Monday, January 6, 2020

Introduction to Cyber Crime - 3840 Words

The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage. Cyber crime is an evil having its origin in the growing dependence on computers in modern life. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants is being run on computers, cyber crime has assumed rather sinister implications. Major cyber crimes in the recent past include the Citibank rip off. US $ 10 million were fraudulently transferred out of the bank and into a bank†¦show more content†¦E.g. Pooja has an e-mail address pooja@asianlaws.org. Her enemy, Sameer spoofs her e-mail and sends obscene messages to all her acquaintances. Since the e-mails appear to have originated from Pooja, her friends could take offence and relationships could be spoiled for life. Email spoofing can also cause monetary damage. In an American case, a teenager made millions of dollars by spreading false information about certain companies whose shares he had short sold. This misinformation was spread by sending spoofed emails, purportedly from news agencies like Reuters, to share brokers and investors who were informed that the companies were doing very badly. Even after the truth came out the values of the shares did not go back to the earlier levels and thousands of investors lost a lot of money. Forgery - Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners. Outside many colleges across India, one finds touts soliciting the sale of fake mark sheets or even certificates. These are made using computers, and high quality scanners and printers. In fact, this has becoming a booming business involving thousands of Rupees being given to student gangs in exchange for these bogus but authentic looking certificates. Cyber Defamation - This occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matterShow MoreRelatedTaking a Look at Cyber Crime680 Words   |  3 PagesIntroduction Cybercrime describe a heinous act that interferes with the functioning of the computer networks by exposing the users of the networks together with the systems to risks. The act is committed intentionally with the objective of creating interruptions that disrupt the normal functioning of the system. Computer users feel the harm directly or through a second party depending on the nature of the tool used in committing the crime (Hull and Sivanesar, 2013, p 98). Computer users across theRead MoreCyber Law1506 Words   |  7 PagesCYBER LAW INTRODUCTION: Cyberlaw is a new phenomenon having emerged much after the onset of Internet. Internet grew in a completely unplanned and unregulated manner. Even the inventors of Internet could not have really anticipated the scope and far reaching consequences of cyberspace. The growth rate of cyberspace has been enormous. Internet is growing rapidly and with the population of Internet doubling roughly every 100 days, Cyberspace is becoming the new preferred environment of theRead MoreCom176 outline and thesis statement1246 Words   |  5 Pagesin-text citations. Outline only the body of your paper (not your introduction or conclusion). Avoid bias and present a balanced case for your thesis—this will strengthen your writing. Your thesis statement: Societies dependence and advancement in technology are increasingly rising; however, our development of laws, law enforcement resources, and training to combat cyber crimes are inadequate. Outline: I. Introduction Societies dependence and advancement in technology are increasinglyRead MoreCyber Crimes And The Crime1153 Words   |  5 Pagesevolve with the trends in crime throughout history. Unfortunately for Law Enforcement, they are always on the back end of that and are often behind for months before being able to counteract. Cyber crimes are no different. Cyber Crimes are a new and always developing form of crime that bases its entire agenda from taking advantage of its victims over the internet. Law Enforcement s job is to assess and work to stop these crimes but it s not that easy. These cyber crimes are heavily in the favorRead MoreCyber Threat, Its Scope And Its Impact On National Security991 Words   |  4 Pagespart and parcel of our daily lives. It has become an ideal source for cyber criminals to remain active while preying on victims. Higher the number of cyberspace users’, higher is the opportunities for exploitation. So it is the need of the hour to protect our computers , networks, digital applications and our data from unintended or unauthorized source, change or destruction. This paper proposes a policy directed examination on cyber threat, its scope and its impact on national security. It includesRead MoreThe Patriot Act Title Vii Section 814 And 8161429 Words   |  6 PagesIntroduction Although it has been argued that the Patriot Act in and of itself infringes on upon the right bestowed upon citizens of the United States, the aim of this paper is describe in depth The Patriot Act Title VII Section 814 and 816. These sections of the Patriot Act protects the citizens of The United States from the world’s newest form of terror; Cyber-Terrorism. The aim is to explain this law, its adequacies, and inadequacies in detail and to offer suggestions and solutions for its shortcomingsRead MoreThe Issue Of Cyber Crime1118 Words   |  5 PagesIntroduction Anonymity has always been a desirable result when criminals commit a crime. Whether a person is covering their face with a ski mask as they physically rob a bank or someone infiltrates a hospital’s network to steal personal information for ransom, every criminal finds comfort in the warped sense that their identity will most likely be unknown, which will allow them to evade law enforcement. Due to technological advancements, criminals are more likely to remain anonymous after committingRead MoreComputer Crimes And Computer Crime1066 Words   |  5 Pagescomputer crimes oc/wcc Introduction Ever since computers and networks were invented there have been hackers and computer crimes have grown with the advancement of technology. As with the advancement of technology and computer crimes there have been many types of computer crimes that have evolved with technology. There have been laws in place to help reduce and regulate computers and computer crimes. History of computer crimes Computers and networks became increasingly known and used inRead MoreThe Prospect And Challenges Of Cyber Security Insurance922 Words   |  4 Pages2.0 Introduction This chapter presents the prospect and challenges of cyber security insurance among It practitioners in the United Kingdom based on the literature that had been reviewed in the process of writing this paper. This chapter will draw upon results of earlier studies and reports to provide a theoretical framework to answer the research questions of the paper. 2.1. Cyber security and its importance to the modern lives In line with technological advances and the evolution of the internetRead MoreCyber Laws in India and their Implications1817 Words   |  7 PagesCyber Laws in India and their Implications Contents Cyber space – Nature of threat 2 Growth of Internet user Population 3 The Legal Framework 4 The US and the UK Approaches for Data Protection and Privacy 4 The US 4 The UK 5 India’s Legal Framework Meets Most Requirements 5 Indian IT Act 2000 5 Indian Copyright Act 5 Indian Penal Code 5 Indian Contract Act, 1872 5 IT Act of India 2000 6 Proposed Amendments to the IT Act 8 Other Government Measures 9 Cyber space – Nature of threat

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.