You are on page 1of 2

CHETAN AGGARWAL 0805_CHETAN

1. On the basis of a. subject of crime, i. Against individuals ii. Against organizations iii. Against society at large b. Against whom crime is committed and c. Temporal nature of criminal activities being carried out on computers and Internet. d. Commission of traditional crimes i. Theft ii. Trespass iii. Violence iv. Obscenity v. Forgery and fraud vi. Property crimes e. New crimes i. Pornography ii. Stalking iii. Unauthorized access iv. Hacking v. Denial of service attack vi. Virus and worms vii. Spoofing viii. Logic bombs ix. Salami attacks x. Terrorism xi. Web jacking xii. Trojan attacks etc. 2. Cyber crime has evolved significantly and is no longer just a threat to industry and individuals, but increasingly to national security. Hacking, spoofing and virus attacks are capable of causing serious security breaches in information system of vital installations. The potential for damage to national security through such attacks is huge. The Internet had become a means of money laundering for funding terrorist attacks. It is also being used as secure channel of communication by terrorists. The ever increasing cyber crime is taking the world by storm. Technology is a boon but it also has dangerous implications if left undetected. 3. Cyber forensics is the discovery, analysis and reconstruction of evidences by a process of extracting information and data from a computer storage media. This data is collected, preserved and is used for presenting it in a manner acceptable in a court of law. It also includes finding encrypted and decrypted protected information, recovering deleted data, computers that created them etc. Trojan attack means an unauthorized programme, which passively gains control over anothers system by representing itself as an authorised programme. Web Jacking occurs when someone forcefully takes the control of a website. In this the hacker gains access and control over the other website by bypassing the password. 4. Cyber crime may be said to be those species, of which genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crime. Both cyber crime and cyber terrorism are criminal

acts but are in many aspects. Cyber crime is a domestic issue, which may sometimes have international consequences whereas cyber terrorism is certainly of global concern. It includes both domestic as well as international consequences. The terrorist attacks on the Internet are by hate e-mails, denialof-service attacks, attacks on sensitive networks etc. 5. The Information Technology Act deals with the various cyber crimes in chapters IX & XI. The important sections are Ss. 43,65,66,67. Section 43 Unauthorised access, unauthorised downloading, virus attacks or any contaminant, causes damage, disruption etc. Fine up to Rs. 1. Section 65 Tampering with computer source documents. Imprisonment up to 3 years or fine or both. Section 66 Hacking with computer system. Imprisonment up to 3 years or fine. Section 67 Publication of obscene material. Imprisonment up to a term of 10 years and also with fine up to Rs. 2 lacs.

You might also like