INTRODUCTION TO CYBER CRIME AND CYBER LAW
Cyber crimes refer to any criminal activity dealing with computers and
networks.
Cyber law
Cyber law provides legal recognition to electronic documents and a
framework to support e-filing and e-commerce.
Types of Cyber Crimes
1) Unauthorized access and hacking: When someone gains access to a
website, program, or server without authorization.
Hacking refers to breaching a computer system for the purpose of
stealing information. They may alter system or security features.
2) Virus and Worm attacks: These are malicious programs that
self-replicate on a computer via a network.
A program that can infect other programs and make copies of itself,
and spread into other programs is called a Virus. Programs that
multiply like viruses but spread from computer to computer are called
worms.
3) E-mail-related crimes:
i) Email spoofing: Forgery of an e-mail header so that the message
appears to have been sent from elsewhere than it was originally sent.
ii) Email spamming: It refers to sending emails to bulk users, similar
to a chain letter. Sending malicious code and viruses through email.
iii) Email bombing: Sending identical e-mail messages to a particular
address, characterized by abusers repeatedly.
4) Exploit: A part of software, a chunk of software that takes advantage
of a particular vulnerability in order to cause unintended behaviour to
occur on a computer system.
5) Pornography: The Act of showing sexual acts in order to cause
sexual excitement through books, films, etc. This would include
pornographic websites, materials, and their transmission.
6) Cyber Terrorism: Targeted attacks on military power plants, air traffic
control, banks, etc., are most likely the targets.
7) Banking/credit-related crime: Use of stolen card information or fake
debit/ credit cards is common. Hackers continuously try to gain
access to confidential banking and financial information.
8) E-commerce/ Investment fraud: Investment fraud is any type of false
or illegal transaction. E-commerce fraud refers to the commencement
of any exchange of services or transactions online and not going
through it.
9) Cyber Defamation: It means damaging someone’s reputation by
making false statements about them online through the internet or
other digital communication platforms.
10) Identity theft: When someone illegally obtains and uses another
person’s personal information without permission, usually to commit
fraud or other crimes.
11) Breach of privacy and confidentiality: Confidentiality means
non-disclosure of information to unwanted or unauthorized persons.
Computer viruses
A computer virus is a type of malicious program designed to disrupt the
normal functioning of a computer, damage data, or steal information.
Social engineering
Social engineering is a manipulation technique used by attackers to trick
people into giving away confidential information, providing access, or
performing certain actions that compromise security. Instead of hacking
systems directly, it exploits human psychology — like trust, fear, curiosity,
or urgency.
Phishing
Phishing is a type of cyber attack in which attackers pretend to be trusted
people or organizations (like banks, companies, or government offices) to
trick users into sharing sensitive information such as passwords, credit card
numbers, bank details, or personal data.
It usually happens through emails, messages, fake websites, or phone
calls.
Software piracy
Software piracy is the illegal copying, distribution, or use of software
without the permission of the software creator or without buying a proper
license.
Types of software piracy:
1) Softlifting: Softlifting is a type of software piracy where a person buys
a single licensed copy of software but installs or shares it on multiple
computers, which is against the license agreement.
2) Harddisk Loading: Computer dealers or sellers illegally install pirated
software (like Windows, MS Office, games, etc.) on a new computer’s
hard disk to make it more attractive for buyers.
3) OEM unbundling: OEM (Original Equipment Manufacturer)
unbundling is a type of software piracy where a dealer or seller
separates OEM-licensed software from the computer it was originally
sold with, and then sells that software illegally as a standalone
product.
4) Counterfeit Software: Fake copies of software are made and sold in
the market. These copies look like the original (with packaging,
labels, manuals, even fake product keys), but they are illegal and
unauthorized.
5) Online piracy: Software piracy, where people illegally download,
share, or distribute software, movies, music, games, or other digital
content through the internet without permission or payment.
Intellectual Property (IP)
Intellectual Property refers to the creations of the mind, such as inventions,
artistic works, designs, brand names, and symbols.
It gives the creator/owner legal rights to protect and benefit from their work.
Types of IP:
1) Copyright: Protect literary, artistic, musical, and software works.
2) Patents: Protect inventions and new technologies.
3) Trademark: Protect logos, brand names, slogans, or symbols that
identify products/services.
4) Industrial Design: Protect the unique shape, appearance, or design of
a product.
Mail Bomb
Sending a massive amount of email to a specific person or system.
DDoS (Distributed Denial of Service)
A DDoS attack is a type of cyber attack in which multiple computers (often
controlled by hackers through malware) send a huge amount of traffic to a
server, website, or network.
This overloads the system and makes it slow or completely unavailable to
real users.