IMPORTANT CASE-LAWS ON CYBER LAW WITH THEIR ANSWERS

advertisement
IMPORTANT CASE-LAWS ON CYBER LAW WITH
THEIR ANSWERS
Illustration 1
If you physically take the mobile phone of your friend in your hand
without his permission also amounts to "securing its access" i.e. hacking.
ANSWER: SEC-43 & 66
Illustration 2
Guessing of a sequence on mobile phone to unlock the phone or guessing
and keying in passwords on computers or ATM Pin Numbers amounts to
Hacking.
ANSWER: SEC-66 & 43
Illustration 3
A Student who was hailing from Jamnagar and had completed his
Bachelor of Computer Application course (BCA). He allegedly got into
the website of Gujarat Technological University (GTU) and changed its
data to get admission in a post-graduation course. This student had
allegedly broken into the GTU website for getting admission in Master of
Computer Application (MCA). This act of the said student is called an act
of hacking.
ANSWER: SEC-43 & 66
Illustration 4
On Aug 16, 2010 the liquor baron and Rajya Sabha member, Mr. Vijay
Mallya's parliamentary website had been hacked by the Pakistan cyber
army. The Pakistan cyber army not only hacked the website but also
Swapnil Patni Classes
Page 1
threatened to make "Indian cyberspace into hell". This act constitutes
hacking into a web server.
ANSWER: SEC-43,66,75,66F
Illustration 5
Manali was a 13 year old from Mumbai who struck up an online
friendship on the popular social networking site facebook with person she
believed was a new boy in her hometown. In actuality, the "friend" was a
group of individuals, including adults, who were intent on humiliating the
poor girl because of a friendship with another child that had gone away.
Manali was very upset when she found out the truth, then later committed
suicide once the friendship had terminated.
ANSWER: SEC-66A
Illustration 6
In a place near Mumbai, A fake facebook profile with her picture, address
and phone number was created of a widowed lady who stays in a chawl
and in the status they wrote "I get fantasized when someone rapes me".
She got all nasty phone calls and people handed on her door mid-night
shouting we want to rape you open the door.
ANSWER: SEC-67
Illustration 7
The biggest case of identity theft ever seen, took place in August of 2009.
Eleven people, including a US secrete service informant, had been
charged in connection with the hacking of nine major retailers and the
theft and sale of more than 41 million credit and debit card numbers. This
data breach is believed to be the largest hacking and identity theft case.
Swapnil Patni Classes
Page 2
ANSWER: SEC-66C,43 & 66(65 IS SOURCE CODE)
Illustration 8
UTV Motion Pictures felt prey to identity theft. The company learnt that
the perpetrators not only created a fake company profile on a popular
social networking site, but also organized auditions to cast aspiring actors
in a film under the said banner. Reportedly, the scam set-up took quite a
sum of money from the actors to land roles in the film. A same type of
case was also handled by me for Balaji Telefilms.
ANSWER: SEC-66D
Illustration 9
Ms. Riya visits her cousin Ms. Ruchi's house, Riya finds the desktop
computer switched on, when Riya surfs into the hard disk, she likes
certain Pdf files, Riya fraudulently copies certain files to her pen drive
without Ruchi's permission.
ANSWER: SEC-66 & 43
Illustration 10
Mr. Sunil Verma works with an MNC, from last 4 years, he has just got a
lucrative job with the competitor company, and he was on a notice period
for one month. On his last day with the current employer Vunil attaches
all data files with regards to clients and certain software source code to
his personal Gmail id.
ANSWER: SEC-43,66,72A( If contract is signed)
Illustration 11
Swapnil Patni Classes
Page 3
Downloading.mp3 songs from free websites by not paying amounts to
data theft on the copyright owner of the song.
ANSWER: SEC-66 & 43
Illustration 12
In 1998, a 12-year-old boy successfully hacked into the controls for the
huge Roosevelt Dam on the Salt River in Arizona, USA. He might have
released floodwaters that would have inundated Mesa and Tempe,
endangering at least 1 million people. This act was likely to cause death
or injuries to persons.
ANSWER: SEC-66F
Illustration 13
In 1997, 35 computer specialists used hacking tools freely available on
1,900 web sites to shut down large segments of the US power grid. They
also silenced the command and control system of the Pacific Command in
Honolulu. This specialist thus committed the crime of cyber terrorism by
causing or likely to cause injury to the interest of the sovereignty and
integrity of country.
ANSWER: SEC-66F
Illustration 14
Mr. Shankaran a vendor of Nuclear Corporation brings his pen drive to
nuclear corporation office premises and connects his pen drive to a
computer for copying a file. He does not scan his pen drive with an
Antivirus. The virus and worm present on his pen drive infects the
computer. The virus causes to delete critical data and worm stops internet
access.
Swapnil Patni Classes
Page 4
ANSWER: SEC-66 & 43
Illustration 15
A customer of ICICI Bank named Mr. Umashankar Siva Subramaniam
lost Rs. 6.46 lakhs through Phising. Mr. Umashankar Siva Subramaniam,
who claimed he received an email in September 2007 from ICICI, asking
him to reply with his internet banking username and password or else his
account would become non-existent. After the reply to this mail he
witnessed a transfer of Rs. 6.46 lakh from his account to that of a
company which withdrew Rs. 4.6 lakh from an ICICI branch in Mumbai
and retained the balance in its account.
ANSWER: SEC-66D, 66A
Illustration 16
Mr. Sunil Reddy an government employee receives an Microsoft lottery
email claiming that he has won prize of $100,00,000. When Mr. Sunil
Reddy responds to the email, he is asked to send $750 for getting the
cheque couriered. When the money is payed by Mr. Sunil, a photocopy of
cheque with $100,00,000 as denomination with the name of Mr. Sunil
Reddy is sent to him, Mr. Sunil is now asked for $2500 for banking
clearance so that original cheque can be sent. This kind of email fraud is
also called as Nigerian 419 Scam.
ANSWER: SEC-66D, 66A
Illustration 17
A branch of the Global Trust Bank experienced a run on the bank.
Numerous customers decided to withdraw all their money and close their
Swapnil Patni Classes
Page 5
accounts. It was revealed that someone had sent out spoofed emails to
many of the bank's customers stating that the bank was in very had shape
financially and could close operations at any time.
ANSWER: SEC-66D, 66A
Illustration 18
An engineering student was using the auction website called
www.bazee.com website to sell a video depicting two school students
having sexual intercourse. Bazee.com was held liable for distributing
porn and hence the CEO was arrested. The CEO was held for abating
pornography by Delhi police.
ANSWER: SEC-67B
Illustration 20
In Mumbai a Swiss couple would gather slum children and then would
force them to appear for obscene photographs. They would then upload
these photographs to websites specially designed for pedophile.
ANSWER: SEC-67B
Illustration 21
A series of distributed denial of service attacks in February 2000 crippled
many popular websites including yahoo.com, amazon.com and cnn.com.
In distributed denial of service attacks, the attacker uses zombie's i.e.
computer's which are unknowingly used by the attacker to simultaneously
attacker the target. These zombies's innocently became the crime abettors.
ANSWER: SEC-43 & 66
Swapnil Patni Classes
Page 6
Download