In this post, the author has explained the different types of Cyber Crime and the various legal aspects related to it.
As we are in the continuous race in strengthening the economy and to compete with other developed countries. In this race the evolution of technology has a greater impact in the developing world to compete with other nations, technologies like computers, email, the internet were the greatest boom in the corporate sector and government work as it was easy and continence to transfer data and another source of medium. As an advance in technologies which is so radicle that not only change the way that society interacts, it also has a fundamental effect on the behavior of criminal element within the society.
As the computer system and Internet has emerged in the 21st Century, the world moves towards the digitalization and as its drastic effect the cybercrime has emerged, the first-ever cybercrime were committed before the internet came into the existence which involve the theft of data and other various types of cybercrime have emerged. The cyber thief usually hacks the system and leaks the necessary information which would cause huge loss to the company. There are some preventive measures to avoid cyber theft and due to an increase in the number of the cybercrime act was set under the “IT Act, 2000” (Information Technology Act 2000) these acts came into existence in India which deals with the cybercrime and electronic commerce. It is usually based on the UNCITRAL Model Law on International Commercial Arbitration which is recommended by the General Assembly of United Nation.
What is Cyber Crime?
Cybercrime is the criminal activity that takes place in the cyberspace, and the most common cyber activity is hacking where a hacker hacks the account and steal all the private information of the user and sell those data which basically involve stealing identities, and important information, violating the privacy, and committing fraud. Hacking is the most common cybercrime that was roughly started in the 1960’s.
According to the Identical Theft Resource Centre, more than 220 million Facebook user's phone numbers and usernames were found on sale on the Dark Web in the year 2018, more than 30% to 40% are affected by cybercrime. Due to this consequence companies have invested more than $1 trillion on cybersecurity. There are some companies that offer cybersecurity to firms like Banking, Insurance Company, Finance Company.
Types of Cyber Security
Cyber-attack has come a long way from sending virus by emails (as it exists today also). Cybercriminals devise various strategies to attack various computer and system. As the criminal has adapted modern method according to the changing time, so to avert the breach of security IT security expert are there whose job is to keep our data safe.
Deceiving the person in order to get important data or any information through which they can access to their personal information and harm them monetarily or in any other way. In the recent case of Poona Auto Anillaries Pvt. Ltd. V. Punjab National Bank HQ New Delhi in this case a fraudster has transferred Rs. 80.10 Lakh from Mathur’s (owner of Poona Auto Analliries) account to PNB, Maharashtra’s IT secretary Rajesh Agrawal has ordered to PNB (Punjab National Bank) to pay Rs. 45 lakhs to the complainant Mr. Mathur.
A hacker is a person who finds and exploits the breach of system and enter in the system or network to gain access. These Hackers are usually the skilled computer programmers who know the minute detail of programs and know-how to breach the system, with these technical knowledge spread bugs and viruses to enter into another network and misuse the information. the target of most of the hackers is to attack on the corporate body and government institution.
It is the specific type of crime where hackers attack the person’s, personal data including password, debit card, credit card details, data about the bank accounts, social security, and other sensitive information. In other word, we can say that it is basically the use of someone else’s identity which is being used for the personal benefit to obtain monetary gain. According to the Norton Life Lock report which says that in every 10 persons out of every 4 persons has suffered identity theft (39 percent) in India. It has found the impact of identity theft more between the age group of 18-39 years, the data tells that a greater number of young adults are influenced by identity theft.
It is a malicious program that self-replicates by copying itself to another programme. The purpose of creating the virus is to infect the computer with a virus and get access to their data and sensitive information. Hackers design viruses with malicious intention and prey on online users to access their device and gather the necessary information or to harm their device through viruses. Viruses usually spread fast and can transfer to the movable device.
Cyberbullying is also known as cyber harassment. Cyberharassment usually takes place in the virtual platform, and most of today’s youth have suffered cyber harassment. In simple words using any virtual platform to harass, threaten, embarrass or target any person by sending aggressive or rude text and tweets or by posting any personal information, picture edit or video design to hurt or embarrass someone else. The preventive measure has been taken against cyberbullying in India by enacting laws, IT Act, Sec.66(A) deals with while communication sending an offensive messages. Sec.66(D) it deals with cheating by using any electronic resources, Sec.66(E) come under violation of the privacy of the individual, 67(B) it deals with the punishment for publishing to child sexuality content and Sec.72 it deals with the breach of confidentiality and privacy.
Cyberstalking is basically using of any electronics means to stalk a particular individual or any group of people, most of the victim of these act are mainly women’s and children they have usually suffered by cyberstalking. Cyberstalking is basically form of cyberbullying where the people stalk the unknown or maybe known person in virtual world and continuously follow a victim over a long period of time, and further tries to text the victim and try to make blank phone calls continuously which may turn into harassment, It is a punishable offence.
It is basically the copying of the original content and creating duplicate, and making it available for the people which is infringement of the copyright. In other word taking copyright content virtually taking any prior permission, such as music, movies, software and books, people can access these by the medium of torrent these are the illegal source and punishable offence.
https://www.edureka.co/blog/what-is-network-security/  http://www.interhack.net/pubs/network-security/  https://www.javatpoint.com/computer-network-security  https://www.forcepoint.com/cyber-edu/computer-system  https://www.cybrary.it/blog/0p3n/introduction-hacking  https://www.cyberlawsindia.net/Information-technology-act-of-india.html https://www.ecpi.edu/blog/types-of-cyber-security-what-do-the-professionals-need-to-know  https://www.guru99.com/what-is-hacking-an-introduction.html  https://www.cbsnews.com/news/millions-facebook-user-records-exposed-amazon-cloud-server/  https://www.cbsnews.com/news/facebook-breach-shows-we-share-too-much-and-think-too-little/  https://www.voipshield.com/the-16-most-common-types-of-cybercrime-acts/  https://www.guru99.com/what-is-hacking-an-introduction.html#3  https://www.ecpi.edu/blog/types-of-cyber-security-what-do-the-professionals-need-to-know  https://en.wikipedia.org/wiki/Computer_fraud  https://www.itlaw.in/judgements/  https://www.itlaw.in/judgements/  https://www.guru99.com/what-is-hacking-an-introduction.html#3  https://www.investopedia.com/terms/i/identitytheft.asp  https://www.debt.org/credit/identity-theft/  https://economictimes.indiatimes.com/tech/internet/4-in-10-indians-have-experienced-identity-theft-report/articleshow/75029916.cms?from=mdr  https://antivirus.comodo.com/blog/computer-safety/what-is-virus-and-its-definition/  https://www.voipshield.com/the-16-most-common-types-of-cybercrime-acts/  https://kidshealth.org/en/teens/cyberbullying.html  https://www.lawtendo.com/blogs/what-are-cyberbullying-laws-in-india https://en.wikipedia.org/wiki/Cyberstalking  http://www.legalserviceindia.com/legal/article-1048-cyber-stalking-in-india.html  https://en.wikipedia.org/wiki/Online_piracy
National Law University Nagpur
(Images used for representative purpose only)