2. CYBER CRIME ~
In Simple language, we can define cyber crime,
that it is an act, against the law, wherein computer
is either a tool or a target both.
It involves theft, frauds, which has also given the
origin to a range of new age crimes that are
addressed by the Information Technology Act
2000.
3. WE CAN CATEGORIZE CYBER CRIME IN 2
WAYS ~
1. The computer as a target :- using a
computer to attack other computers.
Ex. Hacking, virus/worms.
2. The computer as weapon :- using a computer
to commit real world crimes.
Ex. Cyber terrorism, credit cards frauds.
4. SOME EXAMPLES OF CYBER CRIMES ~
Unauthorized access & Hacking :
Unauthorized access would therefore mean
any kind of access without the permission
of either the owner or the person in charge
of a computer system or computer network.
Every act committed towards breaking into
a computer or network is hacking. Hackers
use ready-made computer programs to
attack the target computer.
5. TROJAN ATTACK :
The program that act like something useful
but do the things that are quiet damping. The
programs of this kind are called as trojans. It
is popular from the name trojan horse
TCP/IP protocol is the usual protocol type
used for communications, but some functions
of the trojan use the UDP protocol as well.
6. WORMS AND VIRUSES :
A program that has capability to infect other
programs and make copies of itself and
spread into other programs is called virus.
Programs that multiply like viruses but spread
from computer to computer are called as
worms.
7. CYBER LAW
Cyber Law is the law governing cyber space.
Cyber space is a very wide term and includes
computers, networks, software, data storage
devices.
Law holds the rules of conduct :
That have been approved by the government,
which are in force over a certain territory, and
which must be obeyed by all persons on that
territory.
8. NEED FOR CYBER LAW
Cyberspace is an limitless dimension that is
impossible to govern and regulate using
conventional law.
Cyberspace is absolutely open for participation
by all.
9. A software source code worth crores of rupees or a
movie can be pirated across the globe within hours of
their release.
Hence, to stop this type of crime and to govern the
cyber space, various cyber laws were made.
11. THE INFORMATION TECHNOLOGY ACT (2000)
The primary source of cyber law in India is the
Information Technology Act, 2000 (IT Act) which
came into force on 17 October 2000.
The primary purpose of the Act is to provide legal
recognition to electronic commerce and to facilitate
the filing of electronic records with the Government.
12. The IT act also penalizes various cyber
crimes
and provides strict punishments
(imprisonment terms upto 10 years and
compensation up to rs 1 crore).
INFORMATION TECHNOLOGY (CERTIFYING
AUTHORITY) REGULATIONS, 2001 came into
force on 9 july 2001. They provide further
technical standards and procedures to be
used by a Certifying Authority.
13. Two important guidelines relating to certifying
authorities were issued :
1.
The first, are the guidelines for submission of
application for license to operate as a
certifying authority under the IT act. These
guidelines were issued on 9th july 2001.
2.
Next were the guidelines for submission of
certificates and certification lists to the
controller of certifying authorities for publishing In
national repository of digital certificates. These
were issued on 16th december 2002.