CYBER LAW AND IPR - Unit 1 - 1b-1
CYBER LAW AND IPR - Unit 1 - 1b-1
CYBER LAW AND IPR - Unit 1 - 1b-1
UNIT -1B
Cyber Crime and Criminal Justice: New technologies create new criminal
opportunities but few new types of crime. What distinguishes Cybercrime from
traditional criminal activity?
Obviously, one difference is the use of the digital computer, but technology alone is
insufficient for any distinction that might exist between different realms of criminal
activity.
Criminals do not need a computer to commit fraud, traffic in child pornography and
intellectual property, steal an identity, or violate someone’s privacy. All those
activities existed before the “cyber” prefix became ubiquitous. Cybercrime,
especially involving the Internet, represents an extension of existing criminal
behavior alongside some novel illegal activities.
Criminal justice: is the delivery of justice to those who have been accused of
committing crimes. The criminal justice system is a series of government
agencies and institutions. Goals include the rehabilitation of offenders, preventing
other crimes, and moral support for victims. The primary institutions of the criminal
justice system are the police, prosecution and defense lawyers, the courts and the
prisons system.
The criminal justice system consists of three main parts:
Information Technology Act, 2000 (India): The Information Technology Act, 2000
also Known as an IT Act is an act proposed by the Indian Parliament reported on
17th October 2000. This Information Technology Act is based on the United Nations
Model law on Electronic Commerce 1996 (UNCITRAL Model) which was suggested by
the General Assembly of United Nations by a resolution dated on 30th January,
1997. It is the most important law in India dealing with Cybercrime and E-
Commerce.
The main objective of this act is to carry lawful and trustworthy electronic, digital
and online transactions and alleviate or reduce cybercrimes. The IT Act has 13
chapters and 90 sections. The last four sections that starts from ‘section 91 –
section 94’, deals with the revisions to the Indian Penal Code 1860.
First Schedule –
Second Schedule –
The offenses and the punishments that falls under the IT Act, 2000 are as follows :-
SECTION PUNISHMENT
This section of IT Act, 2000 states that any act of destroying,
altering or stealing computer system/network or deleting data with
Section 43 malicious intentions without authorization from owner of the
computer is liable for the payment to be made to owner as
compensation for damages.
This section of IT Act, 2000 states that any corporate body dealing
with sensitive information that fails to implement reasonable
Section 43A
security practices causing loss of other person will also liable as
convict for compensation to the affected party.
Hacking of a Computer System with malicious intentions like fraud
Section 66 will be punished with 3 years imprisonment or the fine of
Rs.5,00,000 or both.
Fraud or dishonesty using or transmitting information or identity
Section 66
theft is punishable with 3 years imprisonment or Rs. 1,00,000 fine or
B, C, D
both.
This Section is for Violation of privacy by transmitting image of
Section 66
private area is punishable with 3 years imprisonment or 2,00,000
E
fine or both.
This Section is on Cyber Terrorism affecting unity, integrity,
Section 66
security, sovereignty of India through digital medium is liable for life
F
imprisonment.
Section 67 This section states publishing obscene information or pornography
or transmission of obscene content in public is liable for
imprisonment up to 5 years or fine of Rs. 10,00,000 or both.
Types of Hacking/Hackers:
Black Hat Hackers: Black hat hackers are the "bad guys" of the hacking scene.
They go out of their way to discover vulnerabilities in computer systems and
software to exploit them for financial gain or for more malicious purposes, such as
to gain reputation, carry out corporate espionage, or as part of a nation-state
hacking campaign.
These individuals’ actions can inflict serious damage on both computer users and
the organizations they work for. They can steal sensitive personal information,
compromise computer and financial systems, and alter or take down the
functionality of websites and critical networks.
White Hat Hackers: White hat hackers can be seen as the “good guys” who
attempt to prevent the success of black hat hackers through proactive hacking.
They use their technical skills to break into systems to assess and test the level of
network security, also known as ethical hacking. This helps expose vulnerabilities in
systems before black hat hackers can detect and exploit them.
The techniques white hat hackers use are similar to or even identical to those of
black hat hackers, but these individuals are hired by organizations to test and
discover potential holes in their security defenses.
Grey Hat Hackers: Grey hat hackers sit somewhere between the good and the
bad guys. Unlike black hat hackers, they attempt to violate standards and principles
but without intending to do harm or gain financially. Their actions are typically
carried out for the common good.
For example, they may exploit a vulnerability to raise awareness that it exists, but
unlike white hat hackers, they do so publicly. This alerts malicious actors to the
existence of the vulnerability.
Webcams: Webcams built into computers are a common hacking target, mainly
because hacking them is a simple process. Hackers typically gain access to a
computer using a Remote Access Trojan (RAT) in rootkit malware, which allows
them to not only spy on users but also read their messages, see their browsing
activity, take screenshots, and hijack their webcam.
Routers: Hacking routers enables an attacker to gain access to data sent and
received across them and networks that are accessed on them. Hackers can also
hijack a router to carry out wider malicious acts such as distributed denial-of-service
(DDoS) attacks, Domain Name System (DNS) spoofing, or cryptomining.
Jail broken Phones: Jail breaking a phone means removing restrictions imposed
on its operating system to enable the user to install applications or other software
not available through its official app store. Aside from being a violation of the end-
user’s license agreement with the phone developer, jail breaking exposes many
vulnerabilities. Hackers can target jail broken phones, which allows them to steal
any data on the device but also extend their attack to connected networks and
systems.
There are several key steps and best practices that organizations and users can
follow to ensure they limit their chances of getting hacked.
Software Update: Hackers are constantly on the lookout for vulnerabilities or
holes in security that have not been seen or patched. Therefore, updating software
and operating systems are both crucial to preventing users and organizations from
getting hacked. They must enable automatic updates and ensure the latest
software version is always installed on all of their devices and programs.
HTTPS Encryption: Spoofed websites are another common vehicle for data theft,
when hackers create a scam website that looks legitimate but will actually steal the
credentials that users enter. It is important to look for the Hypertext Transfer
Protocol Secure (HTTPS) prefix at the start of a web address. For example:
https://www.fortinet.com.
Avoid Clicking on Ads or Strange Links: Advertisements like pop-up ads are
also widely used by hackers. When clicked, they lead the user to inadvertently
download malware or spyware onto their device. Links should be treated carefully,
and strange links within email messages or on social media, in particular, should
never be clicked. These can be used by hackers to install malware on a device or
lead users to spoofed websites.
Change the Default Username and Password on Your Router and Smart
Devices: Routers and smart devices come with default usernames and passwords.
However, as providers ship millions of devices, there is a risk that the credentials
are not unique, which heightens the chances of hackers breaking into them. It is
best practice to set a unique username and password combination for these types
of devices.
Protect Yourself Against Hacking: There are further steps that users and
organizations can take to protect themselves against the threat of hacking.
Download from First-party Sources: Only download applications or software
from trusted organizations and first-party sources. Downloading content from
unknown sources means users do not fully know what they are accessing, and the
software can be infected with malware, viruses, or Trojans.
Use a VPN: Using a virtual private network (VPN) allows users to browse the
internet securely. It hides their location and prevents hackers from intercepting
their data or browsing activity.
Ethical hacking refers to the actions carried out by white hat security hackers. It
involves gaining access to computer systems and networks to test for potential
vulnerabilities, and then fixing any identified weaknesses.
Using these technical skills for ethical hacking purposes is legal, provided the
individual has written permission from the system or network owner, protects the
organization’s privacy, and reports all weaknesses they find to the organization and
its vendors.
FAQs
What is hacking?
There are many different types of hackers, the most common of which are black,
grey, and white hat hackers. Black hat hackers are the bad guys—the cyber
criminals. The white hat or ethical hackers are the good guys, while grey hat
hackers are somewhere in the middle.
Other common hacker types include blue hat hackers, which are amateur hackers
who carry out malicious acts like revenge attacks, red hat hackers, who search for
black hat hackers to prevent their attacks, and green hat hackers, who want to
learn about and observe hacking techniques on hacking forums.
Other common hacker types are cyber terrorists, hacktivists, state- or nation-
sponsored hackers, script kiddies, malicious insiders, and elite hackers. Some
hacker groups are very well organized and continue to find new ways to identify
weaknesses and organize security penetration of large and small organizations.
What is the biggest hack in history?
The biggest hack in history is thought to be the data breach against Yahoo! The
2013 attack compromised around 3 billion people, and the company revealed that
every Yahoo! customer was affected by it.
Which country has the most hackers? China is believed to be the country with
the highest number of dangerous hackers. Most of the major cyberattacks that
occurred around the world can be traced back to China.
Keys Terms:
Graffiti: form of visual communication, usually illegal, involving the unauthorized
marking of public space by an individual or group. Although the common image of
graffiti is a stylistic symbol or phrase spray-painted on a wall by a member of a
street gang, some graffiti is not gang-related.
Cyber Fraud and Cheating-It means the person who is doing the act of
cyber-crime i.e. stealing password and data storage has done it with having guilty mind
which leads to fraud and cheating.
Defamation-The offense of injuring a person's character, fame, or reputation by false and malicious
statements. Any derogatory statement, which is designed to injure a person’s business or reputation,
constitutes cyber defamation. Defamation can be accomplished as libel or slander.
Cyber defamation occurs when defamation takes place with the help of computers and / or the Internet.
E.g. Someone publishes defamatory matter about someone on a website or sends e-mails containing
defamatory information to all of that person’s friends.
E-mail Abuse-Email Abuse, also known as junk email, is a type of electronic spam where unsolicited
messages are sent by email. Many email spam messages are commercial in nature but may also contain
disguised links that appear to be for familiar websites but in fact lead to phishing web sites or sites that
are hosting malware.
Spam email may also include malware as scripts or other executable file
attachments (Trojans).