Page 30 - cyber law new
P. 30

Cyber Crime and Law  him by spoofing B’s email address, this could result in ending of relations between B
                                  and his friends.

                                  Email Bombing
                  Notes           Email bombing means sending large amount of mails to the victims as a result of which

                                  their  account  or  mail  server  crashes.  The  victims  of  email  bombing  can  vary  from

                                  individuals to companies and even the email service provider.

                                  Salami Attack
                                  This is basically related to finance and therefore the main victims of this crime are the
                                  financial institutions. This attack has a unique quality that the alteration is so insignificant

                                  that in a single case it would go completely unnoticed. E.g. a bank employee inserts a
                                  programme whereby a meager sum of ` 3 is deducted from customers account. Such a
                                  small amount will not be noticeable at all.

                                  Web Jacking

                                  This term has been taken from the word hijacking. Once a website is web jacked the
                                  owner of the site loses all control over it. The person gaining such kind of an access is
                                  called a hacker who may even alter or destroy any information on the site. Rehabilitation

                                  1.21  Misuse of Technology in the form of Cyber Crime


                                  The following offences are defined by the Convention: illegal access, illegal interception,
                                  data interference, system interference, misuse of devices, computer- related forgery,
                                  computer-related fraud, offences related to child pornography, and offences related to
                                  copyright and neighboring rights. It also sets out such procedural law issues as expedited
                                  preservation of stored data, expedited preservation and partial disclosure of traffic data,
                                  production order, search and seizure of computer data, real-time collection of traffic
                                  data, and interception of content data.


                                  1.22  Cyber Crime in Modern Society


                                  Today, criminals that indulge in cybercrimes are not driven by ego or expertise. Instead,
                                  they want to use their knowledge to gain benefits quickly. They are using their expertise

                                  to steal, deceive and exploit people as they find it easy to earn money without having
                                  to do an honest day’s work.
                                       Cybercrimes have become a real threat today and are quite different from old-
                                  school crimes, such as robbing, mugging or stealing. Unlike these crimes, cybercrimes
                                  can be committed single handedly and does not require the physical presence of the

                                  criminals. The crimes can be committed from a remote location and the criminals need

           30   Self Learning Material
   25   26   27   28   29   30   31   32   33   34   35