0% found this document useful (0 votes)
33 views4 pages

Module1 answers

The document defines computer crime as illegal activities conducted through electronic means, including cybercrime, cyberpunk, and cyber warfare. It lists various cybercrimes against property and organizations, discusses the rise of cybercrime in India under the ITA 2000, and categorizes cybercriminals into three groups based on their motivations. Additionally, it covers topics such as cyber defamation, password sniffing, and mail bomb techniques.

Uploaded by

gildajasmine
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views4 pages

Module1 answers

The document defines computer crime as illegal activities conducted through electronic means, including cybercrime, cyberpunk, and cyber warfare. It lists various cybercrimes against property and organizations, discusses the rise of cybercrime in India under the ITA 2000, and categorizes cybercriminals into three groups based on their motivations. Additionally, it covers topics such as cyber defamation, password sniffing, and mail bomb techniques.

Uploaded by

gildajasmine
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

1.Define computer crime.

Discuss about Cyberpunk and Cyber warfare


Ans: Computer crime definition:
• Cybercrime or computer crime is any illegal behaviour directed by meansof electronic operations
that target to security of computer system and the data processed by them.
• Crimes completed either on or with a computer
• Any illegal activity done through the internet or on the computer
• All criminal activities done using the medium of computers, the Internet, cyberspace and WWW.
• Any financial dishonesty that takes place in computer environment
• Any threats to the computer itself, such as theft of hardware or software,sabotage and demands
for ransom

• Cyberpunk: The term cyberpunk could mean something like " anarchy via machines", or "machines/
computer Rebel moment"
• The two basic aspects of cyberpunk are technology and individualism.
• It is a genre of science fiction set in a lawless subculture of oppressivesociety dominated by
computer technology.

• Cyber warfare: It is the use of computer network to disrupt the activities of a state or organization,
especially the deliberate attacking of informationsystem for strategic or military purpose.
• Cyber warfare for many people, means information Warriors unleashing vicious attacks against an
unsuspecting opponent computer networks and paralyzing nations information infrastructure.
• It refers to information resources, including communication systems that support an industry,
institution or population.
• Cyber-attacks are often presented as military forces and the internet has major implications for
espionage and warfare.

2.List the various cybercrimes against property and against organization

Ans:
cybercrimes against property and against organization
The following are the crimes against property and against organization
Cybercrime against property
1. Credit card frauds
2. Intellectual property crimes basically I P crimes include software piracy copyright infringement
trademarks violations theft of computer source codeetc.,
3. Internet time theft
Cybercrime against organisation
1. Unauthorised accessing of computer - hacking is one method of doing thisand hacking is a
punishable offence
2. Password sniffing
3. Denial-of-service attacks
4. Virus attacks dissemination of viruses
5. Email bombing or mail bombs
6. Salami attack or Salami technique
7. Logic bomb
8. Trojan horse
9. Data diddling
10. Crimes emanating from Usenet newsgroups
11. Industrial spying/Industrial espionage
12. Computer network instructions
13. Software piracy
3.Discuss cybercrime and the Indian ITA 2000
• India has the fourth highest number of Internet users in the world There are 45 million Internet
users in India, 37% of all Internet accesses from happen cybercafes and 57% of Indian Internet
users are between 18and 35 years.
• The population of educated youth is high in India.
• It is reported that compared to the year 2006, cybercrime under the Information Technology (IT)
Act recorded a whopping 50% increase in the year 2007.
• The National Crime Record Bureau (NCRB) gives the report that, 46%,were related to incidents
of cyberpornography, followed by hacking.
• In over 60% of these cases, offenders were between 18 and 30 years, according to the "Crime in
2007".
• The Indian Government is doing its best to control cybercrimes.
• For example, Delhi Police have now trained 100 of its officers inhandling cybercrime and placed
them in its Economic Offences Wing.
• The training gave to officers about computer hardware and software, computer networks comprising
data communication networks, network protocols, wireless networks and network security about 6
weeks.

• The ITA 2000 was framed after the United Nation General AssemblyResolution in January
30, 1997.
• ITA adopting the Model Law on Electronic Commerce (E-Commerce)adopted by Commission
on the United Nations International Trade Law.
• A total cybercrime was registered under the IT Act in 2007 compared to142 cases registered
2006.
• Under the IPC in to, 339 cases were recorded in 2007 compared noteworthy to 311 cases in
2006. The laws, crime details and punishment details given in table below.
Section Ref. & Chapter of Crime Punishment
Title the Act &
Title
Sec. 43 (Penalty CHAPTER Damage to Compensation for 1 crore
for damage to IX computer system,
computer) Penalties
and
Adjudicati
on
Sec. 66 CHAPTER Hacking (with Fine of 2 lakhs and
(Hacking with XI intent or imprisonment for 3 years
computer Offences knowledge)
system)
Sec. 67 CHAPTER Publication of Fine of 1 lakh
(Publishing of XI obscene material imprisonment of 5 years
information Offences in electronic form and double Conviction on
which is second offence
obscene in
electronic form
Sec. 68 (Power CHAPTER Not complying Fine up to 2 lakhs
of controller to XI with directions of imprisonment of 3 years
give directions) Offences controller.
Sec. 70 CHAPTER Attempting or Imprisonment up to 10
(Protected XI securing access to years.
system Offences computer without
his/her
knowledge,
Sec. 72 (Penalty CHAPTER Attempting or Fine up to 1 lakh and
for breach of XI securing access to imprisonment up to 2 years
confidentiality Offences computer for
and privacy) breaking
confidentiality
Sec. 73 (Penalty CHAPTER Publishing false Fine up to 1 lakh or
for publishing XI digital signature imprisonment up to 2 years
Digital Offences or both
Signature
Certificate false
in certain
particulars)
Sec. 74 CHAPTER Publication of imprisonment up to 2 years
(Publication for XI Digital Signatures and Fine up to 1 lakh
fraudulent Offences for fraudulent
purpose) purpose

4.Who are cybercriminals? Discuss the three groups of cybercriminals

Cybercriminals are those who conduct act such as child pornography; credit cardfraud, cyber stalking,
defame another online; gaining unauthorised access to acomputer system; ignoring copyright, software
licensing and Trademark protection;
overriding encryption to make illegal copies; software piracy and stealing another'sidentity to perform
criminal acts.

They can be categorised into three groups that reflect their motivation

We have three types of Cybercriminals

• Type I: Cybercriminals hungry for recognition


• Type II: Cybercriminals not interested in recognition
• Type III: Cybercriminals the insiders

Type I: Cybercriminals-Hungry for recognition

• Hobby hackers: A person who enjoys exploring the limits of what is possible in the spirit of play
full cleverness
• IT professionals: ethical hacker
• Politically motivated hackers: promote the objective of individualsgroups or Nation supporting a
variety of causes such as anti-globalizationtransitional conflict and protest.
• Terrorist organizations: cyber terrorism terrorist using the internet for attacks, large scale
destruction of computer networks.

Type II: Cybercriminals-not interested in recognition


• Psychological perverts: Express sexual Desire deviate from normal behaviour
• Financially motivated hackers (corporate espionage): make money from cyberattacks: bots for
hire; fraud through phishing information theft,spam and extortion.
• State sponsored hacking (National espionage or sabotage): Extremelyprofessional groups
working for governments.
• Organized criminals: have the ability to worm into the network of media, major
corporations and different departments.

Type III: Cybercriminals-the insiders

• Disgruntled or former employees seeking revenge


• Competing companies using employees to gain economic advantage throughthe damage for theft

5.Discuss about Cyber defamation in detail.


• Cyberdefamation occurs when defamation takes place with the help ofa computer and/or
internet.
• For example, someone publishing defamatory matter about someone's website or send emails
contain defamatory information to all friends ofthat person.
• CHAPTER XXI of the Indian Penal Code (IPC) is about the defamation.
• According IPC section 499;
• 1. It may amount to defamation to impute anything to a deceased person, if the imputation would
harm the reputation of that person if living, and isintended to be hurtful to the feelings of his family
or other near relatives.
• 2. It may amount to defamation to make an invitation concerning acompany or an association of
election of persons as such.
• 3. Imputation in the form of an alternative or expressed ironically the
amount to defamation.
• 4. No imputation is said to be harm a person's reputation and less that imputation directly or
indirectly in the estimation of the others Louis the moral or intellectual character of that person, his
cast.
• Liable is written defamation on slander is oral defamation

6.Explain password Sniffing and mail bombs techniques.


password Sniffing
• Password sniffers are program that monitor and record the name and password of a network uses as
the login at a site.
• Example keyloggers these are computer programs which one installed into a particular computer
system records all the keystrokes and send it to the attacker so the attacker can get access to user
credentials.
• With the user credentials, the attacker will login and access restricted documents
Mail bombs techniques
• It refers to sending a large number of emails to the victim to crashvictim E-mail account or
to make victim's servers crash
• computer program can be written to instruct a computer to do such taskson a repeated basis.
• The terrorism has hit the Internet in the form of Email bombing.
Here the Cybercrime repeatedly send the email to the particular personsemail ID and shut down
the entire system

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy