Page 36 - cyber law new
P. 36
Cyber Crime and Law 12. Online gambling: There are millions of websites; all hosted on servers abroad,
that offer online gambling. In fact, it is believed that many of these websites are
actually fronts for money laundering. Cases of hawala transactions and money
Notes laundering over the Internet have been reported.
13. Email spoofing : E-mail spoofing is e-mail activity in which the sender addresses
and other parts of the e-mail header are altered to appear as though the e- mail
originated from a different source. E-mail spoofing is sending an e-mail to another
person in such a way that it appears that the e-mail was sent by someone else. A spoof
email is one that appears to originate from one source but actually has been sent
from another source. Spoofing is the act of electronically disguising one computer
as another for gaining as the password system. It is becoming so common that you
can no longer take for granted that the e-mail you are receiving is truly from the
person identified as the sender.
Email spoofing is a technique used by hackers to fraudulently send email messages
in which the sender address and other parts of the email header are altered to
appear as though the email originated from a source other than its actual source.
Hackers use this method to disguise the actual email address from which phishing
and spam messages are sent and often use email spoofing in conjunction with Web
page spoofing to trick users into providing personal and confidential information.
14. Cyber Defamation" When a person publishes defamatory matter about someone
on a website or sends e-mails containing defamatory information to all of that
person friends, it is termed as cyber defamation.
15. Forgery: Computers, printers and scanners are used to forge counterfeit currency
notes, postage and revenue stamps, mark sheets etc. These are made using
computers, and high quality scanners and printers.
16. Theft of information contained in electronic form: This includes theft of
information stored in computer hard disks, removable storage media etc.
17. Email bombing: Email bombing refers to sending a large number of emails to
the victim resulting in the victims email account (in case of an individual) or mail
servers (in case of a company or an email service provider) crashing.
18. Internet time theft: Internet time refers to usage by an unauthorized person of the
Internet hours paid for by another person.
19. Theft of computer system: This type of offence involves the theft of a computer,
some part(s) of a computer or a peripheral attached to the computer.
20. Physically damaging a computer system: This crime is committed by physically
damaging a computer or its peripherals.
36 Self Learning Material