You are on page 1of 2

8/11/2014 3:39:00 AM

Cybercrime, Media and Insecurity:


The Shaping of Public Perceptions of Cybercrime

No major prosecution, but its difficult to locate, or u dont know you
are victim of cyber crime . USA
Cyber Forensic, sever where u store the info. Multiple servers . IP
Address the identity, could be static or dynamic. Mac Address
written on your network card.
Paper suggests that we are unable to locate only because of lack of
resources. May be political, technological.
No proper definition of cyber crime, paper suggests need for the same,
for regulations, codification, to know the nature of the crime, to find
the extent, so that you can prevent it from occurring again and again.
Is the nature of cyber crime any different from any other physical
crime? they are much similar, computer only acts as a tool, changed
the means, and, nature may be.
Tunneling
Distributed denial of service attack study self important
Phishing getting sensitive information falsely without consent
Also talks about myths as in how the entirety of the internet is unsafe,
the structure of these cyber criminals ( organized or un-organized)
Public anxiety and cyber crime some concern then you would want
an insurance that clearly tells about anxiety.
Trusted third party provide pad locks VeriSign certified from a
particular date to particular date, why specific time? To avoid legal
implications, because you can not insure for an infinite time about the
credibility of a site.
also talks about increasing crime, says you have the infrastructure for
the bigger crimes, now analysis should be is this article applicable in
India too?
Mobile technology disruptive technology disrupted the laptop
model of business
Critical Infrastructure problem is not with the data online, but
sometimes where it is stored. Even if you are not storing your data
online, there Is a possibility of data being lost. So is it data storage or
data management?
Spy snoring. Intra net(within private server, LAN) ,and, Internet
(multiple server, VPN)
Increase in cyber crime aim of the paper also policy measures
pertaining to that.
Amendments are not always for the public, but also for foreign
countries dealing with us. 2000 Indian and Europe exchanging doc.

You might also like