Friday, February 15, 2008

Should "SPOOFING" be part of Pakistan Cybercrime Bill

Before discussing our mentioned case, let's discuss what is spoofing.
SPOOFING:
Spoofing is a generic term covering a range of computer network attacks whereby the attacker attempts to forge or intercede in a chain of communication. It is an attempt to gain access to a system by posing as an authorized user. Synonymous with impersonating, masquerading or mimicking. [1]
Spoofing has a number of forms: email spoofing, IP spoofing and webpage spoofing.
Email Spoofing: E-mail spoofing is a technique normally used for spam e-mail and attempt to hide the source of an e-mail message.
IP Spoofing: IP (Internet Protocol) address spoofing means the creation of IP packets with a f spoofed source IP address with the purpose of hiding the identity of the sender or put its working to another computing system.[2]
Disadvantages Of Spoofing:
One disadvantage of spoofing is to initiate DOS attack on other's Computer, that computer that sender wants to spoof. When spoofed Computer recieve, it is not able to respond to requests from third Computer that it is requesting response. The TCP tags each datagram with a sequential number. If third Computer receives a packet that is out of sequence, it will discard the packet or hold, depending on how close the packet is to the number it is looking for. The hacker, using spoofer Computer , estimates the number that third Computer is looking for and pretends to be sending packets from spoofed Computer by using its Computer identification. Spoofed Computer is unable to stop this use of his identification because he is spending all of his time answering the false packets from another computer that the hacker has set up to send the packets.
Second disadvantage is that a ip spoofer may stole the important information of the orignal IP address holder and spoofer may harm the ip holder.
Similarly,e-mail spoofing can harm reciever by recieving that e-mail.
Advantage of Spoofing:
As e-mail spoofing can also be an advantage for sender and reciever such as spamming.The sender send e-mail for its product advertizement and reciever may need this product.So it is advantage of product seller and customer.
Similarly MAC spoofing is little bit helpful for the host,if a person's internet connection didn't works, it may spoof the mac address of its friend(that has internet access) and can also connect to the internet.
Cyber Crime Law Of Pakistan And Spoofing:
According to cyber crime law of Pakistan:
"Whoever establishes a website, or sends an electronic message with a counterfeit
source intended to be believed by the recipient or visitor or its electronic system to be an authentic source with intent to gain unauthorized access or obtain valuable information which later can be used for any unlawful purposes commits the offence of spooling. Whoever commits the offence of spooling specified shall be punished with imprisonment of either description for a term which may extend to three years, or with fine, or with both."[3]
Should "SPOOFING" be part of Pakistan Cybercrime Bill:
From above observations, it can conclude that as spoofing is wrong method used in the internetworking society,spoofing can harm the spoofed computer,but it also has some advantages.So instead of stop the whole process government should put out the wrong
aspects of spoofing.This will harm the prosperity of internet society.So instead of giving much punishment,government has to become little softer in its cyber crime bill.
References:
1.www.google.com
2.www.wikipedia.com
3.prevention of the electronic crimes.pdf

No comments: