The second category of Cyber-crimes is
that of Cyber-Crimes against all forms of property. These crimes
include computer vandalism (destruction of others’ property) and
transmission of harmful viruses or programs.
A Mumbai-based upstart
engineering company lost a say and much money in the business when the
rival company, an industry major, stole the technical database from
their computers with the help of corporate cyber spy software. There are
certain offences which affects person’s properties which are as
follows:
Intellectual Property Crimes: Intellectual
property consists of a bunch of rights. Any unlawful act by which the
owner is deprived completely or partially of his rights is an crime. The
most common type of IPR violation may be said to be software piracy,
infringement of copyright, trademark, patents, designs and service mark
violation, theft of computer source code, etc.
Cyber Squatting: It
involves two persons claiming for the same Domain Name either by
claiming that they had registered the name first on by right of using it
before the other or using something similar to that previously. For
example two similar names i.e. www.yahoo.com and www.yahhoo.com
Cyber Vandalism: Vandalism
means deliberately damaging property of another. Thus cyber vandalism
means destroying or damaging the data or information stored in computer
when a network service is stopped or disrupted. It may include within
its purview any kind of physical harm done to the computer of any
person. These acts may take the form of the theft of a computer, some
part of a computer or a peripheral or a device attached to the computer.
Hacking Computer System: Hackers
attacks those included Famous Twitter, blogging platform by
unauthorized access/control over the computer. Due to the hacking
activity there will be loss of data as well as computer system. Also
research especially indicates that those attacks were not mainly
intended for financial gain too and to diminish the reputati on of
particular person or company. As in April, 2013 MMM India attacked by
hackers.
Transmitting Virus: Viruses
are programs written by programmers that attach themselves to a
computer or a file and then circulate themselves to other files and to
other computers on a network. They mainly affect the data on a computer,
either by altering or deleting it. Worm attacks plays major role in
affecting the computer system of the individuals.
Cyber Trespass: It
means to access someone’s computer or network without the right
authorization of the owner and disturb, alter, misuse, or damage data or
system by using wireless internet connection.
Internet Time Thefts: Basically,
Internet time theft comes under hacking. It is the use by an
unauthorized person, of the Internet hours paid for by another person.
The person who gets access to someone else’s ISP user ID and password,
either by hacking or by gaining access to it by illegal means, uses it
to access the Internet without the other person’s knowledge. You can
identify time theft if your Internet time has to be recharged often,
despite infrequent usage.