CYBER CRIME : THE NEW AGE EVIL
The term ‘cyber crime’ seems a misnomer and has nowhere been clearly defined in any statute /Act passed or enacted by the Indian Parliament. Cyber Crime can be broadly defined as “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes” There is apparently no distinction between cyber and conventional crime. However, demarcation lies in the involvement of the medium mostly virtual one like computers and sometimes electronic such as mobile phones, in cyber crimes.
In the first place, let us see few causes that make cyber crimes possible.
1. Storage of data in comparatively small space on ...view middle of the document...
The reason may be to fulfil their political bias, fundamentalism, etc. The Pakistanis are said to be one of the best quality hackers in the world. They mainly target the Indian government sites with the purpose to fulfil their political objectives.
3. Professional hackers / crackers: Their work is motivated by the lure of easy money. These kinds of hackers are mostly employed to hack the site of the rivals and get credible, reliable and valuable information.
4. Discontented employees : This group include those people who have been either sacked by their employer or are dissatisfied with their employer. To avenge they normally hack the system of their employee
Some of the common ways of committing Cyber Crimes are as below.
1. Unauthorized access to computer systems or networks: This is normally called hacking but can be beyond hacking wherein the criminal uses official routes to gain access but with a ulterior motive.
2. Theft of information contained in electronic form- : This includes information stored in computer hard disks, removable storage media etc. Theft may be either by appropriating the data physically or by tampering them through the virtual medium.
3. Email bombing : This kind of activity refers to sending large numbers of mail to the victim, which may be an individual or a company or even mail servers there by ultimately resulting into crashing.
4. Data diddling : This kind of an attack involves altering raw data just before a computer processes it and then changing it back after the processing is completed.
5. Salami attacks : This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed. Eg. the Ziegler case wherein a logic bomb was introduced in the bank’s system, which deducted 10 cents from every account and deposited it in a particular account.
6. Virus / worm attacks : Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Unlike viruses, the worms slowly eat up the entire data.
7. Trojan attacks : This term has its origin in the word ‘Trojan horse’. In software field this means an unauthorized programme, which passively gains control over another’s system by representing itself as an authorised programme. The most common form of installing a Trojan is through e-mail.
8. Web jacking- In these kinds of offences the hacker gains access and control over the web site of another. He may even mutilate or change the information on the site. This may be done for fulfilling political objectives or for money. Eg. recently the site of MIT (Ministry of Information Technology) was hacked by the Pakistani hackers and some obscene matter was...