Page 30 - cyber law new
P. 30
Cyber Crime and Law him by spoofing B’s email address, this could result in ending of relations between B
and his friends.
Email Bombing
Notes Email bombing means sending large amount of mails to the victims as a result of which
their account or mail server crashes. The victims of email bombing can vary from
individuals to companies and even the email service provider.
Salami Attack
This is basically related to finance and therefore the main victims of this crime are the
financial institutions. This attack has a unique quality that the alteration is so insignificant
that in a single case it would go completely unnoticed. E.g. a bank employee inserts a
programme whereby a meager sum of ` 3 is deducted from customers account. Such a
small amount will not be noticeable at all.
Web Jacking
This term has been taken from the word hijacking. Once a website is web jacked the
owner of the site loses all control over it. The person gaining such kind of an access is
called a hacker who may even alter or destroy any information on the site. Rehabilitation
1.21 Misuse of Technology in the form of Cyber Crime
The following offences are defined by the Convention: illegal access, illegal interception,
data interference, system interference, misuse of devices, computer- related forgery,
computer-related fraud, offences related to child pornography, and offences related to
copyright and neighboring rights. It also sets out such procedural law issues as expedited
preservation of stored data, expedited preservation and partial disclosure of traffic data,
production order, search and seizure of computer data, real-time collection of traffic
data, and interception of content data.
1.22 Cyber Crime in Modern Society
Today, criminals that indulge in cybercrimes are not driven by ego or expertise. Instead,
they want to use their knowledge to gain benefits quickly. They are using their expertise
to steal, deceive and exploit people as they find it easy to earn money without having
to do an honest day’s work.
Cybercrimes have become a real threat today and are quite different from old-
school crimes, such as robbing, mugging or stealing. Unlike these crimes, cybercrimes
can be committed single handedly and does not require the physical presence of the
criminals. The crimes can be committed from a remote location and the criminals need
30 Self Learning Material