Notes

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

1.

Classification of Cybercrime: -
 Against Individual-
1. Phishing: Phishing is a cybercrime in which attackers use deceptive methods, often
through emails or fake websites, to trick individuals into revealing sensitive
information.

2. Spamming: Spamming involves the bulk distribution of unsolicited and often


irrelevant messages, typically through email, for various purposes such as advertising
or spreading malware.

3. Computer Sabotage: Computer sabotage is the intentional act of damaging or


disrupting computer systems, networks, or data, with the goal of causing harm, chaos,
or achieving specific objectives.

4.Password Sniffing: Password sniffing refers to the unauthorized interception and


monitoring of network traffic to capture and collect plaintext passwords or
authentication credentials, allowing attackers to gain unauthorized access to user
accounts and sensitive information.

 Against Properties- This includes stealing mobile devices such as cell phones,
laptops, personal digit assistant and removable medias; transmitting harmful programs
that can disrupt functions of the systems and/or can wipe out data from hard disk and
create the malfunctioning of the attached devices in the system such as moderm, CD
drive etc.

 Against Organizations-Cyberterrorism is one of the distinct crimes against


organizations/government. Attackers(Individuals or groups of individuals) use
computer tools and internet to usually terrorize the citizens of a particular country by
stealing the private information and also to damage the programs and files or plant
programs to get control of the network and system.

 Single event of cybercrime- It is single event from the perspective of the victim. For
example, unknowingly open an attachment that may contain virus that will infect the
system(PC/Laptop).This is known as hacking or fraud.

 Series of events- This involves attacker interacting with the victims repetitively. For
example, attacker interacts with the victim on the phone and/or via chat rooms to
establish relationship first and then they exploit that relationship to commit the sexual
assault.

2. IPC 499: - In the context of Indian law, IPC 499 refers to Section 499 of the Indian
Penal Code (IPC). IPC 499 deals with the offense of defamation. Defamation is the act of
making false statements about someone with the intention of harming their reputation.
Section 499 provides the definition of defamation and lays out the elements that constitute the
offense.

3.Terminologies: -
 Internet Time Theft-Internet time theft, also known as time and attendance fraud,
occurs when individuals or employees manipulate computer systems or networks to
inaccurately record the time they spend working. This can involve activities such as
altering time logs or using unauthorized methods to manipulate online clock-in and
clock-out systems.

 Salami Attack/Technique- A Salami attack, also known as salami slicing or penny


shaving, is a type of cyber-attack or fraudulent activity where small, often
imperceptible amounts of money are systematically stolen over time. The name is
derived from the idea of slicing small amounts like salami without attracting attention.

 E-mail Spoofing-E-mail spoofing is a technique used by attackers to send emails with


a forged sender address to make it appear as if the email is from a legitimate or trusted
source. The goal may be to deceive recipients or bypass spam filters.

 Spamming-Spamming involves the mass distribution of unsolicited and often


irrelevant messages, typically via email. These messages can include advertisements,
scams, or malicious content.

 Defamation- Defamation refers to the act of making false statements about someone
with the intention of harming their reputation. Defamatory statements can be
communicated through various means, including spoken words, written
communication, or online platforms.

4. Cyber Crime in India Perspective: -In the past several years, many
instances have been reported in India, where cybercafes are known to be used for either real
or false terrorist communication. Cybercrimes such as stealing of bank passwords and
subsequent fraudulent withdrawal of money have also happened through cybercafes.
Cybercafes have also been used regularly for sending obscene mails to harass people.
Public computers, usually referred to the systems, available in cybercafes, hold two types of
risk firstly we do not know what programs are installed on the computer-that is, risk of
malicious programs such as spyware or keyloggers. Second, over the shoulder peeping can
enable others to find out your passwords. Therefore, one has to be extremely careful about
protecting his/her privacy on such systems.
5.National Crime Record Bureau (NCRB): -The National Crime Records
Bureau (NCRB) is an organization in India that functions under the Ministry of Home
Affairs. It serves as the nodal agency for the collection and analysis of crime data, as well as
the dissemination of crime statistics at the national and state levels. The NCRB plays a
crucial role in the maintenance of crime records and the development of information systems
related to criminal justice.

6. Indian Information Technology Act (ITA) 2000: - It does not deliver


cybercafes and interprets cybercafes as “network service providers” referred to under the
erstwhile section. Which imposed on them a responsibility for “due diligence” failing which
they would be liable for the offence committed in their network. The concept of “due
diligence” was interpreted from the various provisions in the cyber-café regualtions where
available or normal responsibilities were expected from network service providers.

7. International Laws related to E-commerce: -


 UNCITRAL Model Law on Electronic Commerce-The United Nations
Commission on International Trade Law (UNCITRAL) has developed a Model Law
on Electronic Commerce. It provides a legal framework for the use of electronic
communications in contract formation and other aspects of e-commerce.
 International Trade Law (WTO)-International trade law encompasses a body of
rules governing the exchange of goods and services across borders. The World Trade
Organization (WTO) plays a central role in establishing and enforcing international
trade agreements.
 United Nations General Assembly Resolution on E-commerce-The United Nations
General Assembly may adopt resolutions related to e-commerce to provide guidance
and recommendations for member states on various aspects of electronic trade.
 Indian Information Technology Act, 2000-The Information Technology Act, 2000,
is a comprehensive law in India that addresses legal aspects of electronic commerce,
digital signatures, data protection, and cybercrimes.

8. Global Perspective: -
 Cybercrime Act 2001 (Australia)The Cybercrime Act 2001 is part of the broader
legal framework in Australia addressing cyber-related offenses. It has been amended
over the years to keep pace with technological advancements and emerging cyber
threats.
 National Cybersecurity Strategy-A National Cybersecurity Strategy is a
comprehensive plan developed by a country to safeguard its cyberspace and protect
critical infrastructure from cyber threats. It outlines the government's goals, priorities,
and measures to enhance cybersecurity.

 Treaty Law in Cybersecurity-Treaty law refers to international agreements or


treaties that countries enter into to establish rules and norms governing their behavior
in cyberspace. These treaties aim to foster cooperation, address cyber threats, and
promote stability in the digital domain.

You might also like