Category Archives: Law

Denial of Service Attack (DoS)

What is Denial of Service (DoS) attack? DoS is an attack that prevents legitimate users from accessing a particular resource making that resource unavailable. The resource can be a website, your own computer, email, database or any other information that you as a user are authorized to access. In DoS attacks on websites, that attacker

Cyber Defamation

What is Cyber Defamation ? Defamation means damaging one’s reputation. When this is done on cyber space it is known as Cyber Defamation. Cyber defamation involves the use of cyber space to defame an individual, organization or entity, via emails, websites, messaging or broadcasting services etc. What are the threats ? The exposure, reach and

Voyeurism

What is Voyeurism ? Voyeurism is the act of spying on people engaged in acts that are usually considered to be private in nature. People like to record and share some moments of their lives via technology. Unfortunately, a new form of cybercrime has emerged wherein hidden cameras capture the private moments of people’s lives

IT Act still needs to be observed

IT Act still needs to be observed

The Information Technology Act, 2000 is so far, the most effective act which deals with cybercrime and electronics in India. The Act 2000 comprise of 94 section, divided among 13 chapters and 4 schedule. The very Act applies to whole India and also to the citizens of other countries who found guilty in cybercrime which

Use of Social Media by LEA

Use of Social Media by LEA

Use of Social Media by LEA Law enforcement agencies, like many other types of organizations, are finding ways to use social media to disseminate information to the public. In fact, police agencies in larger cities are finding that their communities expect them to have an online presence on platforms such as Twitter, Facebook, and YouTube.

Web Jacking

What is Web Jacking ? Illegally seeking control of a website by taking over a domain is known as Web Jacking. It is similar to hijacking. In this kind of attack, the actual website is never touched. Instead, the system (DNS) that resolves website URL to IP address is compromised. The internet works on the

Digital Forgery

What is Digital Forgery ? Creating a fake copy or imitation of a document or an object with the intention to deceive is called forgery. It can involve everything from forging a signature, faking a masterpiece, creating a cheap replica of an expensive original device to faking government documents like a licence, birth certificate etc.

Cyber Pornography

What is Cyber Pornography ? Cyber pornography can be defined as pornographic material designed, published or distributed using cyber space as a medium. In India, viewing digital pornography is not a crime, but creating and distributing such material is. It is legal in most other countries. However, child pornography is illegal in all forms and

War Driving

What is War Driving ? War driving refers to the act of seeking out wi-fi networks by moving around with a computer or smart phone (or any equivalent device) to detect these networks. This in itself is not a crime. However, criminals usually hunt for open wi-fi networks or those with weak passwords that can

Chain of Custody Form

Chain of Custody Form

A chain of custody is chronological documentation for evidence in a particular case.It is the most important document which needs to stand scrutiny of law.Path of a digital evidence from its seizure to end of  case of case is documented. It ensures that the digital artefact was in right hands and was not altered/tmapered on its