2024: Domino Containers - The Next Step. News from the Domino Container commu...
What constitutes a cyber crime in the country
1. What Constitutes a Cyber
Crime In the Country
By- Ujjwal Tripathi
Engg. College Ajmer
2. What is Cyber Crime ?
The commission of illegal acts through
the use of a computer or against a
computer system.
Cybercrime is nothing but where the
computer used as an object or subject
of crime.
4. • Hacking- Hacking in simple terms means an illegal
intrusion into a computer system without permission of
computer owner/user. Hackers write or use ready-made
computer programs to attack the target computer.
Virus Dissemination - Malicious software that
attaches itself to other software. (virus, worms, Trojan
Horse, Time bomb, Logic Bomb, Rabbit and
Bacterium are the malicious.
Software Piracy - Theft of software through the
illegal copying of genuine programs or the counterfeiting
and distribution of products intended to pass for the
original. The unauthorized copying of software.
5. Email spoofing - A spoofed email is one
that appears to originate from one source but
actually has been sent from another source.
Phishing - The e-mail directs the user to visit
a Web site where they are asked to update
personal information, such as passwords and
credit card, social security, and bank account
numbers, that the legitimate organization
already has .
8. U.S. Computer Fraud and Abuse Act
Unauthorized access to a computer
containing data protected for the national
defense or foreign relations concerns
Unauthorized access to a computer
containing certain banking or financial
information
Unauthorized access, use, modification,
destruction, or disclosure of a computer or
information in a computer operated on
behalf of the U.S. government
9. U.S. Computer Fraud and Abuse Act
Accessing without permission a
“protected computer,” which the courts
now interpret to include any computer
connected to the Internet .
Computer fraud .
Transmitting code that causes damage
to a computer system or network .
Trafficking in computer passwords .
10. INFORMATION TECHNOLOGY
ACT, 2000
We in India also have had a vision to
become the 12th nation in the world to
enact a Cyber law. We have enacted
the Information Technology Act, 2000.
11. THE IT ACT, 2000 –OBJECTIVES
To provide legal recognition for
transactions.
Carried out by means of electronic data
interchange.
Other means of electronic
communication, commonly referred to as
"electronic commerce", involving the use
of alternatives to paper-based methods of
communication and storage of
information.
12. I.T. ACT 2000 – CONCLUSION
The other steps have to follow.
However, the government has to be
quick in responding to the challenges
raised by the constantly changing
technologies. Just as time does not wait
for anyone, so does Internet. The time
to act is right now.