You are on page 1of 5

International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 2319-4413 20

Volume 3, No. 2, February 2014

A Comprehensive Study of Cyber Law and Cyber Crimes


Manjeet Singh, Assistant Professor, IT Dept., JIMS, Kalkaji
Jacob Anwar Husain, System Administrator, IT Dept., JIMS, Kalkaji
Navneet Kumar Vishwas, System Administrator, IT Dept., JIMS, Kalkaji

ABSTRACT: I. INTRODUCTION
Cyber law is a term used to describe the legal issues Cybercrime is a criminal activity committed with
related to use of communications technology. It covers computers and/or over a network or the Internet. The
cyber crime including intellectual property, privacy, person who is involved in cyber crime is known as cyber
freedom of expression, and jurisdiction. In India, The IT criminals. These criminals generally use modern
Act, 2000 as amended by The IT (Amendment) Act, 2008 is telecommunication technology such as Internet (Chat
known as the Cyber laws which try to stop crime related to rooms, emails, notice boards and groups) and mobile
internet as well as cyberspace. To understand cyber law phones (SMS/MMS), Phishing, Email spoofing etc. The
we need to have more focus on the term crime which refers enhancement of technology the data & information theft
to all criminal activities done using the medium of also become easy, generally data related crimes committed
computers, the Internet, cyber space and the worldwide with USB Media, Bluetooth technology, wireless media as
web. Some cyber related crimes are hacking, Child well as data storage devices such as DVD, Pen Drive,
Pornography, Cyber Stalking, Denial of Service, Malware, Flash Drive, Micro chip etc.
Phishing, Information Warfare, various online theft etc.
These cyber crimes and cyber criminal are punished by So, in this topic A Comprehensive Study of Cyber Law
Indian Law i.e. Information Technology Act 2000 and IT and Cyber Crimes we focus on details on cyber crime, its
(Amendment) Act, 2008. The crime committed by cyber types and various law under IT Act 2000 and IT
criminals for many reasons such as for monetary gain, (Amendment) Act, 2008. There are some useful points
some personal benefit, harassing to victim for any which make you safety from these frauds.
reasons, destroying specific systems, data and information
theft, information warfare etc. These criminals generally
use modern telecommunication technology such as
II. OBJECTIVE
Internet (Chat rooms, emails, notice boards and groups)
and mobile phones (SMS/MMS), Phishing, Email spoofing The main objective to discuss on proposed topic i.e. A
etc. The enhancement of technology the data & Comprehensive Study of Cyber Law and Cyber Crimes
information theft also become easy, generally data related to spread the cyberspace knowledge to the human being
crimes committed with USB Media, Bluetooth technology, and try to provide safety from cyberspace fraud as well as
wireless media as well as data storage devices such as introduce some laws related to cyberspace crime.
DVD, Pen Drive, Flash Drive, Micro chip etc. Such
crimes may threaten a nations security and financial III. CYBER LAW AND RELATED CRIME
health. Issues surrounding these types of crimes have
become high-profile, particularly those surrounding Cyber law is a term used to describe the legal issues
cracking, copyright infringement, child pornography, and related to use of communications technology, particularly
child grooming. There are also problems of privacy when cyberspace which is known as Internet. It is different
confidential information is lost or intercepted, lawfully or from other laws but it covers cyber crime including
otherwise. So, best way to protect you from cyber crime is intellectual property, privacy, freedom of expression, and
to use common sense, gain IT knowledge, be prepared and jurisdiction. Cyber law is an attempt to apply laws
take precautions. designed for the physical world, to human activity on the
Internet. In India, The IT Act, 2000 as amended by The IT
Key words: (Amendment) Act, 2008 is known as the Cyber law [1]. It
Cyber law and cybercrime, Different aspects of has a separate chapter XI entitled Offences in which
cybercrime, Cybercrime and its types, An Introduction of various cyber crimes have been declared as penal offences
cyber crimes, How Can You Stay Safe from cyber punishable with imprisonment and fine.
criminals, Hacking and cracking.

i-Explore International Research Journal Consortium www.irjcjournals.org


International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 2319-4413 21
Volume 3, No. 2, February 2014

To understand cyber law we have to need more focus of pornography who are arrested are found to possess images
the crime which is refers to all criminal activities done of prepubescent children; possessors of pornographic
using the medium of computers, the Internet, cyber space images of post-pubescent minors are less likely to be
and the worldwide web. prosecuted, even though those images also fall within the
statutes [6].
IV. TYPES OF CYBER CRIME
Cyber Stalking:
Following are the some activities which come under cyber The term is used to refer to the use of the internet, e-mail,
crime i.e. or other electronic communications devices to stalk
1. Hacking another person. Stalking generally involves harassing or
2. Child Pornography threatening behavior that an individual engages in
3. Cyber Stalking repeatedly. It can be done using phone calls, leaving
4. Denial of Service written messages or objects, or vandalizing a persons
5. Dissemination of Malicious Software (Malware) property. Cyber stalking can be also defined as the
6. Phishing repeated acts of harassment or threatening behavior
7. Information Warfare of the cyber criminal towards the victim by using internet
8. Data Theft services. A study says most stalkers are using following
9. Identity Theft methods for cyber stalking:
10. Email Spoofing
11. Network Related Wrongs [2] a. Collect personal information about the victim. If the
stalker is a stranger to victim, he collects the
Hacking information from internet resources such as various
Hacking in simple terms means an illegal intrusion into a profiles the victim may have filled in while opening
computer system and/or network. There is an equivalent a chat or e-mail account or while signing an account
term to hacking which is known as cracking, but from with some website.
Indian legal perspective there is no difference between the b. The stalker may post information on any website
term hacking and cracking. Every act committed towards related to sex-services or dating services, posing as
breaking into a computer and/or network is hacking. if the victim is posting this information and invite
Hackers write or use ready-made computer programs to the people to call the victim on her telephone to
attack the target computer. Some hackers hack for obtain sexual services.
personal monetary gains, such as for stealing credit card c. Some stalkers subscribe the e-mail account of the
information or transferring money from various bank victim to innumerable pornographic and sex sites,
accounts to their own followed by withdrawal of money. because of which the victim starts receiving
They also indulge in extortion based on information indecent soliciting e-mails.
received while hacking a particular network of computer d. Some stalkers send repeated e-mails asking for
system. various kinds of favors or threaten the victim [7].

Law applicable under Information Technology Denial of Service:


(Amendment) Act, 2008, Section 43(a) [3] read with This is a technology driven cyber intrusion, where by the
section 66 is applicable and Section 379 & 406 of Indian influencer floods the bandwidth or blocks the users mails
Penal Code, 1860 also are applicable. with spam mails depriving the user, access to the Internet
and the services provided there from. A DoS Attack can be
Child Pornography: done using
Child pornography is pornography that involves a child a. Consumption of computational resources, such as
[4]. Pornography may use a variety of media including bandwidth, disk space, or central processing unit
writings, magazines, photos, sculpture, drawing, cartoon, (CPU) time.
painting, animation, sound recording, film, video, and b. Disruption of configuration information, such as
video games. Child pornography may be simulated child routing information etc.
pornography or produced with the direct involvement of c. Disruption of physical network components.
the child (also known as child abuse images Abuse of the
child occurs during the sexual acts which are recorded in Dissemination of Malicious Software (Malware):
the production of child pornography [5]. Malware, short for malicious software, is software used to
disrupt computer operation, gather sensitive information,
Legal definitions of child pornography generally include or gain access to private computer systems. It can appear
sexual images involving prepubescents, pubescent or post- in the form of code, scripts, active content, and other
pubescent minors and computer-generated images that software. In all countries it is a serious criminal offence to
appear to involve them. Most possessors of child create and distribute malware, but it continues to be

i-Explore International Research Journal Consortium www.irjcjournals.org


International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 2319-4413 22
Volume 3, No. 2, February 2014

produced for various reasons, such as demonstrating a stored in any removable storage medium, then it is data
capability or making money. theft.

Malware includes computer viruses, ransomware, worms, Identity Theft:


trojan horses, rootkits, keyloggers, dialers, spyware, Identity theft is a form of fraud or cheating of another
adware, malicious BHOs, rogue security software and persons identity in which someone pretends to be
other malicious programs which is very dangerous for someone else by assuming that persons identity, typically
Information technology [8]. in order to access resources or obtain credit and other
benefits in that persons name. Information Technology
Phishing: (Amendment) Act, 2008, crime of identity theft under
It is the act of attempting to acquire information such as Section 66-C [12], whoever, fraudulently or dishonestly
usernames, passwords, and credit card details (and make use of the electronic signature, password or any
sometimes, indirectly, money) by masquerading as a other unique identification feature of any other person
trustworthy entity in an electronic communication. known as identity theft.

Phishing is typically carried out by email spoofing or Identity theft occurs when someone uses another's
instant messaging and it often directs users to enter details personally identifying information, like their name,
at a fake website whose look and feel are almost identical identifying number, or credit card number, without their
to the legitimate one. Phishing is an example of social permission, to commit fraud or other crimes.
engineering techniques used to deceive users [9] and
exploits the poor usability of current web security Email Spoofing:
technologies. It is e-mail activity in which the sender addresses and
other parts of the e-mail header are altered to appear as
Information Warfare: though the e-mail originated from a different source [13].
It is a kind of warfare where information and attacks on E-mail spoofing is sending an e-mail to another person in
information and its system are used as a tool of warfare. such a way that it appears that the e-mail was sent by
Information warfare may include giving the enemy someone else. A spoof email is one that appears to
propaganda to convince them to give up, and denying originate from one source but actually has been sent from
them information that might lead to their resistance. another source. Spoofing is the act of electronically
disguising one computer as another for gaining as the
It is the strategy for undermining an enemys data and password system. It is becoming so common that you can
information systems, while defending and leveraging no longer take for granted that the e-mail you are receiving
ones own information edge. This type of war has no front is truly from the person identified as the sender. Email
line; potential battlefields are anywhere networked spoofing is a technique used by hackers to fraudulently
systems can be accessed-oil and gas pipelines, electric send email messages in which the sender address and other
power grids, telephone switching networks, etc [10]. parts of the email header are altered to appear as though
the email originated from a source other than its actual
Data Theft: source. Hackers use this method to disguise the actual
According to Wikipedia, Data Theft is a growing problem, email address from which phishing and spam messages are
primarily perpetrated by office workers with access to sent and often use email spoofing in conjunction with Web
technology such as desktop computers and handheld page spoofing to trick users into providing personal and
devices, capable of storing digital information such as confidential information.
flash drives, iPods, digital cameras and even Mobile
Phones. The damage Caused by data theft can be Network Related Wrongs:
considerable with todays ability to transmit very large This type of cyber crime mainly harms network system.
files via e-mail, web pages, USB devices, DVD storage Due to this activity that causes the operation of a computer
and other hand-held devices. network to be temporarily disrupted. Interference implies
something momentarily such as Denial of Service Attacks
According to Information Technology (Amendment) Act, that causes delays in data transmission by using up all
2000, crime of data theft under Section 43 (b) [11] is available bandwidth. Distributed denial of service, ping of
stated as - If any person without permission of the owner death and smurf attacks also fall under this category. Data
or any other person, who is in charge of a computer, Security Network sabotage - causing permanent damage to
computer system of computer network - downloads, a computer network such as deleting files or records from
copies or extracts any data, computer data base or storage [14].
information from such computer, computer system or
computer network including information or data held or

i-Explore International Research Journal Consortium www.irjcjournals.org


International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 2319-4413 23
Volume 3, No. 2, February 2014

V. LAW AGAINST CYBER CRIME AND Beware of emails that threaten any dire
CYBER CRIMINAL consequences should you not "verify your
Hacking - Law applicable under Information information".
Technology (Amendment) Act, 2008, Section 43(a) Do not enter personal information in a pop-up
According to Information Technology Act, 2000, screen. Providing such information may
data theft criminal punished under Section 43 (b) compromise your identity and increase the odds of
identity theft.
Identity theft comes under Information Technology
(Amendment) Act, 2008, crime of identity theft Have separate passwords for work related and non-
under Section 66-C work related accounts.
Email Spoofing tricks used by Hacker for hacking Be educated with modern technology.
and it is a cyber crime under IT Act 2008, Section
43(a) VII. CONCLUSION
Child pornography is a cyber crime which is
prevented under Child Pornography Prevention Act At the end of A Comprehensive Study of Cyber Law and
of 1996 (CPPA) Cyber Crimes we want to suggest that this type of crime
Prior to February 2013, there were no laws that and criminals must be stopped. But this is not so easy; our
directly regulate cyber stalking in India. judicial system must be providing more strong law to stop
India's Information Technology Act of 2000 (IT the crime related to cyberspace. So, we want to suggest
Act) was a set of laws to regulate the cyberspace. that be educated with modern technology and follow
However, it merely focused on financial crimes and above tips to fight with cyber crime.
neglected interpersonal criminal behaviours such as
cyberstalking (Behera, 2010; Halder & Jaishankar, VIII. REFERENCES
2008; Nappinai, 2010).
In 2013, Indian Parliament made amendments to [1] IT Amendment Act 2008, Registered No DL
the Indian Penal Code, introducing cyberstalking as (N)04/0007/2003-09
a criminal offence. http://deity.gov.in/sites/upload_files/dit/files/downl
oads/itact2000/it_amendment_act2008.pdf
[2] IGNOU PGCCL (Post Graduate Certification in
Cyber Law) Program, MIR-014 Block No.2, Unit
VI. DIFFERENT METHODOLOGIES No-5, Page No - 8 to12
USED FOR SAFETY IN CYBERSPACE [3] IT Amendment Act 2008, Registered No DL
(N)04/0007/2003-09
Keep your operating system updated/patched. Set it http://deity.gov.in/sites/upload_files/dit/files/downl
to "auto update". oads/itact2000/it_amendment_act2008.pdf, Page
Use anti-virus and anti-spyware software and keep No -06, Point No-22
them updated. [4] Finkelhor, David. "Current Information on the
Do not visit un-trusted websites or follow links Scope and Nature of Child Sexual Abuse.". Future
provided by unknown or un-trusted sources. of Children. v4 n2 (SumFall 1994): p31
Secure your transactions. Look for the "lock" icon 53.Source -
on the browser's status bar and be sure "https" http://en.wikipedia.org/wiki/Child_pornography
appears in the website's address bar before making [5] Hobbs, Christopher James; Helga G. I. Hanks, Jane
an online purchase. The "s" stands for "secure" and M. Wynne (1999). Child Abuse and Neglect: A
indicates that the communication with the webpage Clinician's Handbook. Elsevier Health Sciences.
is encrypted. p. 328. ISBN 0-443-05896-2. Source -
Be cautious about all communications you receive http://en.wikipedia.org/wiki/Child_pornography.
including those purported to be from "trusted [6] http://en.wikipedia.org/wiki/Child_pornography -
entities" and be careful when clicking links [17]. Wells, M.; Finkelhor, D.; Wolak, J.; Mitchell,
contained within those messages. K. (2007). "Defining Child Pornography: Law
Do not respond to any unsolicited (spam) incoming Enforcement Dilemmas in Investigations of Internet
e-mails. Child Pornography Possession" (PDF). Police
Do not open any attachments contained in Practice and Research 8 (3):269
suspicious emails. 282. doi:10.1080/15614260701450765.Retrieved
Do not respond to an email requesting personal 2008-07-01.
information or that ask you to "verify your [7] IGNOU PGCCL (Post Graduate Certification in
information" or to "confirm your user-id and Cyber Law) Program, MIR-014 Block No.2, Unit
password." No-5, Page No 9

i-Explore International Research Journal Consortium www.irjcjournals.org


International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 2319-4413 24
Volume 3, No. 2, February 2014

[8] http://en.wikipedia.org/wiki/Malware-[4]. [11] http://deity.gov.in/hindi/node/1210 : IT Act


Microsoft active malware threats". Malware 2000, Registered No DL 33004/2000,
Encyclopedia. Microsoft Malware Protection Cnter. CHAPTER - IX PENALTIES AND
Retrieved 2013-08-26 ADJUD1CATION Page No - 15
[9] http://en.wikipedia.org/wiki/Phishing -[7]. Jsang, [12] IT Amendment Act 2008, Registered No DL
Audun et al."Security Usability Principles for (N)04/0007/2003-09
Vulnerability Analysis and Risk Assessment." http://deity.gov.in/sites/upload_files/dit/files/downl
(PDF). Proceedings of the Annual Computer oads/itact2000/it_amendment_act2008.pdf, Page
Security Applications Conference 2007 No -10, Section- 66C
(ACSAC'07). Retrieved 2007. [13] http://en.wikipedia.org/wiki/Spoofing_attack
[10] IGNOU PGCCL (Post Graduate Certification in [14] IGNOU PGCCL (Post Graduate Certification in
Cyber Law) Program, MIR-014 Block No.2, Unit Cyber Law) Program, MIR-014 Block No.2, Unit
No-5, Page No 11 No-5, Page No 11&12.

i-Explore International Research Journal Consortium www.irjcjournals.org

You might also like