The document discusses several topics related to cybercrime including:
1) The challenges of locating and prosecuting cybercrimes due to their nature and lack of proper definitions and regulations.
2) Whether the nature of cybercrime is fundamentally different than physical crimes, with computers mainly acting as a tool.
3) Various types of cybercrimes mentioned like phishing, DDoS attacks, and tunneling.
4) How public perceptions of cybercrime and anxiety are shaped by media coverage and myths around internet insecurity.
The document discusses several topics related to cybercrime including:
1) The challenges of locating and prosecuting cybercrimes due to their nature and lack of proper definitions and regulations.
2) Whether the nature of cybercrime is fundamentally different than physical crimes, with computers mainly acting as a tool.
3) Various types of cybercrimes mentioned like phishing, DDoS attacks, and tunneling.
4) How public perceptions of cybercrime and anxiety are shaped by media coverage and myths around internet insecurity.
The document discusses several topics related to cybercrime including:
1) The challenges of locating and prosecuting cybercrimes due to their nature and lack of proper definitions and regulations.
2) Whether the nature of cybercrime is fundamentally different than physical crimes, with computers mainly acting as a tool.
3) Various types of cybercrimes mentioned like phishing, DDoS attacks, and tunneling.
4) How public perceptions of cybercrime and anxiety are shaped by media coverage and myths around internet insecurity.
No major prosecution, but its difficult to locate, or u dont know you are victim of cyber crime . USA Cyber Forensic, sever where u store the info. Multiple servers . IP Address the identity, could be static or dynamic. Mac Address written on your network card. Paper suggests that we are unable to locate only because of lack of resources. May be political, technological. No proper definition of cyber crime, paper suggests need for the same, for regulations, codification, to know the nature of the crime, to find the extent, so that you can prevent it from occurring again and again. Is the nature of cyber crime any different from any other physical crime? they are much similar, computer only acts as a tool, changed the means, and, nature may be. Tunneling Distributed denial of service attack study self important Phishing getting sensitive information falsely without consent Also talks about myths as in how the entirety of the internet is unsafe, the structure of these cyber criminals ( organized or un-organized) Public anxiety and cyber crime some concern then you would want an insurance that clearly tells about anxiety. Trusted third party provide pad locks VeriSign certified from a particular date to particular date, why specific time? To avoid legal implications, because you can not insure for an infinite time about the credibility of a site. also talks about increasing crime, says you have the infrastructure for the bigger crimes, now analysis should be is this article applicable in India too? Mobile technology disruptive technology disrupted the laptop model of business Critical Infrastructure problem is not with the data online, but sometimes where it is stored. Even if you are not storing your data online, there Is a possibility of data being lost. So is it data storage or data management? Spy snoring. Intra net(within private server, LAN) ,and, Internet (multiple server, VPN) Increase in cyber crime aim of the paper also policy measures pertaining to that. Amendments are not always for the public, but also for foreign countries dealing with us. 2000 Indian and Europe exchanging doc.