(29)What are some of the computer related offences that can be prosecuted under IT Act?
Answer: Following are some of the common cyber-crime
scenarios which can attract prosecution as per the penalties and offences
prescribed in IT Act:
(1)Cyber Terrorism:
- Physical storage media such as USB, hard disk drives etc. and virtual storage such as drive, FTP sites etc. are used by terrorist group to hide information and records of their illicit business.
(2)Cyber Pornography:
- Pornography (specifically child pornography) is illegal in many countries and this business is among the largest businesses on Internet.
(3)Web Defacement:
- Web defacement includes replacement of homepage of a website with a pornographic or defamatory page.
- Government sites generally face the web defacement of on symbolic days.
(4)Online sale of illegal Articles:
- Illegal articles such as narcotics, drugs, weapons and wildlife is sold through internet
(5)Introduction of Malwares:
- Malwares such as viruses, worms, backdoors, root kits, Trojans and bugs are some sort of malicious programs which are used to destroy or gain access to some electronic information.
(6)Social Media Harassment:
- A fake profile is created by the third party with the purpose to harass the person whose profile is created. That person is labelled as ‘prostitute’ or a person of ‘loose character’.
(7)Email Account Hacking:
- Hacker takes unauthorized control of victim’s email account and fake/obscene emails are sent to people in victim’s address book.
(8)Phishing and Email Scams:
- Through phishing, sensitive information is obtained through masquerading a site as a trusted entity (e.g. Passwords, credit card information).
(9)Theft of Confidential Information:
- Confidential information stored in computer systems is targeted by rivals, criminals and discontented employees.
(10)Source Code Theft:
- In this digital world, a Source code generally is the most critical and important asset of a company.
(11)Credit Card Fraud:
- Use of infected computers or networks for online transactions cans results into credit card fraud.