1. On the basis of a. subject of crime, i. Against individuals ii. Against organizations iii. Against society at large b. Against whom crime is committed and c. Temporal nature of criminal activities being carried out on computers and Internet. d. Commission of traditional crimes i. Theft ii. Trespass iii. Violence iv. Obscenity v. Forgery and fraud vi. Property crimes e. New crimes i. Pornography ii. Stalking iii. Unauthorized access iv. Hacking v. Denial of service attack vi. Virus and worms vii. Spoofing viii. Logic bombs ix. Salami attacks x. Terrorism xi. Web jacking xii. Trojan attacks etc. 2. Cyber crime has evolved significantly and is no longer just a threat to industry and individuals, but increasingly to national security. Hacking, spoofing and virus attacks are capable of causing serious security breaches in information system of vital installations. The potential for damage to national security through such attacks is huge. The Internet had become a means of money laundering for funding terrorist attacks. It is also being used as secure channel of communication by terrorists. The ever increasing cyber crime is taking the world by storm. Technology is a boon but it also has dangerous implications if left undetected. 3. Cyber forensics is the discovery, analysis and reconstruction of evidences by a process of extracting information and data from a computer storage media. This data is collected, preserved and is used for presenting it in a manner acceptable in a court of law. It also includes finding encrypted and decrypted protected information, recovering deleted data, computers that created them etc. Trojan attack means an unauthorized programme, which passively gains control over another’s system by representing itself as an authorised programme. Web Jacking occurs when someone forcefully takes the control of a website. In this the hacker gains access and control over the other website by bypassing the password. 4. “Cyber crime may be said to be those species, of which genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crime”. Both cyber crime and cyber terrorism are criminal

disruption etc. attacks on sensitive networks etc.  Imprisonment up to 3 years or fine or both. The terrorist attacks on the Internet are by hate e-mails. which may sometimes have international consequences whereas cyber terrorism is certainly of global concern. Section 65  Tampering with computer source documents.    . The Information Technology Act deals with the various cyber crimes in chapters IX & XI. It includes both domestic as well as international consequences. Section 67  Publication of obscene material.  Section 43  Unauthorised access. 2 lacs. 1.65.67.  Imprisonment up to 3 years or fine. Cyber crime is a domestic issue. virus attacks or any contaminant. Section 66  Hacking with computer system’. causes damage.  Imprisonment up to a term of 10 years and also with fine up to Rs. denialof-service attacks.66. The important sections are Ss. 43.acts but are in many aspects.  Fine up to Rs. 5. unauthorised downloading.

Sign up to vote on this title
UsefulNot useful