+ All Categories
Home > Documents > A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf ·...

A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf ·...

Date post: 14-May-2018
Category:
Upload: nguyennhan
View: 214 times
Download: 0 times
Share this document with a friend
34
19 A. INTRODUCTION In 21 st Century, the societies are increasingly getting transformed into Knowledge Societies and their inhabitants into Knowledge Networkers who are more informed of the events happening locally and globally. Their actions are based on the strong foundation of knowledge which is universal, objective, timely and retrieved from various sources. People are becoming more aware of their rights and opportunities. However, this revolutionary change is brought by computer, internet and information technology. In fact, in the 21 st Century Knowledge Society, the way people communicate and interact with each other all over the globe has changed drastically due to globalization and e-revolution the paper based communication of earlier times is fast being substituted by electronic communication. This has lead to new ways of functioning of government and business. 1 B. CYBER SPACE 1. Meaning of cyber space The term ‘cyber space’ was first used by William Gibson in his science fiction ‘Neuromancer’ in 1982, which he later described as “an evocative and essentially meaningless buzzword that could serve as a cipher for all of his cybernetic musings. Now it is used to describe anything associated with computers, information technology, the internet and the diverse internet culture. Thus, “cyberspace’ is the electronic medium of computer networks, in which online communication takes place and where individuals can interact, exchange ideas, share information, provide social support, conduct business, direct actions, create artistic media, play games, engage in political discussions etc. 2 According to Chip Morningstar and F. Randall Farmer, cyberspace is defined more by social interactions involved rather than its technical implementation. The core characteristic is that must be an environment which consists of many participants with the ability to affect and influence each other. In cyberspace, the computational medium is an augmentation of the communication channel between real people. 3 Thus, cyberspace may be described as a conceptual collegeum where world’s information resources come together without being seen or sensed. 4 2. Salient features of cyber space 1 Justice T. Ch. Surya Rao, “Cyber Laws – Challenges for the 21 st Century”, Andhra Law Times, 2004, p. 20 2 http://en.wikipedia.org/wiki/Cyberspace#cite_note-1, accessed on 15.07.2009 3 http://en.wikipedia.org/wiki/Cyberspace#cite_note-3, accessed on 15.07.2009 4 Asian School of Cyber Laws, Fundamentals of Cyber Law, 2005, p. 93.
Transcript
Page 1: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

19

A. INTRODUCTION

In 21st Century, the societies are increasingly getting transformed into Knowledge

Societies and their inhabitants into Knowledge Networkers who are more informed of the

events happening locally and globally. Their actions are based on the strong foundation of

knowledge which is universal, objective, timely and retrieved from various sources. People

are becoming more aware of their rights and opportunities. However, this revolutionary

change is brought by computer, internet and information technology. In fact, in the 21st

Century Knowledge Society, the way people communicate and interact with each other all

over the globe has changed drastically due to globalization and e-revolution the paper based

communication of earlier times is fast being substituted by electronic communication. This

has lead to new ways of functioning of government and business.1

B. CYBER SPACE

1. Meaning of cyber space

The term ‘cyber space’ was first used by William Gibson in his science fiction

‘Neuromancer’ in 1982, which he later described as “an evocative and essentially

meaningless buzzword that could serve as a cipher for all of his cybernetic musings. Now it is

used to describe anything associated with computers, information technology, the internet

and the diverse internet culture. Thus, “cyberspace’ is the electronic medium of computer

networks, in which online communication takes place and where individuals can interact,

exchange ideas, share information, provide social support, conduct business, direct actions,

create artistic media, play games, engage in political discussions etc.2

According to Chip Morningstar and F. Randall Farmer, cyberspace is defined more by

social interactions involved rather than its technical implementation. The core characteristic

is that must be an environment which consists of many participants with the ability to affect

and influence each other. In cyberspace, the computational medium is an augmentation of the

communication channel between real people.3

Thus, cyberspace may be described as a conceptual collegeum where world’s

information resources come together without being seen or sensed.4

2. Salient features of cyber space

1 Justice T. Ch. Surya Rao, “Cyber Laws – Challenges for the 21st Century”, Andhra Law Times, 2004, p. 20 2 http://en.wikipedia.org/wiki/Cyberspace#cite_note-1, accessed on 15.07.2009 3 http://en.wikipedia.org/wiki/Cyberspace#cite_note-3, accessed on 15.07.2009 4 Asian School of Cyber Laws, Fundamentals of Cyber Law, 2005, p. 93.

Page 2: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

20

i. Just like the real world comprises the entire earth, cyberspace consists of the

entire virtual world.

ii. The ICTs, computers and Internet Technology are expanding the boundaries of

cyberspace day by day.

iii. According to an estimate, the Cyberspace is doubling every 100 days.

iv. Unlike the problems in the real world, it is very easy to roam around in the

cyberspace on ‘information superhighways’.

v. The speed is tremendous, the reach is unlimited. There is ease of entry and exit.

vi. Very fewer resources are needed to enter cyberspace.

vii. It is easy to disguise one’s identity in cyberspace.

viii. Cyberspace and real world impact each other.

C. NETIZEN

Persons in cyberspace are called netizens i.e. anyone who is associated with

computers, information technology and the Internet. Thus, a netizen is a person who becomes

part of and participates in the larger internet society, which recognizes few boundaries save

language. The term ‘netizen’ comes from the combination of 2 words ‘Internet’ and

‘citizen’.5

The number of netizens had jumped to 700 million in 2001 from a mere 143

million in 1998 and by the year 2005 approximately 1 billion netizens were connected to

internet and this number is increasing at a very fast speed every year. Further there are over

30 million websites online.

D. COMPUTER

1. Meaning of computer

The term ‘computer’ is derived from the word ‘compute’ which means to calculate. A

computer is an electronic machine devised for performing calculations and controlling

operations that can be expressed either in logical or numerical terms. It performs various

operations with the help of instructions to process the information in order to achieve desired

results. Further endless complex calculations can be done in mere fraction of time. Huge data

can be stored without any space problem. Communication has become cheaper, faster and

easier. Similarly difficult decisions can be made with unerring accuracy at comparatively

little cost.

5 http://www.wisegeek.com/what-is-a-netizen.htm, accessed on 15.05.2010

Page 3: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

21

Today computers are widely seen as instruments for future progress and as a tool to

achieve sustainability by way of improved access to information by means of video-

conferencing and e-mail. Indeed, computers have left such an impression on modern

civilization that we call this era as the ‘information age’.6

2. Evolution of computers

i. Abacus

In ancient time, people used either their fingers or pebbles along lines in the sand for

counting. Subsequently, a counting device called ‘abacus’ was built. This device

allowed calculations by using a system of sliding beads arranged on the rack. The

abacus was simple to operate and was used worldwide for centuries. In fact, it is still

used in many countries even today.

ii. Pascaline

In 1642, a French mathematician, Blaise Pascal invented the first functional automatic

calculator. This brass rectangular box also called as ‘Pascaline’ used 8 movable dials

to add sums up to 8 figures long.

iii. Stepped Reckoner

In 1694, German mathematician, Gottfried Wilhem Von Leibniz extended the

Pascal’s design to perform multiplication, division and to find square root. This

machine is known as ‘Stepped Reckoner’. It was the first mass produced calculating

device which was designed to perform multiplication by repeated addition. Like its

predecessor, Leibniz’s mathematical multiplier worked by a system of gears and dials.

The only problem with this device was that it lacked mechanical precision in its

construction and was not very reliable.

6 B.R. Sharma, Computer Crimes: Scientific Criminal Investigation, 2006, p. 27

Page 4: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

22

iv. Difference Engine and Analytical Engine

Charles Babbage, an English Mathematics Professor, is the Father of modern

computer. In 1822, he proposed a machine called ‘Difference Engine’ to perform

differential equations. Subsequently he stopped working on this machine and

developed the ‘Analytical Engine’ in 1833.

v. Herman Machine

In 1889, Herman Hollerith used cards to store data information, which he fed into a

machine that compiled the results mechanically.

vi. Mark-I Machine

The start of World War II produced a substantial need for computer capacity,

especially for the military purposes. However, Mark I, was first successful attempt

which was built as a partnership between Harvard Aiken and IBM in 1944. This

electronic calculating machine used relays and electromagnetic components to replace

mechanical components.7

vii. Electronic Numerical Integrator and Calculator (ENIAC)

In 1946, John Eckert and John Mauchly developed ENIAC (Electronic Numerical

Integrator and Calculator). This computer used electronic vacuum tubes to make the

internal parts of the computer. It used almost all the components and concepts of

today’s high speed electronic digital computers.

viii. Electronic Discrete Variable Automatic Computer (EDVAC)

Subsequently, Eckert and Mauchly developed EDVAC (Electronic Discrete Variable

Automatic Computer) which was the first electronic computer to use the stored

programme concept introduced by John Von Neumann.

ix. Electronic Delay Storage Automatic Calculator (EDSAC)

In 1949, at the Cambridge University, a team headed by Maurice Wilkes developed

EDSAC (Electronic Delay Storage Automatic Calculator) which was also based on

John Von Neumann’s stored programme concept. This machine used mercury delay

lines for memory and vacuum tubes for logic.

7 T.K. Vishwanathan, “Chasing Mirages in Cyberspace”, CBI Bulletin, July, 2000, p. 4

Page 5: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

23

x. Universal Automatic Computer (UNIVAC)

In 1951, the Eckert-Mauchly Corporation manufactured UNIVAC (Universal

Automatic Computer) and its implementation marked the real beginning of the

computer era. During this period, the major computer manufacturers begin to offer a

range of capabilities and prices, as well as accessories such as card feeders, page

printers and cathode ray tube displays.

xi. Computer

During the 1970s there came a large range of applications for cheaper computer

systems and many business organizations adopted computers for their offices. The

vacuum deposition of transistors became the norm and entire computer assemblies

became available on tiny chips.8

xii. Personal Computers (PCs)

In 1980s Very Large Scale Integration (VLSI) design, in which hundreds of

thousands of transistors were placed on a single chip, became common. The

‘shrinking’ trend continued with the introduction of personal computers (PCs), which

are programmable machines small enough and inexpensive enough to be purchased

and used by individuals. Microprocessors equipped with Read Only Memory (ROM),

which stores constantly used, unchanging programs, performed an increased number

of functions. By the 1980s, some personal computers were run by microprocessors

that, handling 32 bits of data at a time, could process about 4,000,000 instructions per

second.

xiii. Advanced Personal Computers (APCs)

By the 1990s, personal computers became part of everyday life. This transformation

was the result of the invention of the microprocessor, a processor on a single

integrated circuit (IC) chip. The trend continued leading to the development of

smaller and smaller microprocessor with a proportionate increase in processing

power.

The computer technology continues to experience huge growth. Computer

networking, computer mail and electronic publishing are just a few of the applications that

have grown in recent years. Advances in technology continue to produce cheaper and more

8 Anantachari, T., “Computer Crime”, Seminar, 1985 May; pp. 39-41.

Page 6: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

24

powerful computers offering the promise that in the near future, computers or terminals will

reside in most, if not all, homes, offices and schools.

3. Generation of computer

A generation refers to the stage of improvement in the product development process.9

In computer we have following 5 generations:

i. First Generation (1940-1956): Vacuum Tubes

The first generation computers used vacuum tubes for circuitry and magnetic drums

for memory and were often very big in size taking up entire rooms. They were very

expensive to operate and in addition to using a great deal of electricity, they generated a lot of

heat, which was often the cause of malfunctions. First generation computers relied on

machine language to perform operations and they could solve only one problem at a time.

While easily understood by computers, machine languages are almost impossible for

humans to use because they consist entirely of numbers. Therefore, computer programmers

use either high level programming languages or an assembly language programming. An

assembly language contains the same instructions as a machine language, but the instructions

and variables have names instead of being just numbers.

a. Features of First Generation of Computers

The vacuum tubes were used in the circuits of these computers.

The input and output operations were done using punched card technology.

For external storage, magnetic tapes were used.

The machine was capable to do one job at a time, therefore batch processing was

adopted.

The operations like setting of switches have to be done by humans.

The language used by these computers was machine language and assembly

language.

9 Dr. K.P.C. Gandhi, “An Introduction to Computer-Related Crimes”, CBI Bulletin, June, 1996, p. 6

Page 7: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

25

b. Examples of First Generation of Computers

The examples of first generation computers are UNIVAC-I, ENIAX and IBM-650.

ii. Second Generation (1956-1963): Transistors

In the second generation computers, the transistors replaced vacuum tubes. Transistor

is a device composed of semiconductor material and was far superior to the vacuum

tube, allowing computers to become smaller, faster, cheaper, more energy-efficient

and more reliable than their first generation predecessors. Though the transistor still

generated a great deal of heat that subjected the computer to damage, it was a vast

improvement over the vacuum tube. Second generation computers still relied on

punched cards for inputs and on printouts for output.10

Second generation computers moved from cryptic binary machine language to

symbolic or assembly languages, which allowed programmers to specify instructions

in words. High-level programming languages were also being developed at this time

such as early versions of COBOL and FORTRAN. These were also the first

computers that stored their instructions in their memory, which moved from magnetic

drum to magnetic core technology.11

a. Features of Second Generation of Computers

Transistors were used in the circuits.

The input operations were performed by using punched cards and magnetic

tapes and for output operations punched cards and papers (printout) were used.

For external storage, magnetic tapes were used.

The orientation was toward multiple users i.e. the machine was capable to

process multiple tasks concurrently.

Human intervention is required for punched card operations only.

The high level languages like FORTRAN, COBOL, BASIC etc. were used as

the languages by the computers.

b. Examples of Second Generation of Computers

The examples of 2nd

generation of computers are IBM-1400, General Electric-635 etc.

iii. Third Generation (1964-1971): Integrated Circuits

10 Id. at p. 8 11 Id. at p. 9

Page 8: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

26

In the third generation of computers, transistors were substituted by integrated

circuits (ICs) of silicon chips which were smaller in size and called semiconductors.

The ICs drastically increased the speed and efficiency of computers and require less

energy. Third generation computers used keyboards for input and monitors for

output. Further, these were having an operating system which allowed the device to

run many different applications at one time with a central program that monitored the

memory. Computers for the first time became accessible to a mass audience because

they were smaller and cheaper than their predecessors.

a. Features of Third Generation of Computers

Integrated circuits replaced transistors. Inspite of their smaller size, they were

capable to perform better than transistors.

For data input operations keyboards and output operations monitors were used

instead of the punched cards.

For external storage magnetic disks were used.

Sophisticated operating systems, which were capable of handling several jobs

concurrently, were used.

More advanced high level languages like PASCAL were used.

b. Examples of Third Generation of Computers

The examples of third generation computers are IBM system/360 etc.

iv. Fourth Generation (1971-1990): Microprocessor (VLIC)

The microprocessor brought the fourth generation of computers, as thousands of

integrated circuits were rebuilt onto a single silicon chip commonly known as Very

Large Scale Integration (VLSI). A silicon chip contains a Central Processing Unit

(CPU). In the world of personal computers, the terms ‘microprocessor’ and ‘CPU’

are used interchangeably. At the heart of all personal computers and most

workstations sits a microprocessor. Microprocessor also controls the logic of almost

all digital devices, from clock, radios to fuel-injunction systems for automobiles.12

a. Features of Fourth Generation of Computers

12 S.K. Verma and Raman Mittal, Legal Dimensions of Cyberspace, Indian Law Institute, New Delhi, 2004, p. 16

Page 9: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

27

The circuits used VLSI and microprocessors of virtually microscopic size,

which led to drastic cut on the size of computer.

The input output devices were the same monitors, keyboard, printer etc. but

refined.

Micro computers have evolved.

Magnetic disks were the primary devices used for external storage.

The use of special software for maintaining large data bases became popular.

The application software for micro computer became popular in this

generation.

b. Examples of Fourth Generation of Computers

The examples of fourth generation of computers are IBM, Systems/370, Burroughs

B-7700 etc.

v. Fifth Generation (Late 1990–Future): Artificial Intelligence (AI)

Fifth generation computing devices, based on artificial intelligence, are still in

development. Artificial Intelligence is the branch of computer science concerned

with making computers behave like humans. The term was coined in 1956 by John

McCarthy at the Massachusetts Institute of Technology, USA. Artificial intelligence

includes games playing, expert systems, neural networks, robotics etc.

As we move from first generation of computers to the fifth generation of computers

the speed, accuracy, versatility and reliability increases whereas the cost and size

decreases.13

4. Types of Computers

According to size and capabilities, the computers can be of following 5 types:

i. Micro computers

These are the most widely used category of computers which we commonly term as

personal computers (PCs). The word ‘micro’ suggests only the size, but not the

capacity. These computers can fir themselves on to a desk top. They are capable of

doing all sort of input-output operations. They can also be connected to few

peripheral devices.

ii. Mini computers

13 Id. at p. 18

Page 10: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

28

These computers are relatively smaller and less expensive than mainframe and

medium sized, but they can be portable in comparison with mainframes. They are

relatively faster and it can support about 10-20 user terminals connected to it. These

types of computers are generally easy to use. They can handle database, statistical

problems, accounting etc. using special software designed for above uses.

iii. Medium-sized computers

These computers are mini versions of mainframe computers, they are relatively

smaller than mainframes and have smaller power than mainframes. Their processing

speeds are relatively high with support for about 200 remote systems.

iv. Mainframe computers

They have capability to support many peripheral devices and terminals, which can

process several million instructions per second (MIPS) and can support more than

thousand remote systems. Mainframes are mostly used for system like railway

reservation etc.

v. Super computers

These are the computers which are characterized as being the fastest, with very high

processing speeds, very large size, most powerful and most costly of all their

cousins. These computers are used widely in complex scientific applications like

processing geological data, weather data, genetic engineering etc. These computers

recognize words up to length of 64 bits and more. Their speed of calculations is up to

1.2 billion instructions per second and they can take input from more than 1000

individual work stations. PARAM is an example of super computer developed in

India.14

5. Major components of computer

A computer has following 2 major components:

i. Hardware

Computer hardware is the collection of various physical components of the computer

like the computer itself, the input-output devices, printers and other peripheral

devices. The computer hardware can blindly perform some basic operations like

addition, subtraction, data transfer, control transfer and simple tests. These

components are tangible, which one can see and feel. To enhance the capabilities of

14 Jyoti Rattan, Cyber Laws, Bharat Law House Pvt. Ltd., New Delhi, 2011, p. 26.

Page 11: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

29

the hardware and to perform complex operations, we need to take help of software

component.

ii. Software

Software is a set of instructions usually termed as programmes which are required for

processing activities of the computer. These set of programmes can be used to solve

real world problems. The capability of computer depends largely on the software

component. Software refers not only to the programmes which make the computer

work, but also those programmes which are used to solve real life problems.15

6. Characteristics of computers

Computers are developed to perform various operations, such as calculations and

data processing, or simply for entertainment. They have the following basic

characteristics16

:

i. Speed

The computers process data at an extremely fast speed, at millions of instructions per

second. In few seconds, a computer can perform such a huge task that a normal

human being may take days or even years to complete. The unit of speed of a

computer is MHz (Megahertz) i.e. one million instructions per second. At present, a

powerful computer can perform billions of operations in just one second.

ii. Accuracy

The computers are very accurate. However, sometime there could be error which is

due to error in instructions by the user. Therefore, its level of accuracy depends on

the instructions and the type of machines being used. As computer works according

to instructions given, therefore, faculty instructions for data processing may lead to

faulty results. This is known as GIGO (Garbage In Garbage Out).

iii. Reliability

The reliability is the measurement of performance of a computer, which is measured

against some predetermined standards. Generally, the output generated by the

computer is very reliable, but it is reliable only when the data, which is passing as

input to the computer and the program which gives instructions are correct and

reliable. Inconsistent, incorrect and unreliable programs and data makes the

15 Id. at p. 28. 16 Anurag Gupta and Anshuman Sharma, Fundamentals of Internet Applications, 2007, p. 3.

Page 12: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

30

computer erroneous and unreliable i.e. for computer to be reliable, the input should

be reliable. The popular phrase ‘Garbage In Garbage Out’ i.e. GIGO represents the

reliability constraint of the computer. Further, the major reason behind the reliability

of the computer is that, at hardware level, it does not require any human intervention

between its processing operations.

iv. Diligent

As computer is a machine, so it does not feel tired or distracted. Its performance is

consistent even to an extent of more than 10 million calculations, it does each and

every calculation with same speed and accuracy.17

v. Intangible benefits

Computers give many intangible benefits like flexibility, ability to accommodate

changes and expansion, competitive advantage, better service etc.

vi. Cost reduction

As we move from 1st generation to 4

th generation of computers, the cost factor has

reduced. Further, the benefits which computer give, override the costs, thereby

making the cost incurred to be recovered within no time, in turn reducing the

effective cost, thus one can have competitive edge over others.

vii. Large storage capability

Computers can store large amounts of data. Though the main memory of the

computer is relatively small and it can hold only a certain amount of information but

the data is stored on secondary storage devices such as magnetic tapes or disks.

Small sections of the data can be accessed very quickly and brought into the storage

devices, as and when required, for processing.

viii. Versatility

The computer performs 3 basic operations. Firstly, it is capable to access and accept

information through various input-output devices from the user. Secondly, it

performs basic arithmetic and logical operations on data as desired. Thirdly, it is

capable to generate the desired output in the desired form. It can work upon numbers,

graphics, audio, video etc. making it really versatile. Further, it can perform multiple

tasks simultaneously. For e.g. at one moment it can be used to draft a letter, another

17 Id. at p. 5

Page 13: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

31

moment it can be used to play music and in between, one can print a document as

well. All this work is possible by changing the program (computer instructions).

ix. Resource sharing

In the initial stages of development, computers were used to be isolated machines.

With the tremendous growth in computer technologies, today computers have the

capability to connect with each other. This has made the sharing of costly resources

like printers possible. Apart from device sharing, data and information can also be

shared among groups of many users.18

7. Limitations of computer

A computer has the following disadvantages:

i. It is a machine and does not work by itself, it requires set of instructions to be

provided for else computer hardware is a waste.

ii. It is not intelligent, it needs instructions for each and every task to be performed

by it, which should be given in detail.

iii. It cannot take decisions on its own, one has to program the computer to take an

action if some conditions prevail.

iv. Unlike humans, the computers cannot learn by experience.

E. NETWORKS

The value of a computer increases when it is connected to other computers. It is just

like a telephone. If A has telephone then he can use his phone to call any of his friends

provided all his friends have telephone. Hence, where his friends are not having telephone

then it is useless for A to have telephone. Similarly, where A has computer it will be more

useful for him in case it is connected to other computers. This connection among the

computers constitute network. Therefore, a network is a collection of computers that are

connected through a communication channel i.e. cables, fiber optics etc. to share data,

hardware and software.19

1. Types of networks

Network can be classified into following 2 broad categories depending on their scope

and connectivity:

i. Basic type networks

18 Id. at p. 7 19 L.C. Amarnathan, “Crimes Related to Computer Network”, CBI Bulletin, February, 1999, p. 39

Page 14: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

32

It is of following 2 types:

a. Local Area Network (LAN)

These networks connect computer and other information processing devices, which

are located in a limited physical area (roughly 1 Km radius) like office, classroom,

building, factory, worksite etc. LANs are essentially a part of many organizations for

providing telecommunications network capabilities to the end users.

Most of the LANs use a range of communication media like twisted pair wire, co-

axial cable, wireless radio etc. to interconnect various microcomputers and work

stations. For making this communication possible, every PC has the circuit board

known as Network Interface Unit (NIU). Most of the LANs use a powerful

microcomputer having a large hard disk, commonly known as network server, which

has a network operating system which controls telecommunications and the use and

sharing of network resources.20

Now a day’s all the computers are designed so that it is easy to connect them to a

LAN without buying any extra equipment. When A wants to send some information

through his computer to B, then he will put the information in its NIU with address of

B’s computer. The job of NIU is to deliver the message safely to the computer of B.

the NIUs of all the computers are connected to an electronic circuit called hub.

Therefore, such interconnection of computers in a small area is called LAN.

b. Wide Area Network (WAN)

Some of the organizations are very widespread, where offices are not limited to a

building but are spread throughout large city or metropolitan area. The

communication networks which cover large geographic area (roughly 100 sq. Km.)

are called WANs. These may be called by different names depending upon the area

e.g. communication networks which cover metropolitan area like Mumbai, Delhi,

Kolkata etc. is called Metropolitan Area Networks (MANs).

The connection between computers in a MAN is usually throughout the local

telephone network. In India, telephone company Mahanagar Telephone Nigam

Limited is playing very important role in metropolitan cities. For e.g. DELNET is

MAN which is a local network connecting the libraries in Delhi. Any user may use

DELNET to see which material is available in which library.

20 Chetan Srivastava, Fundamentals of Information Technology, 2000, p. 341.

Page 15: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

33

ii. Interconnected networks

It is of following 3 types:

a. Intranet

The network which connects the various locations and gives connectivity within the

organization is called intranet. These networks are limited to the organization and

these are designed in such a way so as to provide easy access to the information

available on the Internet website to the end users.

b. Extranet

Those networks which link some of the intranets of the company with those of its

business partners, customers, suppliers, consultants etc. who can access selected

Internet websites and company’s database are known as extranet.

c. Internet

The term ‘Internet’ is derived from 2 words ‘interconnection’ and ‘networks’. Internet

is a worldwide system of computer networks i.e. network of networks which allows

the user to share information on those linked computers. It consists of thousands of

separately administered networks of various sizes and types. Each of these networks

comprises number of computers. LANs are connected by using public switched

network to create a WAN and when number of WANs and other interconnected

networks such as intranet and extranet are connected, it results in Internet. All

computers connected to the Internet communicate to each other only by using a

common set of rules which are known as protocol. For this communication, each

computer should have its own address which is called as IP address.21

2. Evolution of Internet

i. Advanced Research Projects Agency Network (ARPANET)

Signing of Internet started in 1960, when it grew out of an experiment conducted by

the US Department of Defence. They wanted to create a computer network that could

continue to function in the event of a disaster, such as a nuclear war. Even if a part of

the network was damaged or destroyed, the rest of the system would continue to

work. That network was known as Advanced Research Projects Agency Network

21 Id. at p. 345

Page 16: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

34

(ARPANET) which linked US scientific and academic researchers. It was the

forerunner of today’s Internet.

ii. Transmission Control Protocol/Internet Protocol (TCP/IP)

By 1970s, Advanced Research Project Agency (ARPA) helped in the development of

a new protocol known as Transmission Control Protocol/Internet Protocol (TCP/IP)

for transferring data between the networks. The TCP/IP is the core of Internet.

iii. National Science Foundation Network (NSFNET)

Internet really took off in the 1980s when the National Science Foundation (NSF)

and ARPANET linked its 5 regional super computer centres at major universities so

that many users could share their work. Later on, NSF created NSFNET (National

Science Foundation Network) which is a series of networks for research and

education communication. This network was based on ARPANET protocols and it

was provided free to any US research and educational institution.

iv. World Wide Web (WWW)

In the 1980s, Usenet newsgroup and Electronic-Mail (e-mail) came into picture.

Internet really became popular in the 1990s after the development of the World Wide

Web (WWW). Before that, it was open for a handful of sites only. It is amazing that

in June 1993, there were only 130 websites, but now there are millions.22

v. Hyper Text Transfer Protocol (HTTP)

In 1991, CERN (Conseil European pour la Recherche Nucleaire) released World

Wide Web, also known as the web. The CERN team developed the protocol based on

hypertext (Hyper Text Transfer Protocol i.e. HTTP) that makes it possible to connect

content on the web with hyperlinks. Earlier, the Internet was largely a text based

system. However, the WWW permitted access to information using a Graphical User

Interface (GUI) and the use of hypertext link to access information across the network

without being a computer expert and without knowing the exact physical location.

Now the websites are able to provide users with a range of experiences such as

pictures, multimedia, sound, video and interactivity.

With the growth of Internet, the quality and variety of information has also grown.

Today the Internet is a repository of every consumable type of information.

22 A.G. Noorani, “Cyberspace and Citizen’s Rights”, Economic and Political Weekly, June, 1997, p. 1299

Page 17: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

35

3. History of Internet in India

i. Videsh Sanchar Nigam Limited (VSNL) – 1995

Internet was initially available in India through ERNET. It was made available for

commercial use by the Videsh Sanchar Nigam Limited (VSNL) in August 1995.

Initially it started with dial-up in 6 cities on August 14, 1995 and gradually developed

as a potential source of e-commerce in India.23

The role of fibre optics communication

from Integrated Service Digital Network (ISDN) has accelerated the growth of

Internet in the new millennium.

ii. Rediff.com - 1996

The rediff.com was launched by Shri Ajit Balkrishnan in 1996.

iii. First Cyber Café – 1996

India’s first cyber café started in 1996.

iv. First Online Banking by ICICI – 1997

India’s first online banking was launched by ICICI Bank in 1997.

v. Internet Service Provider Policy – 1998

With the introduction of Internet Service Provider Policy (ISP) in 1998, the monopoly

of VSNL on Internet came to an end. Satyam Infoway (Sify)24

was the first ISP which

started functioning in India. The expanding dimensions of Internet25

offered vast

scope and opportunities to human beings to identify, evaluate and exchange

information for the benefit of public26

all over the world. It provided new

environment, new culture, new business links and commercial networks virtually

revolutionizing all walks of human life.

4. Services of Internet

Internet mainly provides following 4 services:

i. Communication services

The communication services available on the Internet are used to access different

types of information and some are used to exchange information with other persons or

23 India ranks 33rd in the world in terms of e-commerce and on-line shopping 24 Satyam Infoway (Sify) was incorporated in 1995 and was registered under different domain names. 25 In 2006, there were about 40 million net users and Internet cyber cafes and more than 10 lakh persons

engaged in online share trading. 26 The Indian Railways launched online site in 2001 and Air Deccan was the first airline to start online air-

ticketing in 2004.

Page 18: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

36

groups according to their interests. The communication services27

are of following 7

types:

a. Electronic Mail (E-mail)

An e-mail is one of the most common Internet services. It is used to send and receive

electronic messages between persons anywhere in the world. It may consist of text,

images, audio clips, video clips etc. this service also allows us to attach files that

contains text documents, executable programs, spreadsheet, graphs etc. The main

advantage of e-mail over the conventional mail system is that the delivery of e-mail is

much easier, cheaper and faster. Moreover, the same message can be sent

simultaneously to a group of people. However, e-mail can also be used for threat,

defamation, stalking etc.28

Some of the most commonly used e-mail programs are

Microsoft Outlook Express, Netscape Messenger, and Eudora etc.

b. Internet Relay Chat (IRC)

IRC is a multi-user chat system that allows people from all over the world to

communicate simultaneously in real time. These conversations take place on

thousands of channels which are virtual locations on IRC network where users need to

join in order to chat with others. These channels are usually based on specific topics

of interest. When a user sends a message to a channel, a copy of it is received by all

the active participants of a given channel. The participants can either read those

messages and reply with an appropriate response or ignore them. The channel remains

active as long as the users are connected to it. However, when the last person leaves

the channel, then it vanishes automatically. To access IRC, one needs to run IRC

software on his computer. Some of the IRC softwares are WSIRS, VIRC, MIRC etc.

c. Internet Telephony

Internet Telephony is also known as Voice over Internet Protocol (VoIP). It lets users

talk across the Internet to any PC equipped to receive the call for the price of only the

Internet connection rather than as on Public Switched Telephone Network (PSTN).

Each person on the Internet phone call needs a computer installed with Internet Phone

Program alongwith a microphone and a speaker. When a connection is established,

27 Anurag Gupta and Anshuman Sharma, Fundamentals of Internet Applications, 2007, pp. 18-19. 28 “E-Mail Threat to Delhi Chief Minister Shiela Dikshit”, The Tribune, January 11, 2002, p. 1

Page 19: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

37

voice conversation can take place, although sound quality can be poor during the

transmission process.

d. Telnet

Telnet is one of the oldest Internet services that allow us to log on to a remote

computer that is attached to the Internet. It acts as an intermediator between your

computer and the remote computer that you want to access. However, with Telnet,

only those users are permitted to access the information from the remote computer

which is allowed by the organization.29

e. Newsgroup

It is a forum for interested people to discuss topics of common interest such as news,

computers, science, business, recreational activities, cooking, social issues, research

and development etc. Some of the newsgroups are accessed freely while others need

to be subscribed and users need to agree on the terms and conditions of the

newsgroups provider. Further, to participate in a discussion, the user sends a message

to the newsgroup using Electronic Bulletin Boards (EBB) which is seen by all the

members of the newsgroup. After reading the message, the other users in the

newsgroup can choose to reply either to the whole newsgroup or to the originator of

the message. The entire collection of Internet newsgroups is known as ‘Usenet’ which

contains thousands of newsgroups on a large number of topics.

f. Mailing Lists

A mailing list is an organized way to enable group of Internet users to share

information through e-mail usually on a specific topic or for a specific purpose. The

user must subscribe himself to the mailing list server if he wants to be a part of a

mailing list. Once subscribed, he can send/receive all messages relating to that topic

to/from all other subscribers through e-mail. It looks similar to a newsgroup except

that it uses e-mail mailing list server instead of bulletin boards. Some of the

commonly used mailing list software programs are LISTSERV, List Proc, Mailman,

Majordomo etc.

g. Instant Messaging

29 P.N. Grabosky, “Crime in Cyberspace”, CBI Bulletin, February, 1999, p. 14

Page 20: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

38

Instant Messaging is an online, interactive real time communication between 2 or

more people who are connected to the Internet. It has a unique combination of useful

chat features such as check for the availability of users, chat privately with a single

person, send immediate message that receive quick attention, voice telephony, e-mail

sending and receiving, file transfer, group chat and alter the user when his friends sign

in or exits. Some of the most commonly used instant messaging programs include

Yahoo Messenger, ICQ, America Online Instant Messenger, MSN Messenger etc.30

ii. Information retrieval services

Internet is a collection of thousands of servers which maintain incredible amount of

information. The users can access information from these huge databases but there is

no central listing of sites and the data they contain. Therefore, users find very difficult

to locate the desired information quickly. In order to overcome these problems, many

information retrieval services have been designed which allow you to retrieve

information in a quick manner. Most of these services are provided free of cost. The

information retrieval services31

are of following 5 types:

a. File Transfer Protocol (FTP)

FTP enables the users to transfer files between computers connected to the Internet.

After user connects to the FTP server, he can navigate directories that are accessible

to FTP and look for the file he wants to retrieve. Once he has located, it can be

transferred on his computers. All this is done using a FTP client program that is

installed on user’s computer. Using FTP, you can download files containing books,

articles, software, games, images, application forms etc. Some FTP servers store files

that can be accessed by anyone, these servers are known as ‘Anonymous Servers’.

However, some FTP servers require username and password to log in.

30 Dr. M. Ponnaian, “Cyber Crimes, Modern Crimes and Human Rights”, The PRP Journal of Human Rights,

July-September, 2000, p. 14 31 Anurag Gupta and Anshuman Sharma, Fundamentals of Internet Applications, 2007, pp. 20-21.

Page 21: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

39

b. Archie

These are many FTP servers on the Internet containing huge volume of information.

In order to find a particular file, a user has to login to each FTP server one by one to

find the server that contains the required file which is very daunting task. This

problem is solved by archie which is a database of public FTP sites and their contents.

It regularly monitors the large number of FTP sites and keeps the database containing

the information about the software, documents and data files available for

downloading up to date. If you need to search a file, you simply type its name in the

archive server’s homepage which returns the list of FTP sites that contains files on the

required topic.

c. Very Easy Rodent Oriented Netwide Index to Computer Archives (VERONICA)

It is an archie variation. It is gopher based resource that provides access to the

information resources stored on most of the world’s gopher servers. It supports an

index of title on which a search can be performed. When the VERONICA’s user

submits a query using a gopher client, it results in a gopher menu containing

information items whose title contains the specified keyword to be searched. This

gopher menu can further be used like any other gopher menu.

d. Gopher

A gopher provides hierarchical menu based system that can be used to search, retrieve

and display documents from remote sites on the Internet. Each gopher server contains

its own system of menu listing subject-matter topics, local files and links to other

gopher servers. When a user wants to search for a particular topic through a gopher

client program, a menu of choices is displayed to the user. Each menu item consists of

short self explanatory phrase. On clicking the menu items, one may either get the

contents of a data file or reference to a menu on another gopher server. This process

continues until the required file is obtained. This hierarchical menu based approach of

the gopher helps to narrow the search and locate information quickly from anywhere

in the world. One of the commonly used gopher client program is Turbo Gopher.

e. Wide Area Information Service (WAIS)

WAIS is an Internet search tool which works in accordance with Client-Server

principle. The WAIS client program interacts with a WAIS server that enables the

Page 22: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

40

user to specify the databases requested for search and to conduct a search on the basis

of keywords specified from those databases and send a response back to the WAIS

client program in the form of menu, listing all the files that contain those keywords.

iii. Web services

Web services are the web based enterprise applications that are used for exchanging

data between applications or systems. It allows software applications written in

various programming languages and running on various platforms to interact

smoothly with each other over the Internet using open XML (Extensible Markup

Language) based standards and transport protocols.

Web services provide an ability to deliver applications to the user at a much lower

cost as the distribution cost is reduced significantly. Microsoft NET is one of the

major XML web service providers.32

iv. World Wide Web (WWW)

The World Wide Web (WWW) or W3 or Web is one of the most important services

which was developed by Timothy Berners Lee in 1989. It is a mechanism for

accessing linked documents spread over thousands of servers all over the Internet.

These documents, also known as web pages, support not only text strings but also acts

as a link to other related pages anywhere in the world. These links are known as

hypertext links.

Each time, the user clicks on these links, the www retrieves the appropriate page from

the server and displays its content. Users are able to navigate around the web freely

with no restrictions, following their own logic, needs or requests. Users primarily

access the web through the web browser applications such as Internet Explorer,

Netscape Navigator, Web 2000, Lynx, Mozilla etc.33

5. Limitations of the Internet

Internet is acting as a double edged technological weapon. On one hand, it is

providing so many benefits in the form of different services whereas on the other hand it is

also an extremely powerful tool in the hands of bad elements for committing cyber crimes.

The misuse of the Internet is also growing every day. Bad elements are getting better

32 Anurag Gupta and Anshuman Sharma, Fundamentals of Internet Applications, 2007, p. 22. 33 Ibid.

Page 23: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

41

networked, facilitating cyber crime. The cyber crimes are pretty easy to commit with very

little resources, but the damage caused could be very huge.

The effect of cyber crime committed through virtual world on the real world is

devastating. It is observed by Lalitha Sridhar that, “our understanding of the virtual world is

woefully slim; and of cyber crimes, even less. But, as law enforcers are finding out, their

effect on the real world is devastating.”34

In some countries, problems have arisen from the use of new information and

communication technologies for trafficking in women and children and for purposes of all

forms of economic and sexual exploitation.35

F. INFORMATION TECHNOLOGY (IT)

The term ‘information technology’ consists of 2 words ‘information’ and

‘technology’. Information is essential in our daily life for making decisions, communication,

knowledge and productivity. Information means a collection of facts gathered by various

means or communication to draw a conclusion. It is the representation of knowledge such as

facts, data or opinions in any form i.e. textual, numerical, graphic, audio or video form.

However, technology is the study of science. It is the specific information and knowledge

required for the practical purposes like development in various fields. Therefore, the term

‘Information Technology’ refers to scientific, technological and engineering disciplines as

well as management technologies used in information handling, communication, processing,

their applications and associated software, equipment and their interaction. Hence IT

comprises hardware, software, people and data.36

G. CYBER CRIME

The term ‘Cyber Crime’ is frequently used in 21st century knowledge society and is

created by combination of 2 words ‘cyber’ and ‘crime’. The term ‘cyber’ denotes the

cyberspace i.e. virtual space and means the informational space modeled through computer,

in which various objects or symbol images of information exist. It is the place where the

computer programs work and data is processed.

34 Lalitha Sridhar, “Cyber Crimes and the Real World”, Women’s Feature Service

http://www.surinenglish.com/noticias.php?Noticia=286, August 8-14, 2003 35 United Nations, The Beijing ‘Outcome Document’, New York, 2000. 36 Pearson, Introduction to Information Technology, 2006, p. 189.

Page 24: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

42

However the term ‘crime’ refers to a social and economic phenomenon and is as old

as the human society. Crime is a legal wrong that can be followed by criminal proceedings

which may result into punishments.37

As per Lord Atkin “the criminal quality of an act

cannot be discovered by reference to any standard but one, is the act prohibited with penal

consequences”38

Cyber crime is multiplying like mushrooms. According to the latest data available

from the Cyber Cell of Delhi Police the number of registered cyber crimes in the city has

gone up by 1.5 % when compared between 2008 and 2009. About 67 e-mail hacking cases

were registered in 2008 while 171 cases of e-mail hacking came to light in 2009. In 2008,

about 812 cyber crime complaints were registered by Delhi Police while in 2009 this number

went to 1257.39

H. CYBER CRIMINAL

The emerging information and communication technology inevitably has an immense

impact on the life of the people in modern time, but the advantages and benefits global

connectivity have brought with them certain dangers emanating from inter-connectivity of

information networks which provide scope for cyber criminals to carry on their criminal

activities in cyberspace.40

Unlike traditional offenders, the cyber criminals are hi-tech knowledgeable persons

who invade rights of computer users by unauthorized access to their computer system or

computer networks. Cyber criminals usually indulge in techno-vandalism causing damage to

files and programs of the computer user by unauthorized access, not necessarily for monetary

gain but may be prompted by an adventure or harassing the victim.

Cyber criminals may constitute various groups or organizations according to object of

their criminal activities. Besides the techno-criminals, the other category of cyber criminals

may be as follows:

1. Children and Adolescents between the age group of 8 to 18 years

Quite a large number of amateur hackers and cyber criminals are teenagers who do

not know that what they are doing is an act prohibited by law or is a crime. The reason for

37 Granville Williams, Britain’s Media: How They Are Related, 1996 38 Proprietary Articles Trade Association v. A.G. for Canada, (1932) 39 “Investigators Feel the Heat as Cyber Crimes on the Rise”, The Pioneer, February22, 2010, p. 8 40 Ahmed Farooq, Cyber Law in India – Law on Internet, 2005, p. 31.

Page 25: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

43

this kind of delinquent behavior among children and adolescents are mainly due to

inquisitiveness and curiosity of knowing and craze for grasping new things. For them, it is an

adventure or fun to hack into someone’s computer system or website. Other cognate reason

may be to prove themselves over-smart among their friends and colleagues. Adolescents may

also be psychologically motivated to explore new website by unauthorized access without

really knowing that they are doing a criminal activity.

2. Professional Hackers/Crackers

The vast use of computers for e-business and industrial management for storing data

and information in electronic form has led these enterprises to employ some hackers41

to filch

the credible, reliable and valuable information for commercial gain. The attraction for the use

of professional hackers in business or industrial intelligence also flows from the fact that no

physical presence is required to gain access to sensitive documents which hacking can

retrieve. They are also employed to crack the system of the employer as a measure to make it

safe by detecting the loopholes.

Hackers are mostly organized together to accomplish certain objective. Hacktivists

are the hackers with a particular motive which may be to avenge their political bias,

fundamentalism or an act done for some big business organization for causing damage to its

rival competitors. Thus, the reason may be political, communal or commercial activism etc.

Pakistani hacktivists are known to be world’s most notorious hackers. They mainly target the

Indian Government sites with political motives. The attacks on nearly 250 prominent

websites by a group of hackers known as ‘Pakistani Cyber Warriors’ is a good example of

political hacktivists at work.42

3. Disgruntled Employees

This category of employees includes those persons who have either been sacked by

their employers or are reprimanded for their nefarious activities. In order to avenge their

discontentment, these persons generally resort to hacking the computer system of their

employers to cause him financial loss or damage. With the extensive use of computers and

automation processes in modern times, it is easier for the disgruntled employees to do more

41 ‘Hacker’ is a person who is good at programming or operating systems and maliciously meddles with the

computer software to extract sensitive information by poking around. Hackers who meddle with the computer

system maliciously or for criminal purposes are technically called as ‘Crackers’. 42 Indian Express, (Bombay edition), dated July 10, 2001

Page 26: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

44

harm to their employers by hacking the computer which can bring the entire system down

and thus paralyze the employer’s business related activities.43

I. MALWARE OR MALICIOUS COMPUTER CODES

The malware or malicious computer codes means any code which affects the normal

functioning of the computer. These are of following types:

1. Viruses

Virus or Vital Information Resource Under Siege is basically a program written for

destructive purpose. The term ‘computer virus’ was used for the first time by Fred Cohen44

in

his thesis published in 1986 wherein he referred to viruses that propagate by attaching

themselves directly to the computer programs. These viruses are widespread today as a real

danger to most computers and, therefore, the computer users are expected to have basic

knowledge of the working of the viruses in order to save their computer against viral

infections.45

A virus may temporarily intercept the computer service to display a message on the

screen, or it may bring down the infected computer system. Thus, it may be disruptive or

destructive. Most viruses need some kind of activation mechanism to set them off. They may

remain dormant and undetected for long periods of time.46

Thus, a computer virus is a program designed to replicate and spread, generally with

the victim being oblivious to its existence. Computer viruses spread by attaching themselves

to other programs or to the boot sector of a disk. When an infected file is activated or

executed or when the computer is started from an infected disk, the virus itself is also

executed. It often lurks in the computer memory, waiting to infect the next program that is

activated or next disk that is accessed.47

The viruses are classified into following categories48

:

i. File infectors

43 The disgruntled employee find it good substitute to resort to ‘hacking’ rather than going on strike, which

causes them monetary loss due to ‘no work no pay’ rule. 44 Dr. Fred Cohen in his doctoral thesis on electrical engineering presented to the University of Southern

California in 1986 defined ‘computer virus’ as a program that can infect to other programs by modifying them

to include replicate version of itself. 45 R.K. Suri and T.N. Chhabra, Cybercrime, 2003, p. 579 46 R.C. Mishra, Cybercrime: Impact in the New Millennium, 2002, p. 89. 47 Jaffrey & B. Gregory, Fighting Computer Viruses, 1997, p. 113 48 http://www.topbits.com/types-of-computer-viruses,html ; http://www.en.wikipedia.org/wiki/ILOVEYOU

accessed on 12.05.2010.

Page 27: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

45

The file infector viruses attach themselves to ordinary program files. They usually

infect *.COM or *.EXE programs, though some can also infect any program for which

execution is requested such as *.SYS, *.OVL, *.PRG and *.MNU files. When a user runs an

infected application, the virus code executes first and installs itself independently in the

computer’s memory so that it can copy itself into subsequent application that the user runs.

The file infectors may further be sub-classified into following categories49

:

a. Direct action file infectors

They infect a program each time it is executed.

b. Resident infectors

They use the infected program to become resident in memory from where they attack

other programs as they are loaded into the memory.

c. Slow infectors

They infect files as they are changed or infected, thus ensure that the infection is

saved.

d. Sparse infectors

These viruses seek to avoid detection by striking only certain program on occasional

basis.

e. Companion infectors

They create new infected programs that are identical to the original uninfected

programs.

f. Armoured infectors

They are equipped with defence mechanism to avoid detection by anti-virus

technology.

g. Polymorphic infectors

These viruses change their appearance each time an infected program is run so as to

avoid detection.

ii. Boot-Sector viruses

Boot sector viruses infect executable code found in certain system areas on a disk,

which are not ordinary files. Boot sector viruses reside in a special part of a diskette or hard

disk that is read into memory and executed when a computer first starts. The boot sector virus

normally contains the program code for loading the rest of the computer’s operating system.

49 R.C. Mishra, Cybercrime: Impact in the New Millennium, 2002, p. 91.

Page 28: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

46

Once loaded, a boot sector virus can infect any diskette that is placed in the drive. It also

infects the hard disk so that the virus is loaded into memory when the system is restarted.

Such viruses are always memory resident viruses.50

iii. Macro-viruses

Macro-viruses are independent of operating systems and infect files that are usually

regarded as data rather than as programs. These viruses use an application’s own macro-

programming language to distribute themselves. They have potential to inflict damage to the

document or to other computer software. They can infect Word files as well as any other

application that uses a program language. They can spread much more rapidly than other

viruses because many people share ‘data files’ freely. The first macro-virus ‘Concept’ was

observed in 1995 which infected its Microsoft Word document and is now the most prevalent

virus in the world. Presently, more than 1,000 macro-viruses are known to exist.

iv. Multi-partite or Boot and File viruses

They are of following 8 types:

a. File systems or cluster viruses

File systems or cluster viruses are those that modify directory table entries so that the

virus is loaded and executed before the desired program. The program itself is not

physically altered, but only the directory entry is affected.

b. Fast and Slow infectors

A fast infector is a virus which, when it is active in memory, infects not only

programs which are executed but also those which are merely opened. The result is that if

such a virus is in memory, running a scanner or integrity checker can result in all programs

becoming infected at once. The slow infector is a virus that, if it is active in memory, infects

only files as they are modified or created.51

c. Sparse infectors

These viruses infects only occasionally. For e.g. every 10th

executed file or only files

whose lengths fall within a narrow range etc. By infecting less often, such viruses try to

minimize the probability of being discovered by the user.

d. Stealth virus

50 Kamath Nandan, Law Relating to Computers, Internet and E-commerce, p. 286. 51 Ramesh Subramanium, “Computer Virus – How to Combat it”, The Administrator, April-June, 1990, p. 54.

Page 29: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

47

A stealth virus hides the modifications it has made in the file or boot record, usually

by monitoring the system functions used by programs to read files, and forging the result of

such system functions so that program which try to read these areas see the original

uninfected form of the file instead of the actual infected form. Thus, the viral modifications

go undetected by anti-viral programs. However, in order to do this, the virus must be resident

in memory when the anti-viral program is executed.

e. Polymorphic virus

A polymorphic virus is one that produces varied, yet fully operational, copies of itself

in the hope that the virus scanners will not be able to detect all instances of the virus. The

most sophisticated form of polymorphic virus discovered so far is ‘Mutation Engine’ written

by Bulgarian virus writer who calls himself as the ‘Dark Avenger’.

f. Companion virus

A companion virus is one that instead of modifying an existing file, creates a new

program, which unknown to the user, gets executed by the command-line interpreter instead

of the intended program. On exit, the new program executes the original program and

therefore, things will appear to be normal. This is done by creating an infected .COM file

with the same name as an existing .EXE file.

g. Armoured virus

An armoured virus is one that uses special tricks to make the tracing, dispute-

assembling and understanding of its code more difficult. For e.g. Whale virus.52

h. Virus hoax

A virus hoax generally appears as an e-mail message that describes a particular virus

that does not exist. These e-mails carry the message that if you download an e-mail with a

particular subject line, your hard drive will be erased. Such messages are designed to panic

the computer users. The e-mail contains a warning and a plea for the reader to forward it to

the others. The message then acts much like a chain letter propagating throughout the Internet

as individuals receive it and then innocently forward it. The best thing to do on receipt of

such an e-mail is to ignore and delete it.

2. Trojan

i. Meaning of Trojan

52 Supra note 47, p. 115

Page 30: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

48

The term ‘Trojan’ has its origin from the classical myth of the Trojan horse. In the

12th

Century B.C., Greece declared a war on the city of Troy. The dispute arose when the

Prince of Troy abducted the Queen of Sparta and declared that he wanted to marry her. This

naturally angered the Greeks and they besieged Troy for 10 years but met with no success as

Troy was very well fortified. In the last resort, the Greek Army pretended to be retreating and

left behind a huge wooden horse. The people of Troy saw the horse and thinking that it was

some kind of present from the Greeks, pulled the horse into their city unaware of the fact that

the hollow wooden horse had some of the best Greek soldiers sitting inside it. Under the

cover of night, the soldiers snuck out, opened the gates of the city, and later, together with the

rest of the Army, killed the entire Army of Troy. Similar to the wooden horse, a Trojan horse

program pretends to do one thing while actually doing something completely different.53

In software field, Trojan means an unauthorized program, which passively gains

control over another’s system by representing itself as an authorized program. The most

common form of installing a Trojan is through e-mail. It is a malicious, security breaking

program that is disguised as something benign, such as a directory lister, archiver, game or

even a program to find and destroy viruses.

ii. Types of Trojan

Trojans are mainly of following 6 types:

a. Remote Administration Trojan (RAT)

These are the most common Trojans. They let a hacker access the victim’s hard disk

and also performs many functions on his computer like shut-down his computer, open

and close his CD-ROM drive etc. Modern RATs are very simple to use. They come

packaged with 2 files namely, the server file and the client file. The hacker tricks

someone into running the server file, gets his IP address and gains full control over his

computer.

b. Password Trojan

Password Trojans search the victim’s computer for password and then send them to

the attacker or the author of the Trojans. Whether it is an Internet password or an e-

mail password, there is a Trojan for every password. These Trojans usually send the

information back to the attacker via e-mail.

53 Ranbir Singh and G. Singh, Cyberspace and Law – Issues and Challenges (NALSAR University Press), p. 97.

Page 31: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

49

c. Privileges elevating Trojan

These Trojans are used to befool the system administrators. They can either be bound

into a common system utility or pretend to be something harmless and quite useful

and appealing. Once the administrator runs it, the Trojans will give the attacker more

privileges on the system.

d. Key-loggers

This type of Trojans is very simple. They log all the victim’s keystrokes on the

keyboard including the password and then either save them on a file or e-mail them to

the attacker. Key loggers usually do not take much disk space and can masquerade as

important utilities, thus making them very difficult to detect.54

e. Destructive Trojans

These Trojans can destroy the victim’s entire hard drive or just scramble important

files. Some might seem like joke program, while they are actually ripping every file

they encounter to pieces.

54 Id. at p. 99

Page 32: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

50

f. Joke Programs

Generally joke-programs are not harmful. They can either pretend to be formulating

your hard drive sending all your passwords to some hacker, self-destructing your

computer, turning in all information about illegal and pirated software that you might

have on your computer. In reality, the programs do not cause any damage. For e.g.

Back Orifice (BO), Net Bus 2 Pro, Deep Throat V2 etc.55

3. Worm

Historically, the term ‘worm’ was used for the first time by John Brunner in his book

on science fiction entitled ‘The Shockwave Rider’. In his book Brunner described a

totalitarian form of government, which kept control over their citizens by the use of a

powerful computer network. A freedom fighter who opposed to this dictatorial

misrule, introduced in the said computer network system a contaminant, which was

called ‘tapeworm’. This tapeworm infected the computer system and forced the

government to shut down the network and in this way its source of power was lost.56

A computer worm is a self contained set of programs that is able to spread functional

copies of itself or its segments to other computer systems usually via network

connections. Unlike viruses, worms do not need to attach themselves to a host

program, instead, program propagates over a network reproducing itself as it goes.57

In addition to replication, a worm may be designed to do any number of things such

as delete files on a host system or send documents via e-mail.

Worms are of following 3 types:

i. Host computer worms

They are contained in the computer they run on and use network connections only to

copy themselves to other computers. They are also called as ‘rabbits’ which infects

other machines via multiplications. It is so named because of the speed at which it

clogs the system with copies of itself, thus reducing system’s performance, before

crashing.58

ii. Network worms

55 Nagpal Rohtas, What is Trojan, 2006, p. 5. 56 William Stallings, Cryptography and Network Security, 1998, p. 136. 57 Dr. R.K. Tiwari, P.K. Sastry and K.V. Ravi Kumar, Computer Crime and Computer Forensics, 2002, pp. 73-

74; See also A. Santosh Kumar, “Computer Forensics”, Andhra Law Times, 2002, p. 23 58 R.K.Choubey, An Introduction to Cybercrime and Cyber Law, 2008, p. 309.

Page 33: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

51

These consist of multiple parts called as ‘segments’, each running on different

machines and using the network for several communication purposes. Network

worms that have one main segment which coordinates the work of the other segments

are sometimes called as ‘octopuses’.

iii. Internet worm

The Internet worm of 1988 was world’s famous worm which was developed by

Robert J. Morris of the Cornell University on November 22, 1988. It infected nearly

3,000 computers during 8 hours of its activity. It disabled all computers by making

copies of itself and thus clogged them. Another famous worm having devastating

effect was Christmas Worm, 1987 which managed to paralyze IBM network on the

Christmas day in 1987. It asked the users to type ‘Christmas’ on the screen. Then it

drew a Christmas tree and sent itself to all the names of people stored in the user file

and in this way propagated itself.59

4. Logic Bombs

These are event dependent programs i.e. these programs are created to do something

only when a certain event called as ‘trigger event’ occurs. A logic bomb is a computer

instruction that codes for a malicious act when certain criteria are met such as specific

time in a computer’s internal clock or a particular action such as deletion of a program

or a file. In a computer program, a logic bomb, also called as ‘slag code’ is

programming code inserted intentionally and is designed to explode under certain

circumstances such as lapse of certain period of time or failure of program user to

respond to a program command. A logic bomb when exploded, may be designed to

display or print a spurious message, delete or corrupt data or have other undesirable

effects.60

59 Exgene H. Spafford, A Report on Internet Worm, dated November 29, 1988. 60 Rohtas Nagpan, What is Cybercrime?, p. 143

Page 34: A. INTRODUCTION - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/7829/11/11_chapter 2.pdf · Abacus In ancient time, people used either ... The only problem with this device

52

J. REVIEW

In the knowledge society of 21st century the computer, Internet and ICT or e-revolution

has changed the life style of the people. Today paper based communication has been

substituted by e-communication, paper based commerce by e-commerce and paper based

governance by e-governance. Apart from positive side of e-revolution, there is seamy side

also and the computer, Internet and ICT in the hands of criminals have become weapon of

offence. Accordingly, a new branch of jurisprudence emerged to tackle the problems of e-

commerce and of cyber crimes in the cyber space i.e. Cyber Law or Cyber Space Law or

Information Technology Law.61

For the first time, a Model Law on E-commerce was adopted in 1996 by the United

Nations Commission on International Trade and LAW (UNCITRAL). It was further adopted

by the General Assembly of United Nations by passing a resolution on January 31, 1997.

Further, India was also a signatory to this Model Law, and had to revise its national laws as

per the said model law. Therefore, India also enacted the Information Technology Act, 2000.

61 R.C. Dikshit, “Cyber Law”, CBI Bulletin, August, 2003, p. 7


Recommended