Category Archives: Law

Source Code Theft

Source Code Theft

What is source code ? Source code is the blue-print of software. Source code is considered intellectual property. Computer programs or software cannot be created without source code. Source code is something that is generated by the programmer from his own skills and knowledge. Just as a cook is unwilling to share the recipe of

Identity Theft

What is Identity Theft? Impersonating someone without their knowledge by obtaining their personal and/or confidential information is called Identity Theft. What leads to identity theft? A lot of people are tricked into their confidential personal information to criminals by Phishing emails or Social engineering Malware discreetly installed onto your computer without your knowledge may steal

Data Alteration or Diddling

What is data diddling ? Data Diddling can be defined as illegal or unauthorized fraudulent alteration of data. It is the process of modifying data before or after it is entered into the system, generating a faulty output. What are the threats ? While processing large amounts of data, criminals either alter the input or

Cyber Terrorism & Cyber Warfare

Cyber Terrorism & Cyber Warfare What is cyber terrorism ? Cyber Terrorism can be defined as activities done with the intention to threaten unity, integrity, security or sovereignty of a country or terrorize people or sections of people by way of Unauthorized access Denying legitimate access/ service Disrupting services Damage critical information infrastructure etc. What

Cyber Bullying & Stalking

Cyber Bullying & Stalking What is Cyber Bullying? Cyber bullying may be defined as the use of online and digital technologies to hurt, ridicule, embarrass or inflict harm on others. Who are Cyber Bullies? Bullies are usually vocally abusive and persistent. They often gang up on their victims. Cyber bullies are those people who carry

Email Bombing

What is Email Bombing ? Email bombing is an attack which involves sending massive amount of emails to a particular system consuming the system, storage or network resources. What are the threats ? Email bombing can result in overloading the server with multiple requests which is beyond the server capacity to handle. It can fill

Intellectual Property Theft

What is Intellectual Property Theft? Intellectual Property is anything that is created from using one’s mental power or intellect. Any creation such as designs, art work, literature, scientific or mathematical discovery can be termed intellectual property. When a criminal steals this intellectual property, the crime is known as Intellectual Property (IP) Theft. Due to the

Phishing Attack

What is Phishing Attack? A fraudulent attempt is made to acquire confidential information such as Usernames Passwords PIN Credit card numbers Attackers send fake emails and/or redirect innocent users to a fake website, which looks identical to the original website. Users are then induced to submitting their personal information, which can then be exploited. Such

Email Spoofing

What is Email Spoofing? Email spoofing is the process of sending an email message from a fake source, while making it appear to be originating from an authentic source For example: An email appears to be originating from email@originaladdress.com (spoofed address), but actually the email is being sent from email@fakeaddress.com (actual source). This does not