Beruflich Dokumente
Kultur Dokumente
Volume: 2 Issue: 7
ISSN: 2321-8169
1900 1902
_______________________________________________________________________________________________
__________________________________________________*****_________________________________________________
1. Introduction
Information Act 2000 states an act to provide legal
recognition for transactions carried out by means of
electronic data interchange and other means of electronic
communication, commonly referred to as Electronic
Commerce, which involve the use of alternative to paperbased methods of communication and storage of
information, to facilitate electronic filing of document with
the Government agencies and further to amend the Indian
Penal Code, the Indian Evidence Act, 1872, the Bankers
Books Evidence Act, 1891 and the Reserve Bank of India
Act, 1934 and of matters connected therewith or incidental
thereto.[1]
In prcis manner we can say that any crime commit on an
electronic item & crime commit with the help of electronic
item & any unauthorized access of electronic item will be
covered by Cyber Law or IT Act 2000. Electronic items can
not only be computers but also be mobiles, pen drives,
laptops and etc. Crimes commit on electronic items are like
destroying items, deleting any personal data and etc.
Hacking, DOS attacks, Image Morphing are some common
examples of crime commit with the help of electronic item.
2. Case Studies
Here are some basic registered case studies that will be
elaborates what the cyber crimes are and how to avoid them.
2.1 CASE STUDY 1
US $ 3, 50,000 from account of four US customers were
dishonestly transferred to bogus account. This will give a lot
of ammunition to those lobbying against outsourcing in US.
It is a case of source engineering. Some employees gained
the confidence of the customer and obtained their PIN
Number to commit fraud. They got these under the guise of
helping the customers out of difficult situations. Highest
_______________________________________________________________________________________
ISSN: 2321-8169
1900 1902
_______________________________________________________________________________________________
customers of the financial institute and arrested the accused,
the place of offence at Vijaywada was searched for the
evidence. There one Laptop and mobile was seized which
was used for the commission of the crime. The arrested
accused had used open source code email application
software for sending spam emails. He has down loaded the
same software from net and then used it as it is. He used
only VSNL emails to spam the emails to customer of
financial institute because VSNL email service provider do
not have spam box the unsolicited emails. After spamming
emails to financial institute customers he got the response
from around 120 customers of which 80 are genuine and
others are not correct because it do not have debit card
details as required for e-Banking. The financial institute
customers those who have received his email felt that the
email was originated from the financial institute bank. When
they filled the confidential information and submitted that
time said informational was directed to accused. This was
possible because the dynamic link was given in the first
page (Home Page) of the fake website. The dynamic link
means when people click on the link provided in spamming
email that time only the link will be activated. The dynamic
link was coded by handling the Internet Explorer
OnClick() event and the information of the form will be
submitted to the web server (Where the fake site is hosted).
Then server will send the data to configured email was to
the accused email. So on submission of the confidential
information was directed to email ID accused [3].
2.2.1
Analysis
with the help of Sonu & Raju. She added, Gautam who is a
cameraman downloaded one of my photo from my photo
from my Facebook account. He morphed my face on an
obscene photo and started blackmailing me [4].
2.3.2 Analysis
This is a technique of Image Morphing. There are so many
softwares that provide facility of alteration, modification &
edition a photograph like Adobe Photoshop, CorelDraw and
etc. Most often it is used to depict one person turning into
another through technological means or as part of a fantasy
or surreal sequence.
There are some points keep in mind while uploading your
image on social networking site.
1) Make all your post while uploading your image on
social networking site.
2) Set your default privacy setting.
3) Consider enabling the Tag Review features.
4) It is recommended do not share your extreme
private photos.
2.4 CASE STUDY IV
One day a young Software engineer came to State Cyber
police Office and complained that his web portal has been
copied and being used in the other brand name. Cyber police
asked him to demonstrate the same. The engineer opened his
portal and the suspected portal and changed one of the
source codes of his image in the portal. We could easily see
that the image on the suspected portal also changed. After
verifying several similarities Cyber police found the claims
of the engineer from Bhopal was true. After preliminary
investigation a FIR has been lodged against the owner of the
suspected portal for copying the source code of the portal
and using the same after making some for his use. During
investigation the details about the site owner were obtained
from the domain registry sites and profile of the suspect has
been built up. The suspect has been found to be Australian
of Indian origin [5].
2.4.1
Analysis
_______________________________________________________________________________________
ISSN: 2321-8169
1900 1902
_______________________________________________________________________________________________
1) www.web2generators.com/html/entities
2) meyerweb.com/eric/tools/dencoder
But they are not so much reliable & easily decodable.
Developer has to be aware about his website.
3. BROACH from the CASES
Every computer user should be aware about different types
of attacks so that he/she can escape from the condition of
cyber crime victim. There are several points to be Cyber
Safe.
1) Never disclose your passwords.
2) Discuss with cyber police if see any bad language or
pictures on the internet, or if anyone writes to you
anything you dont like it.
3) Do not reply to any message or bulletin board items
that are suggestive obscene, aggressive or distressing.
4) Do not accept any offer of money or presents, even free
offer.
But some times to be a good IT user we should maintain
some cyber ethics
1) Do not use vulgar, offensive language on public
networking site.
2) Always ask to your relatives and friends before
uploading a group photo on networking site.
deity.gov.in/content/preliminary
Singh T, Cyber Law & Information Technology,
E-Journal Delhi District Courts, page 7.
cybercellmumbai.gov.in/html/case-studies
imesofindia.indiatimes.com/city/ChandigarhMay 7,
2014
www.mpcyberpolice.nic.in/casestudies.htm
1902
IJRITCC | July 2014, Available @ http://www.ijritcc.org
_______________________________________________________________________________________