• +91 9810155766
  • karnika@sethassociates.com
  • FAQ
  • Online Query

KarnikaSeth.com

  • Home

  • Profile

  • Work Contribution

  • Representative Tasks

  • Media

  • Seminars

  • Publications

  • Articles

  • Books

  • Testimonials

Cyber Law Book Excerpt

Posted by admin in Wednesday, January 6th 2010   
Topics: book excerpt    
No Comment

“Article 21 of the Constitution of India covers the right to privacy as a fundamental right to protect the autonomy interest. Further, the IT Amendment Bill 2008 introduces s 66E to specifically deal with menace of video voyeurism and MMS scams. According to this section, whoever intentionally or knowingly captures, publishes or transmits the image […]

What are Virus and other Malicious Programs and Webware?

Posted by admin in Wednesday, January 6th 2010   
Topics: faq    
No Comment

Virus-Malicious programs intend to cause harm to targeted systems and include virus, worms, Trojan horses, Logic bombs and hoaxes[1].A virus[2] is a program that infects an executable file and after infecting it causes the file to function in an unusual way. It propagates itself by attaching to executable files like application programs and operating system. […]

What is DNS SPOOFING?

Posted by admin in Wednesday, January 6th 2010   
Topics: faq    
No Comment

DNS Spoofing is a term used to describe the faking of host masks during the resolution of internet hosts names. To perform DNS spoofing a hacker attempts to intercept the communication and send fake host name mapping to the victims computer. This can be done using malicious web applets downloaded by the attacked user himself.

What is financial crime and what are the modes of committing such crime?

Posted by admin in Wednesday, January 6th 2010   
Topics: faq    
No Comment

Financial Crimes are defined as a crime against property, involving the unlawful conversion of the ownership of property (belonging to one person) to one’s own personal use and benefit. There are many different ways that these crimes can be committed, for instance by mail, fax, telephone and the Internet. By using social engineering techniques or […]

What is bandwidth?

Posted by admin in Wednesday, January 6th 2010   
Topics: faq    
No Comment

It is the measure of how much information one can send through a connection. It is usually measured in bits-per-second.

Is hacking a Cybercrime?

Posted by admin in Wednesday, January 6th 2010   
Topics: faq    
No Comment

Hacking is amongst the gravest Cybercrimes known till date. In simple terms it means an illegal intrusion into a computer system and/or network. Every act committed towards breaking into a computer and/or network is hacking. Some hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank […]

What is Salami attack?

Posted by admin in Wednesday, January 6th 2010   
Topics: faq    
No Comment

When negligible amounts are removed and accumulated in to something larger. This attack is used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed.

What is web-jacking?

Posted by admin in Wednesday, January 6th 2010   
Topics: faq    
No Comment

This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the web site of another. He may even change the information on the site. This may be done for fulfilling political objectives or for money. E.g. recently the site of MIT (Ministry of Information […]

What is cyber defamation?

Posted by admin in Wednesday, January 6th 2010   
Topics: faq    
No Comment

This occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information.

Is Cyber harassment also a Cybercrime?

Posted by admin in Wednesday, January 6th 2010   
Topics: faq    
No Comment

Yes, it is a distinct Cybercrime. Various kinds of harassment can and does occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other. Persons perpetuating such harassment are also guilty of Cybercrime.

Newer Entries »
« Older Entries
The Book - Potection of children on internet by Karnika Seth
Computers, Internet and New Technology Laws by Karnika Seth
Video Gallery
Press Room
Blog
Blog
Books & e-Books
  • Profile
  • Work Contribution
  • Representative Tasks
  • Media
  • Seminars
  • Disclaimer
  • Privacy Policy
  • FAQ
  • Testimonials

Contact Us

KARNNIKA A SETH
Cyberlaw Expert
Chairperson, Lex cyberia
Managing Partner, Seth Associates

CORPORATE LAW OFFICE

721, Tower-B, Advant Navis Business Park,
Plot No. 7, Sector 142, Expressway, NOIDA-201301 (U.P.),India
Tel: +91 (120) 4585437,
+91 9810155766
Email: karnika@sethassociates.com
Websites:
www.sethassociates.com
www.lexcyberia.com
www.karnikaseth.com

  • +91 9810155766
  • karnika@sethassociates.com
  • 721, Tower-B, Advant Navis Business Park, Plot No. 7, Sector 142, Expressway, NOIDA-201301 (U.P.),India
Copyright 2007-2026 Karnika Seth - Cyberlawyer & Expert