Q: Explain Section 65 of Information Technology Act, 2000 ?

Ans:  Section 65 of Information Technology act deals with tampering with computer source documents.
The Espionage is the internal attack from illicit spy and can be the purpose of tampering documents.
Trojan horse attack is also an internal attack and is performed to steal the information of users to tamper the documents.
Spoofing means to hoax or to decieve. Spoofing is an identity theft where an illegal person or illegitimate user tries to use the identity of a legitimate user.  Here an attacker pretends himself to be a legitimate person. Phishing, on the other hand, is a phenomenon where an attacker employs social engineering methods to steal sensitive as well as confidential information from a user or to tamper the documents. Social engineering means to read the brain of people. For example: Fake Facebook url.

Any person who intentionally  conceals, destroys or alters anything from the computer source will be punished with imprisonment upto 3 years and fine upto Rs 2 lakhs. It mentions about the tampering of electronic evidence.

The tampering of documents can be performed using attacks whether internal attack or external attack. The internal attacks are generally performed by the disgruntled and unsatisfied employees within the organization.

Spoofing and Phishing are external attacks and can also be used to tamper the documents.

This denial of service attack is an external attack and is performed to close the machine or network and the purpose of Denial of Service Attack can be to close the way to reach to evidence.

 A brute force attack is a hacking method that uses trial and error methods to crack passwords, login credentials, and encryption keys. Brute force is also called password cracking and can be used to tamper the documents.

The SQL injection attack also permits attackers to spoof identity, tamper with existing data, cause repudiation issues such as voiding transactions or changing balances and to permit the complete disclosure of all data.

Keywords used: 

repudiation: denial of the truth or validity of something.

spoof: hoax or trick (someone)

Comments

Popular posts from this blog

Q: In which section is the term of office, conditions of service mentioned under information technology act, 2000 ?

Q: In which section is the qualification of members of cyber appellate tribunal is mentioned?

Q: Write about the composition of Cyber Appellate Tribunal?