Cyber Security Unit 3
Cyber Security Unit 3
Unit 3
Malware
Malware is a broad term used to describe any type of malicious software or code that is designed to
harm, exploit, or compromise computer systems, networks, or devices. The term "malware" is a
combination of "malicious" and "software." Malware is created and distributed by cybercriminals with
various malicious intentions, including stealing sensitive information, disrupting computer operations,
gaining unauthorized access, and more.
1. Internet Worms:
Internet worms spread over the internet, targeting vulnerabilities in operating systems,
software, or network services. They can infect a wide range of systems and are known for
rapid and widespread propagation.
2. Email Worms:
Email worms typically spread through infected email attachments or links. They often use
social engineering tactics to trick users into opening the malicious content. Once opened, they
may harvest email addresses from the victim's address book and send copies of themselves to
those contacts.
3. Instant Messaging (IM) Worms:
IM worms spread through instant messaging platforms. They can send malicious links or files
to contacts on the victim's IM list, often with enticing or deceptive messages.
4. File-Sharing Worms:
File-sharing worms target peer-to-peer (P2P) file-sharing networks and shared folders. They
disguise themselves as desirable files (e.g., music or software) and spread when users
download and execute them.
5. Network Worms:
Network worms focus on exploiting vulnerabilities in network services or protocols. They can
spread rapidly across local area networks (LANs) and the internet by scanning for and
infecting vulnerable systems.
6. USB Worms:
USB worms propagate through infected USB drives or other removable media. When an
infected drive is connected to a computer, the worm may automatically execute and spread to
that computer.
7. Mobile Device Worms:
Mobile device worms are designed to target smartphones and tablets. They can spread
through infected apps, text messages, or email attachments, often exploiting vulnerabilities in
mobile operating systems.
8. Self-Propagating Worms:
Self-propagating worms use various techniques to autonomously find and infect vulnerable
systems. They often employ scanning and probing mechanisms to locate potential targets.
9. Email-Worm/Trojan Hybrids:
Some worms combine characteristics of worms and Trojans. They spread through email
attachments but may also have Trojan-like capabilities for data theft or remote control.
10. Botnet Propagation Worms:
These worms are used to create or expand botnets (networks of compromised computers).
They may infect computers and connect them to a command-and-control server, enabling
attackers to control the botnet remotely.
11. Worms with Payloads:
Worms may carry a payload that performs malicious actions beyond replication and
spreading. Payloads can include actions like launching denial-of-service (DoS) attacks,
installing backdoors, or stealing data.
It's important to note that the classification of worms is not always rigid, and some worms may exhibit
characteristics of multiple types. The evolution of computer worms continues, and attackers regularly
adapt their tactics to exploit new vulnerabilities and technologies. As such, staying vigilant, practicing
good cybersecurity hygiene, and keeping software and systems up to date are essential to protect
against worm attacks.
Trojan Horse
A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate
program. The delivery method typically sees an attacker use social engineering to hide malicious code
within legitimate software to try and gain users' system access with their software.
A simple way to answer the question "what is Trojan" is it is a type of malware that typically gets hidden
as an attachment in an email or a free-to-download file, then transfers onto the user’s device. Once
downloaded, the malicious code will execute the task the attacker designed it for, such as gain backdoor
access to corporate systems, spy on users’ online activity, or steal sensitive data.
The term "Trojan horse" is derived from the ancient Greek story of the wooden horse used by the Greeks
to infiltrate the city of Troy during the Trojan War. In the context of computing, a Trojan horse works
similarly: it appears harmless on the surface but carries a hidden, malicious payload.
Here are some key characteristics of Trojan horses:
1. Deception: Trojans are designed to deceive users by appearing as something desirable or harmless,
such as a legitimate software download, a game, or a useful utility.
2. No Self-Replication: Unlike viruses and worms, Trojans do not have the ability to self-replicate or
spread independently. They rely on users to download and execute them voluntarily.
3. Payload: Trojans carry a malicious payload that can include various harmful actions. The payload may
be designed to steal data, provide unauthorized access to the victim's system, deliver other malware
(such as ransomware), or perform other malicious activities.
4. Diverse Types: There are various types of Trojan horses, each designed for specific malicious purposes.
Common types include banking Trojans (aimed at stealing financial information), remote access
Trojans (used for unauthorized remote control of a victim's computer), and keyloggers (which record
keystrokes to capture sensitive information).
5. Delivery Methods: Trojans are typically delivered through deceptive means, such as email
attachments, malicious download links, fake software updates, or even physical media like infected
USB drives.
6. Concealment: Trojans often use techniques to evade detection by antivirus and security software. This
can include encryption, obfuscation, or camouflage within legitimate files.
7. No Self-Propagation: Trojans do not spread independently like worms. Their distribution relies on
social engineering tactics to trick users into executing them.
Common examples of Trojans include fake antivirus software (scareware), which claims to detect and
remove malware but actually infects the system, and Trojan downloaders, which are used to deliver
additional malware onto a compromised system.
To protect against Trojan horses and other forms of malware, it's essential to practice good cybersecurity
hygiene. This includes using reputable antivirus and anti-malware software, keeping software and
operating systems up to date with security patches, avoiding downloading software or files from
untrusted sources, being cautious with email attachments and links, and regularly backing up important
data. Additionally, educating users about safe computing practices is crucial in preventing Trojan
infections.
Trojan horses come in various types, each designed for specific malicious purposes. These types
of Trojans can be categorized based on their primary functionality and intended actions. Here are
some common types of Trojan horses:
1. Banking Trojans:
Banking Trojans are designed to steal sensitive financial information, such as login
credentials for online banking and payment systems. They often operate by capturing
keystrokes or intercepting data entered in web forms.
2. Remote Access Trojans (RATs):
Remote Access Trojans are used to provide attackers with unauthorized remote access to
a victim's computer. Attackers can control the infected system, view the victim's screen,
access files, and even use the computer as a launchpad for further attacks.
3. Keyloggers:
Keyloggers record keystrokes made on a computer or mobile device. This allows attackers
to capture sensitive information, including passwords, usernames, and credit card details.
4. Downloader Trojans:
Downloader Trojans are responsible for downloading additional malware onto a
compromised system. They act as a gateway for other malicious software, such as
ransomware or spyware, to enter the victim's device.
5. Fake Antivirus (Scareware):
Fake antivirus Trojans masquerade as legitimate antivirus software. They display alarming
messages about non-existent threats on the victim's computer and pressure the user into
purchasing fake security software.
6. Distributed Denial-of-Service (DDoS) Trojans:
DDoS Trojans turn infected computers into part of a botnet (a network of compromised
devices). Attackers can then use these devices to launch DDoS attacks against targeted
websites or services, causing them to become inaccessible.
7. Password Stealers:
Password-stealing Trojans focus on capturing login credentials for various accounts,
including email, social media, and online gaming. These stolen credentials can be used
for identity theft or further attacks.
8. Email Trojans:
Email Trojans spread via malicious email attachments or links. Once opened, they may
use the victim's email account to send spam or spread further malware.
9. Game Trojans:
Game Trojans target gamers by posing as game cheats or hacks. They often lead to
compromised accounts, stolen in-game items, or the installation of additional malware.
10. Ransomware Trojans:
While ransomware is often delivered as a standalone threat, some Trojans act as delivery
mechanisms for ransomware. They encrypt a victim's files and demand a ransom for
decryption.
11. File-Deleting Trojans:
These Trojans are designed to delete or corrupt files on the victim's system, causing data
loss and disruption.
12. Rootkits:
Rootkit Trojans are stealthy and hard-to-detect. They typically aim to gain unauthorized
access to the core of an operating system (the "root" level) and can provide attackers
with persistent control over a compromised system.
13. Fake Update Trojans:
Fake update Trojans pose as legitimate software updates or patches. When users
download and install them, the Trojan is activated and can carry out its malicious actions.
14. Camouflaged Trojans:
Camouflaged Trojans hide their malicious code within legitimate software or files. They
may appear harmless but carry out malicious actions once executed.
15. Proxy Trojans:
Proxy Trojans redirect internet traffic through a compromised computer, allowing
attackers to remain anonymous while carrying out illicit activities.
16. Mobile Trojans:
Trojans designed for mobile devices (smartphones and tablets) can steal data, send
premium-rate SMS messages, or take control of the device.
These are just some examples of the many types of Trojan horses that exist. Cybercriminals
continually develop new variants and tactics to deceive users and compromise systems. To
protect against Trojan infections, individuals and organizations should follow cybersecurity best
practices, including using reputable antivirus software, keeping software up to date, practicing
safe web browsing habits, and exercising caution when downloading or opening files from
untrusted sources.
cyber homicide
Cybermurder
The transformation of communication globally through the medium of the Internet
has also fostered a new form of homicidal interaction, referred to as cybermurder or
Internet murder. Historically, murderers have used various approaches to identify
strangers as potential victims, including the use of newspaper advertisements. Henri
Landru, the French serial killer, placed ads in the lonely hearts columns of
newspapers during World War I. Landru first seduced his victims, and having gained
their trust, he embezzled their assets and finally murdered them. The
term cybermurder is applied to murders that occur as a result of Internet
advertisement or connection through chat rooms, dating sites, sex-for-sale sites,
online role-playing games, Internet forums or groups, listservs, or bulletin boards. It
also has been used to refer to the use of the Internet by persons to solicit their own
murder or to induce others to take their own lives.
The term Craigslist killer is often associated with cybermurders in the media;
however, given the overwhelming number of sites on the Internet that can just as
readily provide a forum for communication, the term ascribes too much blame to
one service. The case most commonly associated with this term is that of Phillip
Haynes Markoff, a medical student who answered advertisements for sexual services
in two cases in which he was alleged to have committed armed robberies. Markoff
was indicted for the murder of Julissa Brisman on April 14, 2009, but subsequently
hanged himself while awaiting trial. Brisman had posted an Internet ad offering
massage services (often understood to be synonymous with paid sexual services).
In a 2013 Canadian case, Tim Bosma of Ancaster, Ontario, advertised for the sale of
his truck. Two individuals arrived to inspect the vehicle, and Bosma was last seen
going with them for a test drive. His body was eventually found burned beyond
recognition on farmland located some distance from his home. Dellen Millard was
arrested and charged with forcible confinement, theft of more than $5,000, and first-
degree murder. Millard is awaiting trial on the charges.
In 2014, The Huffington Post reported that since 2009 there have been 29 such
homicides, which typically stem from attempted robberies that are unsuccessful and
lead to the murder of the victim. However, murderous situations can emerge from
other forms of advertisement too, including those for items for sale, room rentals,
sexual partners, and romance. The relative anonymity of the Internet for those
seeking to harm others provides ample opportunity for violent interactions to occur.
Serial killers, according to Elliot Leyton, kill three or more persons over a period of
days, weeks, months, years, or even decades, with resting periods between the
murders. Some serial killers have used the Internet to identify victims and commit
homicide. From 1993 onward, John Edward Robinson utilized Internet chat rooms
and social networking sites to select his victims. Robinson advertised as a dominant
male looking for submissive women for sex. His motive in the first of two of these
murders was economic gain. His victims, Sheila Faith and her teenage daughter,
moved to Kansas City to join him and were never seen again; but, Sheila Faith’s
pension checks continued to be cashed by Robinson for almost 7 years. Two other
women eventually disappeared after becoming involved with him; their bodies were
found in chemical drums on his farm. Robinson was eventually charged and
convicted for the deaths of these women. He received the death sentence as well as
life sentences without the possibility of parole in five of his cases.
Inducing others to take their own lives has been considered by some commentators
to constitute a specific form of cybermurder. However, from a legal perspective, it is
likely more accurate to describe this practice as assisting suicide via the Internet.
Such cases provide a significant legal challenge for prosecutors because freedom of
speech is protected in the United States. The case of William Francis Melchert-Dinkel
illustrates this dilemma: Although he was originally convicted of assisting a suicide,
his conviction was overturned by the Minnesota Supreme Court and remanded back
to a lower court. As the Internet evolves and as technology increasingly connects the
globe, new forms of cybermurder may emerge.
What Is a Cyber Attack?
A cyber-attack is an attempt by cybercriminals, hackers or other digital adversaries to
access a computer network or system, usually for the purpose of altering, stealing,
destroying or exposing information.
Cyberattacks can target a wide range of victims from individual users to enterprises or
even governments. When targeting businesses or other organizations, the hacker’s goal is
usually to access sensitive and valuable company resources, such as intellectual property
(IP), customer data or payment details.
What are the 10 Most Common Types of Cyber Attacks?
1. Malware
Malware — or malicious software — is any program or code that is created with the intent to do
harm to a computer, network or server. Malware is the most common type of cyberattack, mostly
because this term encompasses many subsets such as ransomware, trojans, spyware, viruses,
worms, keyloggers, bots, cryptojacking, and any other type of malware attack that leverages
software in a malicious way.
2. Denial-of-Service (DoS) Attacks
A Denial-of-Service (DoS) attack is a malicious, targeted attack that floods a network with false
requests in order to disrupt business operations.
In a DoS attack, users are unable to perform routine and necessary tasks, such as accessing email,
websites, online accounts or other resources that are operated by a compromised computer or
network. While most DoS attacks do not result in lost data and are typically resolved without
paying a ransom, they cost the organization time, money and other resources in order to restore
critical business operations.
The difference between DoS and Distributed Denial of Service (DDoS) attacks has to do with the
origin of the attack. DoS attacks originate from just one system while DDoS attacks are launched
from multiple systems. DDoS attacks are faster and harder to block than DOS attacks because
multiple systems must be identified and neutralized to halt the attack.
3. Phishing
Phishing is a type of cyberattack that uses email, SMS, phone, social media, and social
engineering techniques to entice a victim to share sensitive information — such as passwords or
account numbers — or to download a malicious file that will install viruses on their computer or
phone.
Common phishing attacks include:
Type Description
Whaling A whaling attack is a type of social engineering attack specifically targeting senior or
C-level executive employees with the purpose of stealing money or information, or
gaining access to the person’s computer in order to execute further cyberattacks.
Type Description
SMiShing Smishing is the act of sending fraudulent text messages designed to trick individuals
into sharing sensitive data such as passwords, usernames and credit card numbers. A
smishing attack may involve cybercriminals pretending to be your bank or a shipping
service you use.
Vishing Vishing, a voice phishing attack, is the fraudulent use of phone calls and voice
messages pretending to be from a reputable organization to convince individuals to
reveal private information such as bank details and passwords.
4. Spoofing
Spoofing is a technique through which a cybercriminal disguises themselves as a known or trusted
source. In so doing, the adversary is able to engage with the target and access their systems or
devices with the ultimate goal of stealing information, extorting money or installing malware or
other harmful software on the device.
Spoofing can take different forms, which include:
Type Description
Email Email spoofing is a type of cyberattack that targets businesses by using emails with
Spoofing forged sender addresses. Because the recipient trusts the alleged sender, they are more
likely to open the email and interact with its contents, such as a malicious link or
attachment.
ARP Address Resolution Protocol (ARP) spoofing or ARP poisoning is a form of spoofing
Spoofing attack that hackers use to intercept data. A hacker commits an ARP spoofing attack by
tricking one device into sending messages to the hacker instead of the intended
recipient. This way, the hacker gains access to your device’s communications,
including sensitive data.
5. Identity-Based Attacks
Crowd Strike’s findings show that 80% of all breaches use compromised identities and can take up to
250 days to identify.
Identity-driven attacks are extremely hard to detect. When a valid user’s credentials have been
compromised and an adversary is masquerading as that user, it is often very difficult to differentiate
between the user’s typical behavior and that of the hacker using traditional security measures and
tools.
Some on the most common identity-based attacks include:
Type Description
Pass-the-Hash Pass the hash (PtH) is a type of attack in which an adversary steals a “hashed” user
Attack credential and uses it to create a new user session on the same network. It does not
require the attacker to know or crack the password to gain access to the system.
Rather, it uses a stored version of the password to initiate a new session.
Silver Ticket A silver ticket is a forged authentication ticket often created when an attacker
Attack steals an account password. A forged service ticket is encrypted and enables access
to resources for the specific service targeted by the silver ticket attack.
Credential Credential stuffing attacks work on the premise that people often use the same user
Stuffing ID and password across multiple accounts. Therefore, possessing the credentials
for one account may be able to grant access to other, unrelated account.
Password The basics of a password spraying attack involve a threat actor using a single
Spraying common password against multiple accounts on the same application. This avoids
the account lockouts that typically occur when an attacker uses a brute force attack
on a single account by trying many passwords.
Brute Force A brute force attack is uses a trial-and-error approach to systematically guess login
Attacks info, credentials, and encryption keys. The attacker submits combinations of
usernames and passwords until they finally guess correctly.
Type Description
SQL A SQL Injection attack leverages system vulnerabilities to inject malicious SQL
Injection statements into a data-driven application, which then allows the hacker to extract
information from a database. Hackers use SQL Injection techniques to alter, steal or
erase application's database data.
Type Description
Cross-Site Cross Site Scripting (XSS) is a code injection attack in which an adversary inserts
Scripting malicious code within a legitimate website. The code then launches as an infected
(XSS) script in the user’s web browser, enabling the attacker to steal sensitive information
or impersonate the user. Web forums, message boards, blogs and other websites that
allow users to post their own content are the most susceptible to XSS attacks.
Malvertising Malvertising attacks leverage many other techniques to carry out the attack.
Typically, the attacker begins by breaching a third-party server, which allows the
cybercriminal to inject malicious code within a display ad or some element thereof,
such as banner ad copy, creative imagery or video content. Once clicked by a website
visitor, the corrupted code within the ad will install malware or adware on the user’s
computer.
To stay protected from evolving cyber threats, individuals and organizations should implement robust
cybersecurity practices, including regularly updating software and systems, using strong authentication
methods, educating users about cybersecurity risks, and employing advanced security solutions. Staying
informed about the latest cyber threats and vulnerabilities is also crucial in adapting to new attack
methods.
Web security, also known as internet security or cybersecurity, refers to the practice of protecting
websites, web applications, web services, and web users from various online threats and
vulnerabilities. It encompasses a wide range of strategies, technologies, and best practices
designed to ensure the confidentiality, integrity, and availability of data on the web and to
safeguard users' privacy and trust.
Web security is a dynamic field that evolves alongside emerging threats and vulnerabilities.
Continuous monitoring, threat intelligence, and proactive security measures are crucial for
protecting web resources and user data in an ever-changing online environment.
How Does Web Security Work?
Web security functions sit between your environment’s endpoints and the internet. From there, they
inspect traffic and requests traveling in both directions. No single technology monitors or inspects all
traffic, but a “stack” of appliances—or a cloud-delivered platform of services, more effective today—
provides holistic coverage to prevent policy violations, malware infections, data loss, credential theft,
and so on.
Many solutions are available today, and some are more comprehensive than others. In a full stack, web
security includes the following technologies:
Secure web gateway (SWG) provides threat protection and policy enforcement for users
accessing the web to prevent infections and block unwanted traffic.
Firewall/IPS provides network security, app control, and visibility. Cloud firewalls stay up to
date and scale to handle demand or encryption, making them a more practical option.
URL filtering screens and blocks inappropriate access or content, also offering protection from
web-borne malware.
Sandboxing isolates software in an environment where it can be scanned and executed without
the risk of infecting a system or other applications.
Browser isolation loads webpages or apps in a remote browser and only sends the user pixels,
preventing the downloading, copying, pasting, and printing of data or documents.
DNS controls define rules that control requests and responses related to DNS traffic, allowing
you to detect and prevent DNS abuses such as tunneling.
Antivirus detects and neutralizes trojans, spyware, ransomware, and more. Many offerings also
protect against threats such as malicious URLs, phishing, and DDoS.
TLS/SSL decryption breaks open inbound and outbound encrypted traffic to inspect its
contents, and then re-encrypts it to continue to its destination.
The main objective of this test is to simulate an attack on the internal network by mimicking
the actions of an actual threat actor.
This type of penetration testing attempts to find and exploit vulnerabilities of a system to steal
or compromise the organization’s information. As a result, the test will show whether the
implemented security measures are enough to secure an organization and to assess its capability
to defend against any external attack.
On average, an external penetration test will take 2-3 weeks to complete. However, this
depends on the complexity of the system, the size of the network, and the goals of the test itself.
Examples of external penetration tests include:
Configuration & Deployment Management Testing
Identity Management Testing
Authentication Testing
Authorization Testing
Session Management Testing, Input Validation Testing
Testing for weak Cryptography
Business Logic Testing
Client Side Testing
Testing for Error Handling.
This can be a threat actor who penetrated the organization’s external defence systems or it
can be an employee, contractor, or other staff with internal access.
Internal penetration tests include using:
Computer Systems
Access Points
WiFi Networks
Firewalls
IDS/IPS
Local Servers
Employees
Once those vulnerabilities are identified, testers exploit them to discover the impact of an attack
and show the weakness/entry points to the organization.
Internal penetration testing is not just limited to exploiting internal network vulnerabilities, but
it also includes privilege escalation, malware spreading, man in the middle attacks (MITM),
credential stealing, monitoring, information leakage or any other malicious activity.
You might be wondering why you would conduct an internal penetration test, to begin with,
given your systems are supposedly secure from any external threats.
However, internal tests provide the results to an organization that should an attacker manage
to gain access equivalent to an insider, or if any malicious internal user tries to break the
security, what impactful it could have in terms of disclosure, misuse, alteration, or destruction
of organization’s confidential information.
Testing methodologies include:
Internal Network Scanning
Port Scanning and System Fingerprinting
Finding vulnerabilities
Exploiting
Manual Vulnerability Testing and Verification
Firewall and ACL Testing
Administrator Privileges Escalation Testing
Password Strength Testing
Network Equipment Security Controls Testing
Database Security Controls Testing
Internal Network Scan for Known Trojans
Third-Party/Vendor Security Configuration Testing
Conclusion
For every organization, it’s best practice to perform an external and internal penetration test
along with regular security audits to ensure the security of their IT System and determine what
information can be exposed to the attackers. It is also necessary because of IT Security Rules
& Regulations and Guidelines like GLBA, FFIEC, NCUA, HIPAA, and etc.
The Law related to Cyber Crimes in India
The cyber crime is different from any other crime happening in the society. The cyber crime
define to criminal activity in which computers or computer networks are a tool a target or a
place of criminal activity and include everything from electronic wracking to denial of services
attacks. It's a general term that covers crimes like phishing, credit card frauds, bank robbery,
illegal downloading, child pornography, kidnapping children via chat rooms, scams, cyber
terrorism, and distribution of viruses etc.
Cyber Offences under penal code 1860:
The major substantive criminal law is the Indian Penal Code a complete code which deals with
all the offences including cyber crimes. Therefore, this conventional criminal law is sufficient
to deal with all kinds of crimes including cyber crimes. India enacted the information
Technology Act, 2000 basically to regulate e- commerce.
Acts Offences Under IPC Provision Of IPC
Introduction
Today a world cannot be imagined without the internet connectivity which has become a basic
necessity of a human being. This global network has made the life easier through its immense
contribution in communication and information sharing. It is playing a pivotal role in almost
every field of life either its education, business, politics, medicine, infrastructure or science and
technology.
The advent of internet culture gave the concept of a virtual world called as Cyber space which
is basically a virtual environment created by interconnected computers and computer networks
on internet without any boundary of distance and physical limitations. Cyber space is a broad
term which includes computers, networks, software, data storage devices, the Internet,
websites, emails and even electronic devices such as cell phones, ATM machines etc.
Just like every coin has two sides the same goes with the cyberspace technologies which has
its own pros and cons, there is no doubt that it has simplified our life to a greater extent but the
dark side of the story reveals that in recent years the computer technology and cyber space has
became an invitation to cyber threats.
The issue of cyber threat involves the criminal activities ranging from minor electronic crimes
to more serious offences such as illegal gambling, theft of personal information, cyber bulling,
cyber stalking, cyber defamation, web jacking, data diddling etc however these offences are
not only the concern but it also raises the question of jurisdiction in order to deal with the cases
of such cyber-crimes. It is evident that cyber space has no restriction of a physical boundary
therefore it becomes convenient for criminals to access the system from any part of the world
with the means of computer or any electronic devices.
For instance, A person sitting in china could break into a bank's host computer in India and
transfer millions of Rupees to another bank in Switzerland, all within a blink of an eye. Only
thing he would require to do this is a computer and a cell phone device. Once the crime has
been committed the confusion of jurisdiction arises as to where the complaint should be logged
for the trial of such cases. This is because of the disparities among the laws of different
countries to deal with cyber crime cases.
Jurisdiction over cyber crime and national laws
Jurisdiction is the power or authority of the court to hear and determine the cause and adjudicate
upon the matter that are litigated before it or the power of the court to take cognizance of the
matter brought before it but when it comes to determine the jurisdiction in context of cyber
space it becomes strenuous part of law.
In common parlance Jurisdictions is of two types:
Subject jurisdiction allows the court to decide cases of a particular category and to
check whether the claim is actionable in the court where the case has been filed.
Personal jurisdiction allows a court to decide on matters related to citizens or people of
its territory, the person having some connection to that territory, irrespective of where
the person is presently located. Every state exercises the personal jurisdiction over the
people within its territory
The concept of jurisdiction can be understood in a better way with reference to section 15 to
20 of code of civil procedure (1908) which talks about the place of suing or the subject matter
jurisdiction and section 20 of this code specifically speaks about any other category of suit
which is not covered in sec 15 to 19 of the code.
Section 20 serves important ingredients for the purpose of institution of other suit in a court
within the local limits of whose jurisdiction'[1]:
a. The defendant or each of the defendants resides, or carries on business, or personally
works for gain at the time of the commencement of suit.
b. Any of the defendants, where there are more than one defendants resides, or carries on
business, or personally works for gain at the time of the commencement of suit provided
that in such cases either the leave of the court is given, or the defendants who do not
reside, or carry on business, or personally works for gain, as aforesaid, acquiesce in
such institution or,
c. The cause of action wholly or partially arises.
However, this section doesn't seem to be fit in virtual world. The issue with the cyber space
jurisdiction is the presence of multiple parties across various part of the globe who only have
virtual connections among them therefore we cannot have a clear idea about the parties and the
place of suing so that the jurisdiction of the court could be determined to try such cases.
The substantive source of cyber law in India is the Information Technology Act, 2000 (IT Act)
which came into force on 17 October 2000. The objective of the Act is to provide legal
recognition to e- commerce and to facilitate storage of electronic records with the Government.
The IT Act also penalizes various cybercrimes and provides strict punishments. In pursuant to
this there are certain provision under this act which renders the idea of jurisdiction of court for
the trial of cases pertaining cyber crimes in India as well as outside India.