Unit 3 - Cyber Security
Unit 3 - Cyber Security
Unit 3 - Cyber Security
Tech
Subject Name: Cyber Security
Subject Code: CS-503
Semester: 5th
Downloaded from www.rgpvnotes.in
Unit-3
Topics to be covered
UNIT 3
Cyber Crime and Criminal justice: Concept of Cyber Crime and the IT Act, 2000, Hacking, Teenage Web
Vandals, Cyber Fraud and Cheating, Defamation, Harassment and E-mail Abuse, Other IT Act Offences,
Monetary Penalties, jurisdiction and Cyber Crimes, Nature of Criminality, Strategies to tackle Cyber Crime
and Trends.
-------------------------------------------------------------------------------------------------------------------------------------------
Cyber Crime- Cyber Crime, or computer oriented crime, is crime that involves a computer and a
network. The computer may have been used in the commission of a crime, or it may be the target.
Cybercrime is a Offences that are committed against individuals or groups of i individuals with
a criminal motive to intentionally harm the reputation of the victim or cause physical or mental
harm, or loss, to the victim directly or indirectly, using modern telecommunication networks
such as Internet (networks including but not limit end to Chat rooms, emails, notice
boards and groups) and mobile phones (Bluetooth/SMS/MMS).Cybercrime may threaten a
person or a nation's security and financial health. Issues surrounding these types of crimes have
become high - profile, particularly those surrounding hacking, copyright infringement,
unwarranted mass-surveillance, Sextortion, child pornography, a n d child grooming. There arealso
problems of privacy when confidential information is intercepted or disclosed, lawfully or otherwise.
IT Act, 2000-An Act to provide legal recognition for transactions carried out by means of
electronic data interchange and other means of electronic communication, commonly referred
to as electronic commerce, which involve the use of alternatives to paper-based methods of
communication and storage of information, to facilitate electronic filing of documents with the
Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, 1872,
the Banker’s Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters
connected therewith or incidental thereto. Cybercrimes are a new class of crimes which are increasing day
by day due to extensive use of internet these days. To combat the crimes related to internet The
Information Technology Act, 2000 was enacted with prime objective to create an enabling environment
for commercial use of I.T. The IT Act specifies the acts which have been made punishable. The Indian
Penal Code, 1860 has also been amended to take into its purview cybercrimes. The various offenses
related to internet which have been made punishable under the IT Act and the IPC are enumerated below:
Cybercrimes under the IT Act
Tampering with Computer source documents - Sec.65
Hacking with Computer systems, Data alteration - Sec.66
Publishing obscene information - Sec.67
Un-authorized access to protected system Sec.70 Breach of Confidentiality and Privacy - Sec.72
Publishing false digital signature certificates - Sec.73
Cyber Crimes under IPC and Special Laws
Sending threatening messages by email - Sec 503 IPC
Sending defamatory messages by email - Sec 499 IPC
Forgery of electronic records - Sec 463 IPC
Bogus websites, cyber frauds - Sec 420 IPC
Email spoofing - Sec 463 IPC
Web-Jacking - Sec. 383 IPC
E-Mail Abuse - Sec.500 IPC
Cyber Crimes under the Special Acts
Online sale of Drugs under Narcotic Drugs and Psychotropic Substances Act
Page no: 1 Get real-time updates from RGPV
Downloaded from www.rgpvnotes.in
Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified
weaknesses. They may also perform penetration testing and vulnerability assessments.
Ethical hackers must abide by the following rules.
Get written permission from the owner of the computer system and/or computer network
before hacking.
Protect the privacy of the organization been hacked.
Transparently report all the identified weaknesses in the computer system to the organization.
Inform hardware and software vendors of the identified weaknesses.
Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The
intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.
Grey hat: A hacker who is in between ethical and black hat hackers. He/shebreaks into computer
systems without authority with a view to identify weaknesses and reveal them to the system owner.
Script kiddies: A non-skilled person who gains access to computer systems using already made tools.
Hacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. This is usually
done byhijacking websites and leaving the message on the hijacked website.
Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers.
Ethical Hacking is identifying weakness in computer systems and/or computer networks and coming
withcountermeasures that protect the weaknesses.
Cyber Fraud and Cheating-It means the person who is doing the act of cyber-crime i.e. stealing password
and data storage has done it with having guilty mind which leads to fraud and cheating.
Defamation-The offense of injuring a person's character, fame, or reputation by false and malicious
statements. Any derogatory statement, which is designed to injure aperson’s business or
reputation, constitutes cyber defamation. Defamation can be accomplished as libel or slander. Cyber
defamation occurs when defamation takes place with the help of computers and / or the
Internet. E.g. Someone publishes defamatory matter about someone on a website or sends e-mails
containing defamatory information to all of that person’s friends.
E-mail Abuse-Email Abuse, also known as junk email, is a type of electronic spam where unsolicited
messages are sent by email. Many email spam messages are commercial in nature but may also contain
disguised links that appear to be for familiar websites but in fact lead to phishing web sites or sites that
are hosting malware. Spam email may also include malware as scripts or other executable file
attachments (Trojans).
Other IT Act Offences-The offences included in the IT Act 2000 are as follows:
Tampering with the computer source documents.
Hacking with computer system.
Publishing of information which is obscene in electronic form.
Power of Controller to give directions
Directions of Controller to a subscriber to extend facilities to decrypt information
Protected system
Penalty for misrepresentation
Penalty for breach of confidentiality and privacy
Penalty for publishing Digital Signature Certificate false in certain particulars
Publication for fraudulent purpose
Act to apply for offence or contravention committed outside India
Confiscation
Penalties or confiscation not to interfere with other punishments.
Power to investigate offences.
Electronic Governance- In this era of computer where every word is getting prefixed by word ‘E’,
Government of India is also not lacking behind and to provide its services to the citizens at their
fingertips the Government is also turning in E- Governance. E-Governance is nothing but providing
Government Services cheaper, faster and efficiently to thecitizens through internet and computer. The
Information Technology Act, 2000 gives recognition to the Electronic Governance. Chapter III, Section 4
to Section 10-A, of the Act provides for the provisions regarding Electronic Governance. Section 4 and 5
Page no: 3 Get real-time updates from RGPV
Downloaded from www.rgpvnotes.in
gives Legal Recognition to electronic records and electronic signatures. Section 6 of the Act
authenticates use of electronic record and electronic signatures in Government and its agencies.
The aim electronic government is to ensure transparency in Government. It also makes the Government
accessible to the citizen residing in the most remote village of the country.
Compounding of Offences
As per Section 77-A of the I. T. Act, any Court of competent jurisdiction may compound offences, other
than offences for which the punishment for life or imprisonment for a term exceeding three years has
been provided under the Act.
environment - one's diet and even the environment. While, the aspect of environment is still
included in the theory of individual criminality, it is still geared towards the study of theindividual.
The concept of a born criminal can be traced with the studies that show the importance and power of
oneself in the development of one’s criminality. Being a born criminal is also equated to being
hereditary. A person is more likely to become criminal is it is already in their blood to become one. In
heredity, it includes the elements like physical appearance, modern genetics theory as well as learning
theory.