Beruflich Dokumente
Kultur Dokumente
INTRODUCTION
WHAT IS HACKING?
Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The most prominent definition of hacking is the act of gaining access without legal authorization to a computer or computer network. In computer networking, hacking is any technical effort to manipulate the normal behaviour of network connections and connected systems. A hacker is any person engaged in hacking.The term "hacking" historically referred to constructive, clever technical work that was not necessarily related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks. , the noun "hack" also has two senses. It can be either a compliment or an insult. It's called a hack when you do something in an ugly way. But when you do something so clever that you somehow beat the system, that's also called a hack. The word is used more often in the former than the latter sense, probably because ugly solutions are more common than brilliant ones.
Origins of Hacking
M.I.T. engineers in the 1950s and 1960s first popularized the term and concept of hacking. Starting at the model train club and later in the mainframe computer rooms, the so-called "hacks" perpetrated by these hackers were intended to be harmless technical experiments and fun learning activities. Later, outside of M.I.T., others began applying the term to less honourable pursuits. Before the Internet became popular, for example, several hackers in the U.S. experimented with methods to modify telephones for making free long-distance calls over the phone network illegally. As computer networking and the Internet exploded in popularity, data networks became by far the most common target of hackers and hacking.
directory), often by gaining access to a "super-user" account. This will allow both maximum access and the ability to hide your presence. Who are these telematics "pirates" who surf the net and go beyond boundaries not geographical ones but those of cyberspace - and sneak their way into computers and the networks that make up Internet? Initially, they were computer experts who spent their time, for pleasure as well as work, exploring the functional limits of programmes and operating systems, with the intention of perfecting them and searching out their imperfections and weaknesses. Now things have changed. It is estimated that Internet is currently made up of more than 200 million calculators, 800 million cyber-nauts and tens of thousands of independent network. The first important case of a breach in computer security occurred in November 1988, with the so-called "Morris worm", which gave rise to the creation of the first Coordination Centre (CERT, "Computer Emergency Response Team") to gather information on computer security incidents. Since then, other CERTs have been created in many countries to provide a centralized and coordinated response to on-line cyber-attacks and to facilitate the defence of calculators. Unfortunately, computer piracy has continued to evolve and is still developing; the number of cases officially reviewed by CERT coordinating centres, with regard to attacks on computers and data transmission networks, increased from 6 in 1988 to over 137,000 in 2003.
Raymond lists five possible characteristics that qualify one as a hacker are:
A person who enjoys learning details of a programming language or system A person who enjoys actually doing the programming rather than just dealing with it theoretically A person capable of appreciating someone else's hacking capabilities A person who picks up programming quickly A person who is an expert in a particular programming language or system
Ethical Hacking
The explosive growth and advancement of the Internet has brought many good things and services: Electronic commerce, easy access to vast stores of reference material and information, collaborative computing, e-mail, and new avenues for advertising and information distribution, online gaming, socializing sites to name a few. As with most technological advances, there is also a dark (Negative) side also: criminal hackers and Hacking. Governments, companies, and private citizens around the world are anxious to be a part of this revolution for the purpose of evolution and development, but they are afraid that some hacker will break (creep) into their Web server and replace their logo with pornography or some undesired stuff and all, read their e-mail, steal their credit card number from an on-line shopping and money transferring site, or implant software that will secretly transmit their organization's secrets to the open Internet (spyware etc). With these concerns and others, the ethical hacker can help with the same problem. The term HACKER has a dual usage and meaning in the computer industry today. Originally, the term was defined as: 1. A person who enjoys learning the details of computer systems and how to stretch their capabilities. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing or mugging up the programming.
HACKERS ATTITUDE
Several subgroups of the computer underground with different attitudes and aims use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree. Eric S. Raymond (author of The New Hacker's Dictionary) advocates that members of the computer underground should be called crackers. Instead of a hacker/cracker dichotomy, they give more emphasis to a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie. In contrast to Raymond, they usually reserve the term cracker. According to a cracker cracking is to gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system. These subgroups may also defined by the legal status of their activities. According to Steven Levy an American journalist who has written several books on computers, technology, cryptography, and cyber security said most hacker motives are reflected by the Hackers Ethic. These ethic are as follows:"
Access to computers and anything that might teach you something about the way the world works should be unlimited and always yield to the Hands-on imperative! All information should be free. Mistrust authority and promote decentralization. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position. You can create art and beauty on a computer. Computers can change your life for the better."
WHITE HAT A white hat hacker breaks security for non-malicious reasons, for instance testing their own security system. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. Often, this type of 'white hat' hacker is called an ethical hacker. GREY HAT A gray hat hacker is a combination of a Black Hat Hacker and a White Hat Hacker. A Grey Hat Hacker will surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked. Then they will offer to repair their system for a small fee. BLUE HAT A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed.
BLACK HAT A black hat hacker, sometimes called "cracker", is someone who breaks computer security without authorization or uses technology (usually a computer, phone system or network) for vandalism, credit card fraud, identity theft, piracy, or other types of illegal activity. ELITE Elite is a term used to describe the most advanced hackers who are said to be on "the cutting edge" of computing and network technology. These would be individuals in the earliest 2.5 percentile of the technology adoption lifecycle curve, referred to as "innovators." As script kiddies and noobs utilize and exploit weaknesses in systems discovered by others, elites are those who bring about the initial discovery. SCRIPT KIDDIE A script kiddie is a non-expert who breaks into computer systems by using prepackaged automated tools written by others, usually with little understanding of the underlying concepthence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, childan individual lacking knowledge and experience, immature). NEOPHYTE A neophyte or "newbie" is a term used to describe someone who is new to hacking and has almost no knowledge or experience of the workings of technology, and hacking.
HACTIVISM A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks. In more extreme cases, hacktivism is used as tool for Cyber terrorism.
The ethical values as defined in 1992 by the Computer Ethics Institute Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people's computer work. Thou shalt not snoop around in other people's computer files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness. Thou shalt not copy or use proprietary software for which you have not paid. Thou shalt not use other people's computer resources without authorization or proper compensation. Thou shalt not appropriate other people's intellectual output. Thou shalt think about the social consequences of the program you are writing or the system you are designing. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
Techniques of Hacking:
Vulnerability scanner:A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.) Password cracking: Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Packet sniffer: A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network. Spoofing attack (Phishing): A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker. Social engineering: When a Hacker, typically a black hat, is in the second stage of the targeting process, he or she will typically use some social engineering tactics to get enough information to access the network. A common practice for hackers who use this technique, is to contact the system administrator and play the role of a user who cannot get access to his or her system.
Denial-of-service attack (DoS attack):Itis an attempt to make a computer or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person, or multiple people to prevent an Internetsite or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers.
Trojan Horse A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.) Virus A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. While some are harmless or mere hoaxes most computer viruses are considered malicious. Worm Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Unlike a virus, it does not need to attach itself to an existing program. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program. Analysis: Application of Ethical Hacking Ethical Hacking is employed by organizations to test their Application Security and expose flaws in their system; so that they may be removed, ergo creating a more secure environment. Application of Unethical Hacking Unethical Hacking is intended to obtain sensitive information illegally and use it to ones advantage, with an intention of malice.
Conclusion:
Hacking affects the Professional World in a significant way as it is a Network Security measure protecting the company network and systems as well as a Malacious activity which threatens organizational security.
Personally, I use a lot of public computers to blog and do other online activities, maybe because its convenient or my unreliable ISP crashed on my once more. Inevitable theres many, many webmasters like me that use public services for either a quick access or regular work. Just dont forget to clear out the cookies and cache before you leave! Even if the service provider claims no tracking of privacy or anything along those lines, a quick clean before you leave wouldnt hurt anyone. Prevent illegal farmers from harvesting your lists Hacking techniques are used to harvest email addresses, which are then used by spammers and other hackers for malicious activities. If you are storing email data on your website, for what-ever required reason, make sure its stored in a secure format, such as a MySQL Database. Most top-CMS such as WordPress and Joomla make this compulsory but theres many self-written CMSs too. If your script simply writes data to a text called emails.txt it wont be long before someone sniffs it out. Dont use Generic Usernames Using common words for usernames such as admin, administrator or Site Owner can cause many implications because you are simply making the job of the hackers a lot easier. By using such common words for your username, you are incredibly increasing the success rate of the hacker by at least a few points of a percentage, which is consider a lot where only one answer can be right from an unlimited range of combinations. Securing your Ports To put in simple words, a PORT is used to access data from outside the server. It also utilized to transfer data both ways, into the server and also outgoing. Most of this activity is behind closed doors and happens automatically, and only trained professionals tend to play around with such details. Nevertheless, ports are constantly opened & closed for easy-access, for programs such as a FTP (File Transfer Protocol). This can be favorable for any hackers attempting to access your sensitive files, so make sure any unwanted ports are properly closed.
Updated Security Patches If your web hosting provider hasnt already done so, you should check that all the latest security patches for various aspects of the service are properly installed. As you might know, WordPress (self-hosted) is one of the most popular Content Management Systems out there on the market. It is used by millions- so its not surprising to see many hackers working day/night trying to hack it. Updates and patches are regularly released, so keep an eye out for all your plug-ins/core files. Use Strong Passwords!
The number one technique you can possibly implement. Hackers are experts at programming computers to plough through huge amounts of data very quickly. Thats the reason longer passwords are more secure; the number of possible combinations grows exponentially with every extra character added. Hackers employ a technique called dictionary attack where they repeatedly try username and password combinations by running through hundreds of common words, phrases, numbers and combination them till they get lucky. Its important you use random strings like j@m13s(!) instead of perhaps jamie123 Lastly, this cannot be a tip instead a complusory step in setting up your online community. Make sure your .htaccess and .htpasswrd is properly formatted with the secure CHMOD of 644. This is important and adds the best out-layer of protection for you and your visitors.
Effective steps that small business owners and network administrators can take to protect their systems
Implement a firewallA firewall is a barrier that keeps hackers and viruses out of computer networks. Firewalls intercept network traffic and allow only authorized data to pass through. Develop a corporate security policy Establish a corporate security policy that details practices to secure the network. The policy should direct employees to choose unique passwords that are a combination of letters and numbers. Passwords should be changed every 90 days to limit hackers ability to gain possession of a functioning password. When someone leaves company, immediately delete the user name and password. The corporate policy should outline consequences for network tampering and unauthorized entry. Install anti-virus software All computers should run the most recent version of an anti-virus protection subscription. Ideally a server should be configured to push virus updates out periodically to all client systems. Employees should be educated about viruses and discouraged from opening e-mail attachments or e-mail from unknown senders.
Keep operating systems up to date Upgrade operating systems frequently and regularly install the latest patches or versions of software, which are often free over the Web. If you use Microsoft Windows, check www.windowsupdate.com periodically for the latest patches. Vulnerabilities in Java and Adobe are well known exploit paths for malware writers so it is just as critical that these software applications are kept up to date. I recommend visiting Securia Online Software Inspector to scan for out of date software applications. Dont run unnecessary network services When installing systems, any nonessential features should be disabled. If a feature is installed but not actively used, it is less likely to be updated regularly, presenting a larger security threat. Also, allow only the software employees need to do their job effectively. Conduct a vulnerability test Conducting a vulnerability test is a cost-effective way to evaluate the current security program. This test highlights flaws and limitations in the program, and experts can offer suggestions for improvement. The best method for conducting a vulnerability test is to contact a computer consulting company and provide access to your system for a day or two. This will provide ample time for network appraisal and follow-up discussion and planning. Keep informed about network security Numerous books, magazines and online resources offer information about effective security tools and lessons learned. Also,
the Web provides ample and very current information about security type in the key words network security.
Technology nuances are important in a spam infested environment where privacy can be compromised and individuals can be subjected to become a victim unsuspectingly. Most cyber criminals have a counter part in the real world. If loss of property or persons is caused the criminal is punishable under the IPC also. Since the law enforcement agencies find it is easier to handle it under the IPC, IT Act cases are not getting reported and when reported are not necessarily dealt with under the IT Act. A lengthy and intensive process of learning is required. A whole series of initiatives of cyber forensics were undertaken and cyber law procedures resulted out of it. This is an area where learning takes place every day as we are all beginners in this area. We are looking for solutions faster than the problems can get invented. We need to move faster than the criminals. The real issue is how to prevent cyber-crime. For this, there is need to raise the probability of apprehension and conviction. India has a law on evidence that considers admissibility, authenticity, accuracy, and completeness to convince the judiciary. The challenge in cyber-rime cases includes getting evidence that will stand scrutiny in a foreign court. For this India needs total international cooperation with specialised agencies of different countries. Police has to ensure that they have seized exactly what was there at the scene of crime, is the same that has been analysed and the report presented in court is based on this evidence. It has to maintain the chain of custody. The threat is not from the intelligence of criminals but from our ignorance and the will to fight it. The law is stricter now on producing evidence especially where electronic documents are concerned. The computer is the target and the tool for the perpetration of crime. It is used for the communication of the criminal activity such as the injection of a virus/worm which can crash entire networks. The Information Technology (IT) Act, 2000, specifies the acts which have been made punishable. Since the primary objective of this Act is to create an enabling environment for commercial use of I.T., certain omissions and commissions of criminals while using computers have not been included. With the legal recognition of Electronic Records and the amendments made in the several sections of the IPC vide the IT Act, 2000, several offences having bearing on cyberarena are also registered under the appropriate sections of the IPC. As per the report of National Crime Records Bureau, in 2005, a total 179 cases were registered under IT Act 2000, of which about 50 percent (88 cases) were related to Obscene Publications / Transmission in electronic form, normally known as cyber pornography. 125 persons were arrested for committing such offences during 2005. There were 74 cases of Hacking of computer systems during the year wherein 41 persons were arrested. Out of the total (74) Hacking cases, those relating to Loss/Damage of computer resource/utility under Sec 66(1) of the IT Act were 44.6 percent (33 cases) whereas the cases related to Hacking under Section 66(2) of IT Act were 55.4 percent (41 cases). Tamil Nadu (15) and Delhi (4) registered maximum cases under Sec 66(1) of the IT Act out of total 33 such cases at the National level. Out of the total 41 cases relating to Hacking under Sec. 66(2), most of the cases (24 cases) were reported from Karnataka followed by Andhra Pradesh (9) and Maharashtra (8).
During the year, a total of 302 cases were registered under IPC Sections as compared to 279 such cases during 2004 thereby reporting an increase of 8.2 percent in 2005 over 2004. Gujarat reported maximum number of such cases, nearly 50.6 percent of total cases (153 out of 302) like in previous year 2004 followed by Andhra Pradesh 22.5 percent (68 cases). Out of total 302 cases registered under IPC, majority of the crimes fall under 2 categories viz. Criminal Breach of Trust or Fraud (186) and Counterfeiting of Currency/Stamps (59). Though, these offences fall under the traditional IPC crimes, the cases had the cyber tone wherein computer, Internet or its related aspects were present in the crime and hence they were categorised as Cyber Crimes under IPC. Out of the 53,625 cases reported under head Cheating during 2005, the Cyber Forgery (48 cases) accounted for 0.09 percent. The Cyber frauds (186) accounted for 1.4 percent out of the total Criminal Breach of Trust cases (13,572). The Forgery (Cyber) cases were highest in Andhra Pradesh (28) followed by Punjab (12). The cases of Cyber Fraud were highest in Gujarat (118) followed by Punjab (28) and Andhra Pradesh (20). A total of 377 persons were arrested in the country for Cyber Crimes under IPC during 2005. Of these, 57.0 percent (215) of total such offenders (377) were taken into custody for offences under 'Criminal Breach of Trust/Fraud (Cyber)', 22.0 percent (83) for Counterfeiting of Currency/Stamps and 18.8 percent (71) for offences under Cyber Forgery. The States such as Gujarat (159), Andhra Pradesh (110), Chhattisgarh and Punjab (51 each) have reported higher arrests for Cyber Crimes registered under IPC. Bangalore (38), Chennai (20) and Delhi (10) cities have reported high incidence of such cases (68 out of 94 cases) accounting for more than half of the cases (72.3%) reported under IT Act, 2000. Surat city has reported the highest incidence (146 out of 163 cases) of cases reported under IPC sections accounting for more than 89.6 percent. The latest statistics show that cybercrime is actually on the rise. However, it is true that in India, cybercrime is not reported too much about. Consequently there is a false sense of complacency that cybercrime does not exist and that society is safe from cybercrime. This is not the correct picture. The fact is that people in our country do not report cybercrimes for many reasons. Many do not want to face harassment by the police. There is also the fear of bad publicity in the media, which could hurt their reputation and standing in society. Also, it becomes extremely difficult to convince the police to register any cybercrime, because of lack of orientation and awareness about cybercrimes and their registration and handling by the police. A recent survey indicates that for every 500 cybercrime incidents that take place, only 50 are reported to the police and out of that only one is actually registered. These figures indicate how difficult it is to convince the police to register a cybercrime. The establishment of cybercrime cells in different parts of the country was expected to boost cybercrime reporting and prosecution. However, these cells havent quite kept up with expectations. Netizens should not be under the impression that cybercrime is vanishing and they must realize that with each passing day, cyberspace becomes a more dangerous place to be in, where criminals roam freely to execute their criminals intentions encouraged by the so-called anonymity that internet provides.
The absolutely poor rate of cyber-crime conviction in the country has also not helped the cause of regulating cybercrime. There have only been few cybercrime convictions in the whole country, which can be counted on fingers. We need to ensure that we have specialized procedures for prosecution of cybercrime cases so as to tackle them on a priority basis,. This is necessary so as to win the faith of the people in the ability of the system to tackle cybercrime. We must ensure that our system provides for stringent punishment of cybercrimes and cyber criminals so that the same acts as a deterrent for others.
1.The Computer as a Target: Using a computer to attack other computers; e.g. Hacking, Virus/Worm attacks,DoS attack etc. 2.The computer as a weapon: Using a computer to commit real world crimes; e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
Information Technology Lawyer An information technology attorney is a professional who handles a variety of legal matters related to IT. The attorney gets involved in drafting, negotiating, and interpreting agreements in the areas of software licensing and maintenance, IT consulting, e-commerce, web site hosting and development, and telecommunications agreements, as well as handling dispute resolution and assisting with the client's Internet domain name portfolio. An information technology attorney works with engineering, IT, and other business units and ensures that customer information gathered by company is collected, stored and used in compliance with privacy policies and applicable laws. Duties also include providing high quality, specialized and practical advice in business-to-business and business-to-consumer arrangements and advising on issues like IT outsourcing arrangements, software and hardware supply and implementation agreements. An information technology attorney contracts for web site developers and consultants in relation to on-line projects. Provides support and maintains confidentiality/know how agreements. Contracts for Internet service providers and data protection advice. An information technology attorney should have a JD degree or an LL.M degree with admission to the local state bar.
Hacking
According to section 66 of the IT Act (1)Whoever with the intent to cause orknowing that he is likely to cause wrongfulloss or damage to the public or any persondestroys or deletes or alters anyinformation residing in a computer resourceor diminishes its value or utility or affects itinjuriously by any means, commits hacking.(2)Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend upto two lakh rupees, or with both. There are 2 elements to this section:1. Intention to cause wrongful loss or damage or Knowledge of the likelihood of wrongful loss or damage 2. Destruction or deletion or alteration of information in a computer Ordiminishing value or utility of a computer resourc or injuriously affecting a computer resource Loss signifies detriment or disadvantage. Loss can be temporary or permanent. Loss can relate to something that the loser hascurrently or is likely to get in the future. This term is bestunderstood through the following illustrations
INDIAN PENAL CODE CIVIL LIABILITY UNDER IT ACT,2000 SEC.43 of IT ACT 2000
If a person ,without permission of the owner or any other person who is incharge of a computer,computer system or computer network. a) Acess or secures access to such computer ,computer system or computer network. b) Download,copies or extracts any data ,computer data base or information from such computer,computer system or computer network including information or data held or stored in any removable storage medium. c) Introduces or causes to be introduced ,any computer constraints or computer virus into any computer,computer system or computer network d) Damages or causes to be damaged any computer .computer system or computer network,data,computer data base of any other programmes residing in such computer ,computer system or computer network e) Discharges or causes disruption of any computer ,computer system or computer network f) Denies or causes the denial of accesss to any computer ,computer system or computer network by any means g) Provides any assistance to any person to facilitate access to computer ,computer system or computer network in contravention of the provisions of this act,rules or regulations made there under. h) Changes the service availed of by a person to the account of another person by tampering with or manipulating any computer,computer system or computer network.
SEC.441-CRIMINAL TRESPASS Whoever enters into or upon property in the possession of another with intent to commit an offence or to intimidate,insult or annoy any person in the possession of such property, or having lawful entered into or upon such property,unlawful remains there with intent thereby to intimidate,insult or annoy any such person or with intent to commit an offence to said to commit criminal trespass
PENALITIES UNDER IT ACT,2000 SEC.66-HACKING WITH COMPUTER Whoever commits hacking shall be punished with imprisonment upto three years or with fine which may extend upto two lakh rupees or both.
SEC.72-PENALTY FOR BREACH OF CONFIDENTIALITY AND PRIVACY If any person who,in pursuance of any power conferred under this act,rules or regulation made thereunder,has secured access to any electronic record ,book,register,correspondence,information,document or other material without the consent of the person concerned discloses such electronic record book,register,correspondence,information,document,or other material to any other person shall be punished with imprisonment for a term which may extend to two years ,or with fine which may extend to one lakh rupees,or with both.
SEC.379-PUNISHMENT FOR THEFT whoever commits theft shall be punished with imprisonment of either description for a term which may extend to three years,or with fine,or with both. Sec.406-Punishment for criminal breach of trust
whoever commit criminal breach of trust shall be punished with imprisonment of either description for a term which may extend to three years or with fine ,or with both
SEC.447-PUNISHMENT FOR CRIMINAL TRESPASS Whoever commits criminal trespass shall be punished with imprisonment of either description for a term which may extend to three months ,or with fine which may extend to five hundred rupees ,or with both.
Bibliography
http://en.wikipedia.org/wiki/Legal_aspects_of_computing http://www.cyberlawsindia.net/ http://www.cyberlaws.net/cyberindia/whycyberlaw.htm http://whatishacking.org/ http://www.crime-research.org/news/05.05.2004/241/ www.gohacking.com/ http://compnetworking.about.com/od/networksecurityprivacy/f/what-ishacking.htm 8. http://www.campusactivism.org/html-resource/hackers/section6.html 9. http://searchsecurity.techtarget.com/definition/hacker 10. http://www.scienzagiovane.unibo.it/english/hackers/1-who.html 11. http://www.paulgraham.com/gba.html 12. http://www.brighthub.com/computing/enterprise-security/articles/5299.aspx
1. 2. 3. 4. 5. 6. 7.