Anda di halaman 1dari 4

CSE (IV Year/ VIII SEM)

8CS7: Seminar on Information Technology Act (SITA)


ASSIGNMENT II
Name: NAVEEN PUROHIT/ Batch: K2

Q1. What is Cybercrime? Why is there a need for cyber law?


Ans. Cybercrime encompasses any criminal act dealing with computers and networks (called hacking).
Additionally, cybercrime also includes traditional crimes conducted through the Internet. For example;
hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered
to be cybercrimes when the illegal activities are committed through the use of a computer and the
Internet. With the advent of Computers as a basic tool of Communication, Information Processing,
Information Storage, Physical Devices Control, etc., a whole new Cyber Society has come into existence.
This Cyber society operates on a virtual world created by Technology and it is the Cyber Space
Engineering that drives this world. In maintaining harmony and co-existence of people in this Cyber
Space, there is a need for a legal regime which is what we recognize as Cyber laws. Cyber Laws are
the basic laws of a Society and hence have implications on every aspect of the Cyber Society such as
Governance, Business, Crimes, Entertainment, Information Delivery, Education etc.

Q2. Who can conduct raid and investigation for cybercrimes?


Ans. Back when the term computer meant mainframes and reel-to-reel tape drives, computer criminals
were masterminds who used their programming talents to glean millions of dollars from banks and
corporations. These crooks were so ingenious in their schemes that many banks and corporations cut deals
to hire them as security consultants rather than send them to prison. Today, the average desktop
workstation has all the computing power of one of those old mainframes, the average American home has
at least one computer, and computer criminals are no longer masterminds, just crooks and creeps doing
what crooks and creeps do. Today and every day, thousands of people worldwide are being victimized by
computer crime. Thats why just about every major municipal or county law enforcement agency in the
United States now has a new breed of detective: the computer crime or cybercrime investigator.

Q3. How is cybercrime different from conventional crimes?


Ans. When it comes to protecting against real-time crime, there are obvious things you should and should
not do. You would never leave your house without first locking the door, wouldnt tell burglars when you
are going to be absent from home and you wouldnt dream of giving your debit card PINs to random
strangers. But for some reason, many people often dont carry this sort of common sense with them when
online. And yet the threat is just as real. It is estimated that cyber-attacks cost the U.S. $100 billion a year.
If you werent already convinced of the real threat that cybercrime poses, that number speaks volumes.
How then, does this compare to physical crime? Right now, it is estimated that the annual cost of physical
crime is around $177 billion. While this is obviously a lot of money, you'll notice that cybercrime is not
far behind. And even more sobering than this is the fact that digital crime is increasing every year. In
2000, the number of internet crime complaints was 16,838, but this number has been steadily rising in
2013 there were a total of 262,813 complaints to the Internet Crime Complaint Center (IC3).

Q4. Explain the different kinds of cybercrimes.


Ans. Hacking: This is a type of crime wherein a persons computer is broken into so that his personal or
sensitive information can be accessed. In the United States, hacking is classified as a felony and
punishable as such. This is different from ethical hacking, which many organizations use to check their
Internet security protection. In hacking, the criminal uses a variety of software to enter a persons
computer and the person may not be aware that his computer is being accessed from a remote location.
Theft: This crime occurs when a person violates copyrights and downloads music, movies, games and
software. There are even peer sharing websites which encourage software piracy and many of these
websites are now being targeted by the FBI. Today, the justice system is addressing this cybercrime and
there are laws that prevent people from illegal downloading.
Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage of online
messages and emails. Typically, these stalkers know their victims and instead of resorting to offline
stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the
desired effect, they begin offline stalking along with cyber stalking to make the victims lives more
miserable.
Identity Theft: This has become a major problem with people using the Internet for cash transactions and
banking services. In this cybercrime, a criminal accesses data about a persons bank account, credit cards,
Social Security, debit card and other sensitive information to siphon money or to buy things online in the
victims name. It can result in major financial losses for the victim and even spoil the victims credit
history.
Malicious Software: These are Internet-based software or programs that are used to disrupt a network.
The software is used to gain access to a system to steal sensitive information or data or causing damage to
software present in the system.
Child soliciting and Abuse: This is also a type of cybercrime wherein criminals solicit minors via chat
rooms for the purpose of child pornography. The FBI has been spending a lot of time monitoring chat
rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting.

Q5. How do cybercrimes are affecting the government?


Ans. Cybercrime has been increasing in complexity and financial costs since corporations started to
utilize computers in the course of doing business. As technology increases between governments that are
involved in international business, criminals have realized that this is a cost effective method to make
money. This investigation and trial manual is meant to serve as a basic template on the lessons learned to
prepare governments, and their prosecutors, for combating cybercrime. To delve deeply into computer
technology requires both long study and technical expertise. Therefore, as in most crimes that are
technical in nature, or have technical aspects to them, such as bank fraud, murder investigations that
require the analysis of blood and spatter techniques, gun-shots that require extensive ballistics
investigation, experts are advisable for use as an aid in directing your investigations, to act as a special
aide in preparing for trial, and as an expert to testify in that trial. However, experts are not absolutely
required, particularly in identifying basic components that make up a cybercrime, and on how to prove
the elements of that case. We all know that computer crimes can run from the simple to the ultrasophisticated. This does not mean they are not solvable, and explainable to the judiciary during any trial.
The complexity in these crimes should not be feared.

Q6. Classify cybercrimes.


Ans. It can be classified in to 4 major categories as
Cyber crime against Individual
Cyber crime Against Property
Cyber crime Against Organization
Cyber crime Against Society
Against Individuals
Email spoofing : A spoofed email is one in which e-mail header is forged so that mail appears to originate
from one source but actually has been sent from another source
Spamming : Spamming means sending multiple copies of unsolicited mails or mass e-mails such as chain
letters.
Cyber Defamation :This occurs when defamation takes place with the help of computers and / or the
Internet. E.g. someone publishes defamatory matter about someone on a website or sends e-mails
containing defamatory information.
Harassment & Cyber stalking :Cyber Stalking Means following the moves of an individual's activity over
internet. It can be done with the help of many protocols available such at e- mail, chat rooms, user net
groups.
Against Property
Credit Card Fraud
Intellectual Property crimes : These include Software piracy: illegal copying of programs, distribution of
copies of software.
Copyright infringement:
Trademarks violations:
Theft of computer source code:
Internet time theft : the usage of the Internet hours by an unauthorized person which is actually paid by
another person.
Against Organisation
Unauthorized Accessing of Computer: Accessing the computer/network without permission from the
owner. it can be of 2 forms:
Changing/deleting data: Unauthorized changing of data.
Computer voyeur: The criminal reads or copies confidential or proprietary information,
but the data is neither deleted nor changed.
Denial Of Service :When Internet server is flooded with continuous bogus requests so as to denying
legitimate users to use the server or to crash the server.

Computer contamination / Virus attack : A computer virus is a computer program that can infect other
computer programs by modifying them in such a way as to include a (possibly evolved) copy of it.
Viruses can be file infecting or affecting boot sector of the computer. Worms, unlike viruses do not need
the host to attach themselves to.
Email Bombing : Sending large numbers of mails to the individual or company or mail servers thereby
ultimately resulting into crashing.
Salami Attack : When negligible amounts are removed & accumulated in to something larger. These
attacks are used for the commission of financial crimes.
Logic Bomb : Its an event dependent programme , as soon as the designated event occurs, it crashes the
computer, release a virus or any other harmful possibilities.
Trojan Horse : an unauthorized program which functions from inside what seems to be an authorized
program, thereby concealing what it is actually doing.
Data diddling : This kind of an attack involves altering raw data just before it is processed by a computer
and then changing it back after the processing is completed.
Against Society
Forgery : currency notes, revenue stamps, mark sheets etc can be forged using computers and high quality
scanners and printers.
Cyber Terrorism : Use of computer resources to intimidate or coerce others.
Web Jacking : Hackers gain access and control over the website of another, even they change the content
of website for fulfilling political objective or for money available such at e- mail, chat rooms, user net
groups.

Anda mungkin juga menyukai