Friday 7 June 2013

Cyber Crime

What is cyber-crime ?

                           The term cyber-crime is made up of two words cyber+crime where the word "cyber" is a prefix to a wide range of existing words to form new words as cyber-crime and crime is an act against the existing laws. The term "cyber" has been derived from a Greek word "cybernetics" which is applicable when a system being analysed is involved in a closed signalling loop where action in the system generates some changes in its environment.Cybernetics is a generic term which is used in biology, computer-science, engineering,mathematics, art psychology etc. By the 1970, the Control data Corporation (CDC) sold a wide range of supercomputers, which established the the word "cyber" synonymous with computers.
                           Every person who uses computers with or without Internet by means of electronic data interchange and other means of electronic communication or electronic commerce is always threatened about the term cyber-crime. People started the frequent use of Internet after the year 1995 and the computer-crime and net-crime was negligible. There were not any special laws to curve such crimes and the existing laws were not sufficient. In India, the special act to deal with cyber crime came into force in the year 2000 and is named as The Information and Technology Act,2000. Cyber crime can defined as the crime against a person or a group of persons with a criminal motive to harm  the reputation of the victim by using Internet and mobile phones.

What are the terms related to Cyber-crime ?
  1. Cyber-cafe : It is a facility from where access to the internet is offered by any person in the ordinary course of business to the members of the public.
  2. Cyber-security : It means protecting information, equipment, devices computer, computer resources, communication device and information stored from unauthorised access, use,disclosure, disruption, modification or destruction.
  3. Data : It means a representation of information intended  to be processed, is being processed or has been processed in a computer system or computer network and may be in any form or stored in memory of computer.
  4. Digital-signature : It means an authentication of any electronic record by means of an electronic method.
  5. Electronic-form : It means information generated , sent, received or stored in media, magnetic, optical, computer memory, micro film, computer generated micro fiche or device.
  6. Electronic-signature : It means an an authentication of any electronic record by means of electronic technique. 
  7. Electronic-record : It means data,record or data generated image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche.

Computer related offences :

                 If any person without the permission of the owner or any  other person in charge of the computer system or the computer network :
 > accesses or secures access.
 > downloads, copies or extracts any data
 > disrupts or causes disruption
 > introduced or causes to introduce any computer containment or computer virus
 > denies or causes the of access to authorised person
 > provides any illegal assistance to facilitate access
 > charges the services availed of by a person to the account of 
    another person by tempering with or manipulation.

What is the tempering with computer source documents :

                   When any person knowingly or intentionally conceals, destroys or alters causes another to conceal, destroy or alter any computer source code is required to be kept or maintained by law.

Can someone send offensive messages through communication services ?

                No, one can not send offensive messages to the others by means of computer resource or by means of a communication device. It is an offence  and is punishable under  IT Act, 2000.These messages are any information that is offensive or has menacing character or sends false information knowingly to insult, harass,cause annoyance etc. It may be a electronic mail.

 What is identity theft ?

             When any person fraudulently or dishonestly makes use of the electronic signature, password or any other unique identification feature of any other person.  

What is the term Hacking with computer system :

               When any person with intention to cause or knowing that he is going to cause wrongful loss or damage  to the public or if any person destroys or deletes or alters any information residing  in a computer resource or diminishes its value or utility or affects it injuriously by  any means commits hacking.

 

What is violation of privacy ?

             When any person intentionally or knowingly captures, publishes or transmits the image of a private area of any person  without consent by violating privacy of that person.

What is cyber-terrorism :

             When any person with intention to threaten the utility, integrity, security or sovereignty of India or strike terror in the people or any section of the people by denying or cause the denial of access to authorised person or attempting to access without authorisation or introducing or causing to introduce any computer containment and such conduct causes or likely to cause death or injury to the person or damage to property or knowingly that such damage or disruption of supplies or services essential to the life of the community or adversely  affects or 

        Intentionally or knowingly accesses and obtains such information or data that is restricted for the security of the State or foreign relation or any information or data that is likely to cause injury to the interests of the sovereignty and integrity of India, security of the state, foreign relations, public order or morality, or in relation to contempt of the court, defamation, or incitement or to advantage to foreign nation.

 

Can someone publish or transmit obscene material in electronic form ?

              No, it is punishable under Information and Technology Act,2000. When any person publishes or transmits or causes to  publish or transmit in electronic form, any material which is lascivious or appeals to the prurient interest or it affects to deprave and corrupt persons  to read, see or hear the matter contained in it.

Who can issue directions for interception or monitoring or decryption or for blocking for public access of any information or to monitor and collect traffic data or information ?

               As per the Information and Technology Act, 2000 central Government  can authorise any Government agency in the country to monitor ,intercept,decryption or blocking  generated, transmitted or received or stored data to enhance cyber security and identification, analysis and prevention of intrusion in the country.


 Note : As per Information and Technology Act,2000, all offences with punishment three or more than three years are cognizable and offences punishable with punishment up to three years bailable. A police-officer not below the rank of inspector can investigate into the offences under this act.

                

                                
          
                

            

2 comments:

  1. A lot of people don't know the ability to use e-signatures. They tend to be more used for all kind of documents and using them is time saving and very green. Despite of all the benefits it is a must to use top security measures

    ReplyDelete
  2. Harrah's Cherokee Casino & Hotel - Mapyro
    This is a 1,207-room hotel with two 전라북도 출장마사지 full floors of luxury suites and suites. Each has access 군포 출장샵 to a 당진 출장안마 casino, 보령 출장샵 a seasonal outdoor pool, a Jacuzzi and 삼척 출장안마

    ReplyDelete