Cyber laws in India regulate criminal activities that take place online such as hacking, fraud, and intellectual property violations. The need for cyber laws arose because the anonymous internet can enable many criminal acts. The Information Technology Act of 2000 is the primary law governing cyber crimes and aims to provide a legal framework for electronic transactions and records. It recognizes electronic documents as legally valid and aims to promote e-commerce.
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
Cyber laws
1.
2. CYBER LAWS
It involves criminal activities that are traditional in
nature,
Such as theft, fraud, forgery, defamation and mischief,
all of which are subject to the Indian Penal Code.
3. Cyber crimes in two ways
Computer as a Target :-using a computer to attack
other computers.
e.g. Hacking, Virus/Worm attacks, DOS attack etc.
Computer as a weapon :-using a computer to commit
real world crimes.
e.g. Cyber Terrorism, IPR violations, Credit card
frauds, etc.
4. Need for Cyber law in India
Internet could transform itself into an all pervading
revolution which could be misused for criminal
activities and which required regulation.
Today, there are many disturbing things happening
in cyberspace.
Due to the anonymous nature of the Internet, it is
possible to engage into a variety of criminal
activities with people with intelligence,
Have been grossly misusing this aspect of the Internet
to perpetuate criminal activities in cyberspace.
Hence the need for Cyber laws in India.
5. Technical Aspects
Technological advancements have created new
possibilities for criminal activity, in particular the
criminal misuse of information technologies such as
a. Unauthorized access & Hacking
b. Trojan Attack
c. Virus and Worm attack
d. E-mail & IRC related crimes
e. Denial of Service attacks
6. Unauthorized access & Hacking
Instructing/communicating with the logical,
arithmetical/Computer network.
Hackers write or use ready-made computer programs
to attack the target computer.
Some hackers hack for personal monetary gains,
such as to stealing the credit card information,
transferring money from various bank accounts to
their own account followed by withdrawal of money.
By hacking web server taking control on another
persons website called as web hi-jacking.
7. Trojan Attack
Quiet damping, these programs of this kind are called
as Trojans.
The name Trojan Horse is popular.
Trojans come in two parts, a Client part and a Server
part.
TCP/IP protocol is the usual protocol type used for
communications, but some functions of the trojan use
the UDP protocol as well.
8. Virus and Worm attack
Capability to infect other programs and make copies
of itself and spread into other programs is called
virus.
Programs that multiply like viruses but spread from
computer to computer are called as worms.
9. Denial of Service attacks
Computer resource with more requests than it can
handle.
This causes the resource to crash thereby denying of
service to authorized users.
Eg: attempts to "flood" a network, thereby
preventing legitimate network traffic
Attempts to disrupt connections between two
machines, thereby preventing access to a service
Attempts to prevent a particular individual from
accessing a service
10. E-mail & IRC related crimes
1. Email spoofing Email that appears to have been originated
from one source when it was actually sent from another source.
2. Email Spamming sending email to thousands and
thousands of users - similar to a chain letter.
3. Sending malicious codes through email E-mails are used to
send viruses, Trojans etc through emails as an attachment or by
sending a link of website which on visiting downloads
malicious code.
4. Email bombing E-mail "bombing" is characterized by
abusers repeatedly sending an identical email message to a
particular address.
5. Sending threatening emails
6. Email frauds
11. Importance of Cyber law
It touches almost all aspects of transactions and
activities on and concerning the Internet, the World
Wide Web and Cyberspace.
Initially, Cyber laws is a very technical field and that it
does not have any bearing to most activities in
Cyberspace.
Whether we realize it or not, every action and every
reaction in Cyberspace has some legal and Cyber legal
perspectives.
12. IT Act of India 2000
Last Updated on: Aug 19, 2013 10:27 PM(IT Act of India
2000)
In May 2000, both the houses of the Indian Parliament
passed the Information Technology Bill in August 2000 and
came to be known as the Information Technology Act,
2000.
Cyber laws are contained in the IT Act, 2000.
This Act aims to provide the legal infrastructure for e-
commerce in India
IT Act, 2000 shows the legal framework for all electronic
records and other activities carried out by electronic
means.
It show the legal validity and enforceability