Professional Documents
Culture Documents
2 Cyber-stalking
In very general terms, stalking refers to harassing or
threatening behavior that an individual engages in
repeatedly towards another person.
Stalking can be defined as a wilful course of conduct
involving repeated or continuing harassment of another
individual that actually causes the victim to fell terrorized,
frightened, threatened, harassed and that would cause a
reasonable person to feel so.
Cyber-stalking is a kind of online harassment in which the
stalkers follow a victims movements across the internet by
posting messages (sometimes threatening) on the bulleting
board generally used by the victim, entering the chat
rooms frequented by the victim, constantly bombarding the
victim with online message, emails etc for harassment.
It is very similar to harassing emotionally blackmailing
through letters.
4. Defamation
It is an act of imputing any person with an intention
to defame him in the society generally or to cause
him to be shunned or avoided or the expose him to
hatred, contempt or ridicule.
Cyber defamation is same as conventional
defamation except the involvement of a virtual
medium
Defamation is defined as an intentional false
communication, either published or publicly spoken,
that injures anothers reputation or good name.
Defamation includes the common law of torts of
libel (involving written or printed statement) and
slander (involving oral statements).
6.Computer Vandalism
Vandalism means deliberately destroying or
damaging property of another
Thus cyber vandalism means destroying or
damaging the data when a network service is
stopped or disrupted.
It may include with in its purview any kind of
physical harm done to the computer of any person
These acts may take the form of the theft of a
computer, some part of a computer or a peripheral
attached to the computer.
Malicious Software Internet-based software or
programs are also there which are used to disrupt
a network.
7.Transmitting virus/worms
Viruses are programs that attach themselves to a
computer or a file and then circulate themselves to
other files and to other computers on a network.
They usually alter or delete the data available on a
computer.
Worms are different from the viruses as they do
not need to attach themselves to a computer.
Worms are different from the viruses as they do
not need to attach themselves to a computer.
They create functional copies of themselves which
is turn create even more copies and eventually
swamp the system by eating up all the available
space on a computers memory.
10.Trafficking
Trafficking may assume different forms. It
may be trafficking in drugs, human beings,
arms weapons etc. These forms of
trafficking are going unchecked because
they are carried on under pseudonyms.
Trafficking in the cyberspace is also a
gravest crime. A racket was busted in
Chennai where drugs were being sold under
the pseudonym of honey.
In todays world, buying a child for sex online
can be just as easy as selling your old couch
or posting an updated resume.
12.Phishing
It is one of the forms of identify theft.
This involves sending fake emails by hackers which are
covered by the illusion that the communication is
legitimate and is from some hank or financial institution.
These fake emails ask users to surrender their sensitive
information related to their bank account or credit/debit
card.
Once gained access, hackers make use of the information
either to gain access into users account online and
transfer money.
CASES
UTI Bank Ahmadabad Case
ICICI Bank case
EXAMPLES
Domain Names
www.microsoft.com
www.google.com
www.tcs.com
Top Level Domains(TLDs)
Com used for commercial and personal sites
Org used by Non-profit/charitable
organization
Gov used by government organization.
Against
Against
Against
Against
Individual.
Organization.
government.
society at Large.
Cyber forensics
Cyber forensics is the branch of digital forensic science
which uses scientific processes of identification,
acquisition, authentication, analysis, documentation and
preservation of digital evidences involved in cyber
crimes committed using digital systems.
Computer forensics requires specialized expertise and
tools at goes above and beyond the normal data
collection and preservation techniques available to end
users or system support personnel.
It is the art and science of applying computer science to
conduct a systematic inspection of the computer systems
and its contents to find evidence or supportive evidence
of a civil wrong or a criminal act.