) would invite liability under the law of defamation.
Harassment
Online harassment may involve threatening or harassing emails, instant messages, or posting information
online. It targets a specific person either by directly contacting them or by disseminating their personal
information, causing them distress, fear, or anger. It can involve behaviors such as:
1) Sending unsolicited and/or threatening e-mail.
2) Encouraging others to send the victim unsolicited and/or threatening e-mail or to overwhelm the
victim with e-mail messages.
3) Sending viruses by e-mail (electronic sabotage).
4) Spreading rumours.
5) Making defamatory comments about the victim online.
6) Sending negative messages directly to the victim.
7) Impersonating the victim online by sending an inflammatory, controversial or enticing message which
causes others to respond negatively to the victim.
8) Harassing the victim during a live chat.
9) Leaving abusive messages online, including social media sites.
10) Sending the victim pornography or other graphic material that is knowingly offensive.
11) Creating online content that depicts the victim in negative ways.
E-mail Abuse
E-mail Abuse, also known as junk e-mail, is a type of electronic spam where unsolicited messages are
sent by e-mail. Many email spam messages are commercial in nature but may also contain disguised links
that appear to be for familiar websites but in fact lead to phishing web sites or sites that are hosting
malware. Spam e-mail may also include malware as scripts or other executable file attachments (like
Trojans).
Other IT Act Offences- The offences included in the IT Act 2000 are as follows:
Tampering with the computer source documents.
Hacking computer system.
Publishing of information which is obscene in electronic form.
Penalty for misrepresentation
Penalty for breach of confidentiality and privacy
Penalty for publishing false digital signature certificate
Publication for fraudulent purpose
Act to apply for offence or contravention committed outside India
Confiscation
Penalties or confiscation not to interfere with other punishments.
Power to investigate offences.
Monetary penalties
Monetary penalty is a civil penalty imposed by a regulator for a contravention of an Act, regulation or by
law. It is issued upon discovery of an unlawful event and is payable subject only to any rights of review. It
is regulatory in nature, rather than criminal and is intended to secure compliance with a regulatory
scheme, and it can be employed with the use of other administrative sanctions, such as demerit points
and license suspensions.
7
Downloaded by vishakha soni
CS- 503 (C) Cyber Security Unit III
8
Downloaded by vishakha soni
CS- 503 (C) Cyber Security Unit III
the court’s geographic boundaries to haul a defendant into its court forconduct in “Cyberspace”. Issues of
this nature have contributed to the complete confusion and contradictions that plague judicial decisions
in the area of internet jurisdiction. Accordingly, in each case, a determination should be made as to
where an online presence will subject the user to jurisdiction in a distant state or a foreign company.
As such, a single transaction may involve the laws of at least three jurisdictions:
Cyber-crime
Cyber-crime is a crime which is conducted by the use of computer, electronic devices, and network
(Internet) to offences against individual or group of individuals. A person, who is involved in such type of
crime, called as cyber-criminal.
Types of cyber-crime:
1. Hacking
2. Spoofing
3. Salami Attack
4. Spam
5. Malware dissemination
6. Denial of Service
7. Software Piracy
8. Threatening
9. Forgery
10. Obscene or Offensive
11. Cyber Terrorism Content
12. Drug Trafficking
13. Pornography
14. Cyber Stalking
15. Fraud
16. Cyber Defamation
17. Phishing
Nature of criminality
The focus on crime is more evident in the study of criminology. In the definition of criminology, it has
been described as the “systematic study of the nature, extent and control of law-breaking behavior”. The
focus on the assessment of the concept of crime is dealt by the aspect of ‘criminology’. The nature of
9
Downloaded by vishakha soni
CS- 503 (C) Cyber Security Unit III
crime is
10
Downloaded by vishakha soni
CS- 503 (C) Cyber Security Unit III
increasingly changing largely because of the changes in the society and the environment. Today, a crime
cannot be viewed on a single perspective alone. The concept of crime is explained on the basis of
different contending perspectives or theories. Two of the most popular perspective that explains the
nature of crime is its condition as being a social construct and being an individual criminality.
B. An individual criminality
On the other hand, there is also the perspective that the individuals’ criminality is not a question. Scholars
and the researchers alike argue that genetic factories such as the wrong genes and chromosomes can
drive the individuals to absence of self-control, aggressive attitudes as well as generally criminal behavior.
Focus on effects- It’s clear that organizations can’t prevent 100 percent of intrusions. A sophisticated
and determined adversary will eventually get in. This is why companies should focus on detecting the
effects (also called indicators of attack) of malware and adversary activity.
Remember that people are your weakest link- Even the most advanced technology can't prevent a
great employee from accidentally opening your doors to cyber-crime. These unintentional slip-ups
happen; combat them by reiterating common sense practices to all of your employees.
Prevention is always better than cure. It is always better to take certain precautions while working on
the net. One should make them a part of his cyber life.
One should avoid disclosing any personal information to strangers, the person whom they don’t
know, via e-mail or while chatting or any social networking site.
One must avoid sending any photograph to strangers by online as misusing or modification of
photograph incidents increasing day by day.
An updated anti-virus software to guard against virus attacks should be used by all the netizens and
should also keep back up volumes so that one may not suffer data loss in case of virus contamination.
11
Downloaded by vishakha soni
CS- 503 (C) Cyber Security Unit III
A person should never send his credit card number or debit card number to any site that is not
secured, to guard against frauds.
12
Downloaded by vishakha soni