Professional Documents
Culture Documents
GALGOTIAS UNIVERSITY
SEMINAR PAPER
SUBMITTED BY:
ABHINAV TOMAR
BA LLB (H), SEM- 3
SUBMITTED TO:
Dr.Sandhya ( ASSOCIATE
PROFESSOR) SCHOOL OF LAW
GALGOTIAS UNIVERSITY
1
(List of Contents)
1. ABSTRACT 4
2. INTRODUCTION 4-5
5.
MODIFICATION OF A
CONVENTIONAL 6
CRIME USING
COMPUTER
7. PREVENTION 6
OF CYBER
CRIME
2
9. CONCLUSION 8
3
CYBER CRIME /
COMPUTER
CRIME
ABSTRACT:
Today, people use computers for many different reasons depending on
their level of skill and their needs. A look at the number of people using
computers today reveals the surprisingly high amount of individuals. As
technologies increase, the number of people using computers increases.
A good example is China, which has close to three hundred million
computer users. With the high number of computer and cyber users, it is
accurate to say that computer crime and cybercrime also increases by
the day. Computer criminals rely on the changing technologies as much
as regular people do. The first cyber crime recorded occurred in 1820.
This aspect is not a surprising fact because the first form of computer,
the abacus was already around for more than a thousand years.
Cybercrime is any illegal act committed using a computer network
(especially the Internet).
Cybercrime is a subset of computer crime.
Introduction:
5
Modification of a conventional crime by using
computers.
Financial crimes
Cyber pornography
Sale of illegal articles
Online gambling
Intellectual Property crime
Spoofing
Forgery
Cyber Defamation
Cyber stalking
First Category:
Cyber harassment is a distinct Cybercrime. Various kinds of
harassment can and do occur in cyberspace, or through the use of
cyberspace. Harassment can be sexual, racial, religious, or other.
Second Category:
These crimes include computer vandalism(destruction of others’
property), transmission of harmful programs, unauthorized trespassing
through cyber space, unauthorized possession of computer information.
Third Category:
6
Cyber terrorism is one distinct kind of crime in this category.
The growth of internet has shown that the medium of Cyberspace is
being used by individuals and groups to threaten the international
governments as also to terrorize the citizens of a country.
Conclusion:
Within the law enforcement agencies, a set of rules must be developed
7
to address the various categories of computer crime.
As such, investigators will know what and which materials to search
and seize, the electronic evidence to recover, and the chain of custody
to maintain .
Cybercrime is a significant threat that can bring huge loss to the
individual and the organization. It is essential to follow basic online
rules to ensure the safety of self and the organization.