Page 29 - cyber law new
P. 29
17MCSC09 CYBER SECURITY AND CYBER LAW
Cyber Defamation
Any derogatory statement, which is designed to injure a person's business or reputation,
constitutes cyber defamation. Defamation can be accomplished as libel or slander. Cyber Notes
defamation occurs when defamation takes place with the help of computers and / or
the Internet. E.g. someone publishes defamatory matter about someone on a website or
sends e-mails containing defamatory information to all of that person’s friends.
Trojan Attack
ATrojan, the program is aptly called an unauthorized program which functions from inside
what seems to be an authorized program, thereby concealing what it is actually doing.
Forgery
Counterfeit currency notes, postage and revenue stamps, mark sheets etc. can be forged
using sophisticated computers, printers and scanners. It is very difficult to control such
attacks. For e.g. across the country students buy forged mark sheets for heavy sums to
deposit in college.
Financial Crimes
This would include cheating, credit card frauds, money laundering etc. such crimes are
punishable under both IPC and IT Act. A leading Bank in India was cheated to the extent
of 1.39 crores due to misappropriation of funds by manipulation of computer records
regarding debit and credit accounts.
Internet Time Theft
This con notes the usage by an unauthorized person of the Internet hours paid for by
another person. This kind of cybercrime was unheard until the victim reported it. This
offence is usually covered under IPC and the Indian Telegraph Act.
Virus/Worms Attack
Virus is a program that attaches itself to a computer or a file and then circulates to other
files and to other computers on a network. They usually affect the data on a computer,
either by altering or deleting it. Worms, unlike viruses do not need the host to attach
themselves to. They merely make functional copies of themselves and do this repeatedly
till they eat up all the available space on a computer's memory.
E-mail Spoofing
It is a kind of e-mail that appears to originate from one source although it has actually
been sent from another source. Such kind of crime can be done for reasons like defaming
a person or for monetary gain etc. E.g. if A sends email to B’s friend containing ill about
Self Learning Material 29