Page 36 - cyber law new
P. 36

Cyber Crime and Law   12.  Online gambling: There are millions of websites; all hosted on servers abroad,
                                       that offer online gambling. In fact, it is believed that many of these websites are
                                       actually fronts for money laundering. Cases of hawala transactions and money

                  Notes                laundering over the Internet have been reported.
                                  13.  Email spoofing : E-mail spoofing is e-mail activity in which the sender addresses
                                       and other parts of the e-mail header are altered to appear as though the e- mail
                                       originated from a different source. E-mail spoofing is sending an e-mail to another
                                       person in such a way that it appears that the e-mail was sent by someone else. A spoof
                                       email is one that appears to originate from one source but actually has been sent

                                       from another source. Spoofing is the act of electronically disguising one computer
                                       as another for gaining as the password system. It is becoming so common that you
                                       can no longer take for granted that the e-mail you are receiving is truly from the
                                       person identified as the sender.

                                       Email spoofing is a technique used by hackers to fraudulently send email messages
                                       in which the sender address and other parts of the email header are altered to
                                       appear as though the email originated from a source other than its actual source.
                                       Hackers use this method to disguise the actual email address from which phishing
                                       and spam messages are sent and often use email spoofing in conjunction with Web
                                       page spoofing to trick users into providing personal and confidential information.
                                  14.  Cyber Defamation" When a person publishes defamatory matter about someone

                                       on a website or sends e-mails containing defamatory information to all of that
                                       person friends, it is termed as cyber defamation.
                                  15.  Forgery: Computers, printers and scanners are used to forge counterfeit currency
                                       notes,  postage  and  revenue  stamps,  mark  sheets  etc.  These  are  made  using
                                       computers, and high quality scanners and printers.

                                  16.  Theft  of  information  contained  in  electronic  form:  This  includes  theft  of
                                       information stored in computer hard disks, removable storage media etc.
                                  17.  Email bombing: Email bombing refers to sending a large number of emails to
                                       the victim resulting in the victims email account (in case of an individual) or mail

                                       servers (in case of a company or an email service provider) crashing.
                                  18.  Internet time theft: Internet time refers to usage by an unauthorized person of the
                                       Internet hours paid for by another person.

                                  19.  Theft of computer system: This type of offence involves the theft of a computer,
                                       some part(s) of a computer or a peripheral attached to the computer.
                                  20.  Physically damaging a computer system: This crime is committed by physically
                                       damaging a computer or its peripherals.



           36   Self Learning Material
   31   32   33   34   35   36   37   38   39   40   41