Cyber Crime
Cyber Crime
Cyber Crime
CYBER CRIME
Submitted By:
Group 6
Shetty Sharada Disha Khandige Muralidhar Baliga
Jawahar D’souza Lohith Lakshmikanth
Guide :
Dr Vidyavathi
Contents
1.Introduction
2.Types of cyber crime
3.Existing Laws
4.Drawbacks
5.Suggestions
6.Conclusion
1. INTRODUCTION
A simple yet sturdy definition of cyber crime would be “unlawful acts wherein the
computer is either a tool or a target or both”. Defining cyber crimes, as “acts that
are punishable by the information Technology Act” would be unsuitable as the
Indian Penal Code also covers many cyber crimes, such as e-mail spoofing, cyber
defamation etc.
The cyber criminals constitute of various groups/ category. This division may be
justified on the basis of the object that they have in their mind. The following are
the category of cyber criminals-
The simple reason for this type of delinquent behaviour pattern in children is seen
mostly due to the inquisitiveness to know and explore the things. Other cognate
reason may be to prove themselves to be outstanding amongst other children in
their group. Further the reasons may be psychological even. E.g. the Bal Bharati
(Delhi) case was the outcome of harassment of the delinquent by his friends.
2. Organised hackers
These kinds of hackers are mostly organised together to fulfil certain objective.
The reason may be to fulfil their political bias, fundamentalism, etc. The Pakistanis
are said to be one of the best quality hackers in the world. They mainly target the
Indian government sites with the purpose to fulfil their political objectives. Further
the NASA as well as the Microsoft sites is always under attack by the hackers.
3. Professional hackers / crackers
Their work is motivated by the colour of money. These kinds of hackers are mostly
employed to hack the site of the rivals and get credible, reliable and valuable
information. Further they are ven employed to crack the system of the employer
basically as a measure to make it safer by detecting the loopholes.
4. Discontented employees
This group include those people who have been either sacked by their employer or
are dissatisfied with their employer. To avenge they normally hack the system of
their employee.
2. Types of cyber crime
1) HACKING
Hacking in simple terms means illegal intrusion into a computer system without
the permission of the computer owner/user.
3)VIRUS DISSEMINATION
Malicious software that attaches itself to other software.
(virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are
the malicious softwares)
4)SOFTWARE PIRACY
• Theft of software through the illegal copying of genuine programs or the
counterfeiting and distribution of products intended to pass for the original..
• Retail revenue losses worldwide are ever increasing due to this crime
• Can be done in various ways- End user copying, Hard disk loading,
Counterfeiting, Illegal downloads from the internet etc..
5) IRC CRIME
Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere
the world can come together and chat with each other
• Criminals use it for meeting coconspirators.
• Hackers use it for discussing their exploits / sharing the techniques
• Cyber Stalking - In order to harass a woman
her telephone number is given to others as if she wants to befriend males
7) NET EXTORTION
Copying the company’s confidential data in order to extort said company for huge
amount.
8) PHISHING
It is technique of pulling out confidential information from the bank/financial
institutional account holders by deceptive means
9) Spoofing
Getting one computer on a network to pretend to have the identity off another
computer, usually one with special access privileges, so as to obtain access to the
other computers on the network.
12) THREATENING
The criminal sends threatening email or comes in contact in chat rooms with
victim. (Any one disgruntled may do this against boss, friend or official)
13) SALAMI ATTACK
In such crime criminal makes insignificant changes in such a manner that such
changes would go unnoticed. Criminal makes such program that deducts small
amount like Rs. 2.50 per month from the account of all the customer of the Bank
and deposit the same in his account. In this case no account holder will approach
the bank for such small amount but criminal gains huge amount.
In India, the Information Technology Act 2000 was enacted after the United
Nation General Assembly Resolution dated the 30th January, 1997 by adopting the
Model Law on Electronic Commerce adopted by the United Nations Commission
on International Trade Law. This was the first step towards the Law relating to e-
commerce at international level to regulate an alternative form of commerce and to
give legal status in the area of e-commerce. It was enacted taking into
consideration UNICITRAL model of Law on e- commerce 1996.
1. The hurry in which the legislation was passed, without sufficient public
debate, did not really serve the desired purpose.
2. “Cyber laws, in their very preamble and aim, state that they are targeted at
aiding e-commerce, and are not meant to regulate cybercrime”.
3. Cyber torts-The recent cases including Cyber stalking cyber harassment, cyber
nuisance, and cyber defamation have shown that the I.T.Act 2000 has not dealt
with those offences. Further it is also contended that in future new forms of
cyber crime will emerge which even need to be taken care of. Therefore India
should sign the cyber crime convention. However the I.T.Act 2000 read with
the Penal Code is capable of dealing with these felonies.
The definition of hacking provided in section 66 of the Act is very wide and
capable of misapplication. There is every possibility of this section being
misapplied and in fact the Delhi court has misapplied it.
5. Uniform law
The need of the hour is a worldwide uniform cyber law to combat cyber crime.
Cyber crime is a global phenomenon and therefore the initiative to fight it
should come from the same level. E.g. the author of the love bug virus was
appreciated by his countrymen.
6. Lack of awareness
One important reason that the Act of 2000 is not achieving complete success is
the lack of awareness among the s about their rights. Further most of the cases
are going unreported. If the people are vigilant about their rights the law
definitely protects their right.
7. Jurisdiction issues
Jurisdiction is also one of the debatable issues in the cases of cyber crime due
to the very universal nature of cyber space. With the ever-growing arms of
cyber space the territorial concept seems to vanish. New methods of dispute
resolution should give way to the conventional methods. The Act of 2000 is
very silent on these issues.
10.The law enforcement agencies in the country are not well equipped and
Knowledgeable enough about cybercrime.
It is quite possible to check cyber crime. History is the witness that no legislation
has succeeded in totally eliminating crime from the globe. The only possible step is
to make people aware of their rights and duties (to report crime as a collective duty
towards the society) and further making the application of the laws more stringent
to check crime. Undoubtedly the Act is a historical step in the cyber world. Further
I all together do not deny that there is a need to bring changes in the Information
Technology Act to make it more effective to combat cyber crime. We can conclude
with a word of caution for the pro-legislation school that it should be kept in mind
that the provisions of the cyber law are not made so stringent that it may retard the
growth of the industry and prove to be counter-productive.