Page 29 - cyber law new
P. 29

17MCSC09   CYBER SECURITY AND CYBER LAW








           Cyber Defamation

           Any derogatory statement, which is designed to injure a person's business or reputation,
           constitutes cyber defamation. Defamation can be accomplished as libel or slander. Cyber   Notes
           defamation occurs when defamation takes place with the help of computers and / or
           the Internet. E.g. someone publishes defamatory matter about someone on a website or
           sends e-mails containing defamatory information to all of that person’s friends.


           Trojan Attack
           ATrojan, the program is aptly called an unauthorized program which functions from inside
           what seems to be an authorized program, thereby concealing what it is actually doing.


           Forgery
           Counterfeit currency notes, postage and revenue stamps, mark sheets etc. can be forged
           using sophisticated computers, printers and scanners. It is very difficult to control such
           attacks. For e.g. across the country students buy forged mark sheets for heavy sums to
           deposit in college.


           Financial Crimes
           This would include cheating, credit card frauds, money laundering etc. such crimes are
           punishable under both IPC and IT Act. A leading Bank in India was cheated to the extent

           of 1.39 crores due to misappropriation of funds by manipulation of computer records
           regarding debit and credit accounts.

           Internet Time Theft

           This con notes the usage by an unauthorized person of the Internet hours paid for by
           another person. This kind of cybercrime was unheard until the victim reported it. This
           offence is usually covered under IPC and the Indian Telegraph Act.

           Virus/Worms Attack

           Virus is a program that attaches itself to a computer or a file and then circulates to other
           files and to other computers on a network. They usually affect the data on a computer,
           either by altering or deleting it. Worms, unlike viruses do not need the host to attach
           themselves to. They merely make functional copies of themselves and do this repeatedly
           till they eat up all the available space on a computer's memory.

           E-mail Spoofing

           It is a kind of e-mail that appears to originate from one source although it has actually
           been sent from another source. Such kind of crime can be done for reasons like defaming

           a person or for monetary gain etc. E.g. if A sends email to B’s friend containing ill about

                                                                                        Self Learning Material 29
   24   25   26   27   28   29   30   31   32   33   34