Friday, February 15, 2008

SHOULD SPOOFING BE A PART OF Cyber Crime Bill

DEFINATION A
In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.[Wikipedia.com]
DEFINATION B
It also includes the meanings that one uses such an URL that has very resemble ness with one other’s .thus if user has by mistake wrote wrong spellings of required URL ,he may open new one
EXAMPLE OF DEFINATION A
An example of first definition is the man-in-the-middle attack, in which an attacker spoofs Alice into believing they're Bob, and spoofs Bob into believing they're Alice, thus gaining access to all messages in both directions without the trouble of any effort or error. The attacker here must monitor the packets sent from Alice to Bob and then guess the sequence number of the packets. Then the attacker knocks out Alice with a SYN attack and injects his own packets, claiming to have the address of Alice. Alice's firewall can defend against some spoof attacks when it has been configured with knowledge of all the IP addresses connected to each of its interfaces. It can then detect a spoofed packet if it arrives at an interface that is not known to be connected to the IP address.
EXAMPLE OF DEFINATION B
By the second definition question arises that if some one is using resembled IP then whether he is a criminal or not? As this new URL is anyhow a new URL and what is the problem in using this one?
Like
http://www.google.com/
http://www.geogle.com/
for an example If I take a letter, lock it in a safe, hide the safe somewhere in Lahore, then tell you to read the letter, that's not security. That's obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications of the safe and a hundred identical safes with their combinations so that you and the world's best safecrackers can study the locking mechanism -and you still can't open the safe and read the letter - that's security.

"google" is different from geogle and has it's own information in it which is not changed by "geogle". Geogle shares it's own thinkings ,news etc The answer is quite debatable topic and one cannot be just punished for three years like is done in Pakistan’s Cyber Crime Bill as
"whoever commits the offence of spooling specified shall be punished with the imprisonment of either description for a term which may extend to three years, or with fine, or with both"

No comments: