Cyber Law India Essays About Life


In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool or a target or both

Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.

We can categorize Cyber crimes in two ways

The Computer as a Target :-using a computer to attack other computers.

e.g. Hacking, Virus/Worm attacks, DOS attack etc.

The computer as a weapon :-using a computer to commit real world crimes.

e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.

Cyber Crime regulated by Cyber Laws or Internet Laws.

Technical Aspects

Technological advancements have created new possibilities for criminal activity, in particular the criminal misuse of information technologies such as

a. Unauthorized access & Hacking:-

Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network.

Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network.

Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. They possess the desire to destruct and they get the kick out of such destruction. Some hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money.

By hacking web server taking control on another persons website called as web hijacking

b. Trojan Attack:-

The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans.

The name Trojan Horse is popular.

Trojans come in two parts, a Client part and a Server part. When the victim (unknowingly) runs the server on its machine, the attacker will then use the Client to connect to the Server and start using the trojan.

TCP/IP protocol is the usual protocol type used for communications, but some functions of the trojans use the UDP protocol as well.

c. Virus and Worm attack:-

A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus.

Programs that multiply like viruses but spread from computer to computer are called as worms.

d. E-mail & IRC related crimes:-

1. Email spoofing

Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source. Please Read 

2. Email Spamming

Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter.

3 Sending malicious codes through email

E-mails are used to send viruses, Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code.

4. Email bombing

E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address.

5. Sending threatening emails

6. Defamatory emails

7. Email frauds

8. IRC related

Three main ways to attack IRC are: "verbalâ⦣8218;?Ŧ#8220; attacks, clone attacks, and flood attacks.

e. Denial of Service attacks:-

Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users.

Examples include

attempts to "flood" a network, thereby preventing legitimate network traffic

attempts to disrupt connections between two machines, thereby preventing access to a service

attempts to prevent a particular individual from accessing a service

attempts to disrupt service to a specific system or person.

MORE (PAGE 2)

Cyber Crime And Cyber Law Essay

Introduction
Recently, the Internet has become the most significant technology in all over the world, which is not only used by the people to contact with each other but also utilized by the business organizations to become global (Taylor, Caeti, Loper, Fritsch & Liederbach, 2006). Computer and internet enable the business organizations to execute the Electronic commerce business model, which has become very popular. Computers and Internet are a powerful source in the success of globalization and international business. Computers are being used worldwide and due to this, cyber crimes are increasing continuously with a rapid growth (Cheeseman, 2006).
These types of crimes have become a matter of importance for the consumers as well the business firms because it involves large eviction of the amount in terms of money. In these types of crimes, computer and Internet are the primary factor (Spinello, 2000). A high percentage of population is using computers in the Australia, United States as well as other developed nations. These people are much more connected with the world by the use of internet. They are using the computer for fun, business, e-commerce, e-marketing, etc.; thus, it has become an essential part of life and daily routine (Wall, 2008).
Cyber crime has become an important concern for not only the business firms, government, law enforcement agencies but also for the common people because these kinds of issues are related to the consumer’s day-to-day activity (Polivanyuk, 2005). Due to these types of crimes, consumer’s money, children, business organization’s integrity, consumer and company’s privacy, etc. are in danger.
This is an illegal activity and to remove this crime from the society is very important for a bright future of the world. The following paper undertakes several issues related to the exaggeration of people about cyber crime and how the law enforcement agencies face challenges to execute the effective law to control cyber crime at the global level.
Cyber Crime and Cyber Law
Presently, Cyber crime is one of the crucial subjects in the history of criminal, which is known as White Color crime. This subject has become very popular in the society because cyber crime is associated with the people who are quite educated and who have sufficient knowledge about the information technology (2010: A good year for fighting cybercrime? 2009). Computer and internet are only objects in these crimes because these types of crimes are done by very qualified and computer specialist persons. They use the computer or internet as a medium.
Cyber crimes are a type of fraud, which requires knowledge and greater skill for accomplishing the task. It is involved the basis of information technology, illegal approach, unlawful use of technology, alteration of data and information, fraud with the help of technological devices, stealing credit cards and money during the online transaction, possessing the data and material of other persons over...

Loading: Checking Spelling

0%

Read more

Unsecured Privacy Settings, Cyber Bullying, and Facebook Crime

896 words - 4 pages Face book is the world’s largest social networking site boasting over the five hundred million users. Face book allows its user’s the freedom to share videos, photos, links, and play games and interact with each other all over the world, however and whenever they feel to do so. Amidst such flexibility can come grim consequences. With diverse individuals possessing solitary personalities, instances of sabotage, devilment and wrong doings...

Cyber-Crime is a Serious Problem Essay

2338 words - 9 pages Millions of people around the world use computers and the internet every day. We all use it in school, work even at home, computers have made us life easier, it has brought so many benefits to the society but it has also brought some problems and cybercrimes is one of them. “The times have really changed,” said Greg Garcia, the department’s assistant secretary for cyber security and communications. “We’re seeing now phishing, farming, botnets …...

This paper describes the crime of cyber crime and how to prevent it from happening to you.

1661 words - 7 pages Cyber Identity TheftIdentity theft is a crime that causes damages to a person that can last a lifetime. One of the ways peopleT's identity is being stolen is through the use of the internet. Cyber Identity Theft is becoming very popular and is a problem that every person that uses the internet needs to be well aware of. For most people once...

Actions taken by the Australian Government to combat cyber crime

1182 words - 5 pages Cybercrime is a broad term used to describe criminal activity in which computers or networks are a tool, a target, or a place of criminal activity. They are almost impossible to stop due to technological advances and the power of anonymity on the internet. Governments have implemented strategies to try and prevent and fight these crimes in cyberspace but their effectiveness is questionable. It's a constant cat-and-mouse game as cybercriminals...

Cyber Intelligence Sharing and Protection Act

2266 words - 9 pages The Stop Online Piracy Act was proposed in January of 2012. SOPA was a legislative act that attempted to prevent piracy through DNS blocking and censorship. The legislation caused the protest and blackout of multiple online internet services including Reddit, 4Chan, Google, Wikipedia, Mozilla, and Tumblr. Now, internet users are faced with another possible challenge called the Cyber Intelligence Sharing and Protection Act, or CISPA. CISPA was...

Cyber Theft: Rise and Fall of Napster

1853 words - 7 pages Cyber theft is a new area of criminal justice which was enabled by the creation and global use of internet. Technology has changed the world immensely and it frequently catches Criminal Justice system of guard. In this instance we will speak about cyber theft as in theft of copyrighted materials with the use of internet and programs such as

Cyber Culture and The Future of Print

1625 words - 7 pages Cyber Culture and The Future of Print How has writing and the way we read changed in the last fifty years? Technology, reading, and writing has changed greatly over the last five decades, but how much has it affected our culture? Technology has become our culture, we are cyber culture. We need everything as fast as we can get it, somehow we’ve lost the time through the years to read and write as we once did. Computers have changed the...

The Shaping Of Cyber And Offline Identities Through Blogging

1372 words - 5 pages Blogging can be defined as the process of creating, maintaining, and updating a web journal (web log) and the consequences of the process. It involves reading, writing, more reading, commenting, and other technical aspects of maintaining a blog. Individuals blog for several reasons. One of the most popular reasons is to easily publish and get readers for the his/her writings. There is no pestering editor, and there is no screening process....

Cyber Criminology: Exploring Internet Crimes and Criminal Behavior by K. Jaishankar

3422 words - 14 pages Almost everyone everywhere in the world has either used or owned a computer. If there was an Internet connection, then they have all been connected together across that medium. But when you are just browsing the Internet or looking at your choice of social media site, did you know that you are getting attacked by some sort of malware or could be verbally assaulted by an individual? In Cyber Criminology: Exploring Internet Crimes and Criminal...

Negative uses and effects of Technology in Neuromancer in connection to Avatar and Modern Cyber-warfare articles

2821 words - 11 pages Technology has undergone a revolution which made humans lives simpler and added many benefits to the world. Everyday, technology is constantly being improved and there are new inventions developed to run million-dollar businesses. However, technology can be considered a two-sided blade as it can be used for legitimate purposes as well as for wrongdoing. Almost everyday, countless computers and databases are hacked by cyber criminals who are...

Effective Law Enforcement and Less Crime

2056 words - 8 pages From day to day, everyone experiences some form of racial profiling. When people go to apply for a job, they are required to state their race and ethnicity on the application; this is so that the employer can hire the correct amount of people by their race and ethnicity as required by the federal law known as Affirmative Action (Wikipedia). In addition, when people go apply for college, driver licenses, social security, food assistance/stamps,...

0 thoughts on “Cyber Law India Essays About Life

Leave a Reply

Your email address will not be published. Required fields are marked *