You are on page 1of 80

Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-CO

Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-CO


Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-CO
Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-CO
Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-CO
Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-CO
Y-COMMERCE
Y-COMMERCE INFORMATICS AND
Y-COMMERCE Y-COMMERCE Y-COMMERCE
Y-COMMERCE Y-COMMERCE Y-COMMERCE
Y-CO
Y-CO
Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-CO
Y-COMMERCE CYBER LAW
Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-CO
Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-CO
Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-CO
Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-CO
Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-COMMERCE
KERALA UNIVERSITY B.COM SECOND SEMESTER Y-CO
Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-COMMERCE Y-CO
Y-COMMERCE Kerala University B.com 2nd Semester

OVERVIEW OF
INFORMATICS

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Computer
Computer is an electronic device used in almost every field. In the modern era we
cannot imagine a world without computers. These days, computers are used
extensively by engineers and scientists and also by millions of people around the
world. That is why this age is called as the era of Information Technology (IT).

A computer is an electronic data processing device, which accepts and stores data
input, processes the data input, and generates the output in a required format.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Functionalities of a Computer

If we look at it in a very broad sense, any digital computer carries out the
following five functions:

Step 1 - Takes data as input.

Step 2-Stores the data/instructions in its memory and uses them as required.

Step 3 - Processes the data and converts it into useful information.

Step 4 - Generates the output.

Step 5 - Controls all the above four steps.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

What is information technology?

Information technology is combination of computer technology (hardware and software)


and Communication technology (voice, text, video, image etc).

• Computer technology provides the basics for processing data to convert it into useful
information.

• Telecommunication technology consist of electronic devices and systems for


communication over long distance.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Informatics
Informatics is the science and study of information, information flow, data management,
information systems engineering and information outcomes.

Informatics is defined as, "the study of the structure, behaviour and interactions of natural and
engineered computational systems".

Types of informatics are business informatics, medical informatics, health informatics, fashion
informatics etc.

Business informatics is the application of computers, communication systems to all fields of


business like, business management, business education and business research.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Features / Importance of Informatics

• Development of new concepts of communication


• Encompassing a number of existing academic disciplines
• Develops into the concept of a separate discipline
• Providing a link
• Helping to tackle issues
• Theoretical study
• Simultaneous processing
• Instant information

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

What is computer network?

A computer network is a system in which multiple


computers /devices are connected to each other to share
data/information and resources.

The best known computer network is internet.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Advantages of computer network
• File sharing
• Resource sharing
• Better connectivity and communications
• Internet access
• Entertainment
• Inexpensive system
• Flexible access
• Instant and multiple access

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Disadvantages of computer network

• Lack of data security and privacy


• Lack of independence
• Lack of robustness
• Presence of computer viruses and malware
• Need efficient handler

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Applications / Functions of Computer Networks

MOBILE
APPLICATION
FINANCIAL
SERVICES
EMAIL
SERVICES

DIRECTORY
BUSINESS
SERVICES

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Types of Networks
Personal Area Network (PAN) is the computer network that connects
PAN computers/devices within the range of an individual person. Mainly use in home,
office etc.

Local Area Network (LAN) is a data communication network connecting various terminals or
computers within a building or limited geographical area. The connection among the devices
LAN
could be wired or wireless.
Eg : college lab. A wireless LAN(WLAN) is a LAN that uses radio signals (Wi-Fi)to connect
computers instead of cables.

A campus area network (CAN) is a network of multiple interconnected local area


CAN networks (LAN) in a limited geographical area. A CAN is smaller than a wide area
network (WAN) or metropolitan area network (MAN).
Ex: used in universities

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

MAN stands for Metropolitan Area Network. It is a computer network that connects
MAN number of LANs to form larger network, so that the computer resources can be
shared. This type of network covers larger area than a LAN but smaller than the area
covered by a WAN which is designed to extend over the entire city. Eg : Cable TV
network.

In its simplest form, a wide-area network (WAN) is a collection of local-area


WAN networks (LANs) or other networks that communicate with one another. A WAN is
essentially a network of networks. Internet is the world's largest WAN.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

VPN (Virtual Private Network) provides secure connection over the internet
VPN and uses it for data transmission. It works by encapsulating data for one
network inside of an ordinary Internet Protocol (IP) packet and transporting
that packet to another network. When the packet arrives at the destination
network, it is unwrapped and delivered to the appropriate host on the
destination network By encapsulating the data using cryptographic techniques,
the data is protected from tampering and snooping while it is transported over
the public network.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
COMMUNICATION MEDIUM (channels) For transmitting data between two
computers a communication media or channel is required, basically there are 2
types of communication media

Wired communication media Wireless communication

Two wire open cable Infrared transmission

Twisted Pair Cable Wi-fi technology

Coaxial Cable Broadcast radio

Microwave transmission
Optical Fibre Cable

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Bluetooth

Bluetooth is a short-range wireless communication technology that allows devices


such as mobile phones, computers, and peripherals to transmit data or voice wirelessly
over a short distance. The purpose of Bluetooth is to replace the cables that normally
connect devices, while keeping the communications between them secure.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
NETWORK TOPOLOGY
Basically, it is made from two words, Network and Topology.

Network – Network is an arrangement where two or more computers


( also referred to as nodes ) communicate with each other.

Topology – Topology is simply an arrangement of how this system will


interact.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Bus topology

Star topology

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Ring topology

Mesh topology

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Hybrid topology

Tree topology

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

The Internet

A network of networks is called an internetwork, or simply the internet. It is the largest


network in existence on this planet.
Internet enables its users to share and access enormous amount of information
worldwide.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Internet serves many purposes and is involved in many aspects of life. Some of them are:

• Web sites,
• E-mail,
• Instant Messaging.
• Blogging.
• Social Media,
• Marketing,
• Networking,
• Resource Sharing,
• Audio and Video Streaming, etc.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Advantages/Purposes / Importance of Internet

• Medium of communication
• Source of information
• Medium for entertainment
• Provide services
• Facilitates e-commerce
• Social relationship
• Conferencing
• Product information
• Recruitment new employees

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Intranet

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Extranet

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Difference between Guarantee and Warranty

GUARANTEE WARRANTY

A warranty attracts charges like an


Guarantee is always free
insurance policy

Guarantee is a commitment to replace or


A warranty looks after the repairing of a
make good defects of a product or a service
new article within the validity period.
in a fixed period.

The guarantee is provided by the A warranty is usually provided by the


manufacturer retail sellers or distributors.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

KNOWLEDGE SKILLS FOR HIGHER EDUCATION

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Difference between Data and Information

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Knowledge
Knowledge is a combination of information, experience, wisdom and
insight that may benefit the individual or the organisation.

Knowledge Management

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Objectives of Knowledge Management(KM)

• To capture knowledge
• To improve knowledge access
• To enhance the knowledge environment
• To manage knowledge as an asset

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Benefits of KM
• Optimum use of knowledge
• Leads to new knowledge
• Better utilisation of resources
• Ability to solve problems
• Helps training
• Improves communication
• Better work allocation

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Knowledge Management Process

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Internet Access methods

Wi-Fi

Internet over Satellite: (IoS)

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Internet as a Knowledge Repository
• Internet as a Knowledge Repository means a place to store knowledge and retrieve knowledge. It
is an online database that organizes, displays, and categorizes information.

• It can be used to provide support for scholarly research and preserving digital materials for the
long-term use. Hence internet is truly a knowledge repository.

• In the short term, knowledge repositories are important for the documentation of findings and
research in academic institutions.

• Long-term knowledge preservation in digital format will be useful to the coming generations.
Several academic institutions worldwide (notably MIT, Oxford, etc.) have implemented
knowledge repositories to capture, store, index, preserve and redistribute their scholarly research
in digital formats.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Search Engines

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Creating Cyber Presence
• Cyber world is an online world. It is a world of computers and internet. It is an
environment for sophisticated online computing.

• Internet is a global connection of interconnected networks which can be accessed by


anyone throughout the world. It is the world's largest computer network.

• It is accessible to individuals, companies, colleges, government agencies and other


institutions all over the world.

• We can communicate with others instantly via e-mail, video conferencing, chatting
instant messaging, blogs, social networks, etc. using internet. All these activities
indicate the presence in the cyber world.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Information and Library Network (INFLIBNET)

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Bio-Resource Network (BRNet)

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

SOCIAL INFORMATICS

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

IT and Society

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Digital Divide

BOOKS

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

IT for National Integration

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Applications of IT

EDUCATION

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Applications of IT

FINANCE

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Applications of IT

HEALTH CARE

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Applications of IT

SECURITY

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Applications of IT

COMMUNICATION

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Applications of IT

EMPLOYMENT

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Artificial Intelligence

Applications of AI

• Heavy Industries
• Finance
• Aviation
• Weather Forecast
• Games

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Virtual Reality

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Bio-Computing

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

What is Electronic Waste (e-waste)?

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Management of e-waste

• Acquisition of only essentially required quantity


• Proper organisation
• Give away or donate any usable item
• Take them back to store
• Sale of old equipments
• Learn about the local recycling options
• Educate one self

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

What is Green Computing?

Green computing, also known as green technology is the environmentally


responsible and eco-friendly use of computers and related resources.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

To promote green computing concepts at all possible levels, the following four
complementary approaches are employed:
• Green use: Minimizing the electricity consumption of computers and their peripheral
devices and using them in an eco-friendly manner

• Green disposal: Re-purposing an existing computer or appropriately disposing of or


recycling, unwanted electronic equipment

• Green design: Designing energy-efficient computers, servers, printers, projectors and


other digital devices

• Green manufacturing: Minimizing waste during the manufacturing of computers and


other subsystems to reduce the environmental impact of these activities

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Cyber world

Cyber world refers to online environment or it is the world of online computers and communications.

The term Cyber can be defined as, “one relating to computers or involving computer or computer
networks.”

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Advantages of cyber world


1. Communication

2. Quick access to information

3. Entertainment

4. Social network

5. E commerce

6. Online education

7. E-mail

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
The challenges with cyber world

• Addiction
• Relational problems
• Health
• Pornography
• Women
• Cyber crimes

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Cyber space

Cyberspace refers to the virtual computer world. It is also known as a virtual space.

Cyberspace is a term which cannot be precisely and perfectly defined. But it can be defined as,
"the total interconnectedness of human beings through computers and telecommunication
without regard to physical geography".

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Information Overload
• Information overload is a situation where one is overloaded with
information.
It creates difficulty in understanding the issues and decision making is
affected.

• Information overload refers to abundance of information which


causes difficulty to a person for taking a decision due to the presence
of excess information.

• Overloaded with information causes a barrier to the person and also


confuses the user, thereby delay in the decision, wrong decisions may
occur.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Causes of Information Overload

• Lack of clarity
• Multiple sources of information
• Lack of time

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Cyber ethics
Ethics are moral principles or rules of conduct that govern a person's behaviour. But in
the modern society, absence of ethics is seen in every walk of life

Cyber Ethics is the study of moral, legal and social issues involving cyber technology
and the code of responsible behaviour on the internet. These are the moral values that
stop one from doing anything that is not legal and that does not harm or damage
anyone's interests while using internet. (It helps the online environment to be more safe,
friendly and co-operative for others around.)

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Responsible behaviour while using internet

• Be honest
• Show respect to others
• Respect the privacy of others
• Strictly adhere to cyber laws
• Do not use rude or offensive language.
• Do not harm others
• Do not be a bully on the internet.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Cyber Addiction
Cyber addiction is characterized as excessive or compulsive use of the internet
which interferes with the normal living of a person. Cyber addiction is a very
serious problem as the excessive use of the internet can significantly interfere with
the functioning in other areas of life such as relationships, education, work,
physical health and emotional wellbeing of the individuals who are connected to it.

Cyber addiction is a psychological disorder that causes people to spend so much


time on computer which dominates the addict's life.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Electronic signature

An electronic signature is an electronic version of the physical, hand-written signature.


Just the way you sign your documents, electronic signatures are used the same way.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Digital signature

Digital Signature is another breed of the electronic signatures, the only difference is
that it involves the use of a code or algorithm to sign and validate the authenticity
of a document.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Information Technology Act, 2000

The Indian Information Technology Act 2000 came into effect from October 17, 2000.
The Act is by and large based on the United Nations Commission on International Trade
Law (UNCITRAL) model law on electronic commerce adopted in1996 .
India enacted the Information Technology Act, 2000, the mother legislation dealing with
e-commerce and e-transaction and to facilitate e-governance and to prevent cyber crime.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester

Information Technology (Amendment) Act, 2008

Eventhough, IT Act, 2000 being the primary legislation governing e-commerce and e-
transactions, it was subjected to a lot of criticism. Certain specific areas like data
protection, privacy and new forms of cyber crimes, penal provisions, etc. were left
unaddressed by IT Act, 2000.
After the amendment of 2008, IT Act, 2000 was renamed as Information Technology
(Amendment) Act, 2008, commonly referred as ITAA, 2008. The new Act came into
force on October 27, 2009. Thus, the scope and applicability of IT Act, 2000 was
increased by its amendment in 2008.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
E Contracts
E-contracts are contracts very similar to traditional paper based commercial
contracts in which the commercial transactions are conducted and
concluded electronically.

According to Section 10-A of an electronic contract is valid and


enforceable. The only essential requirement to validate an electronic
contract is compliance with all the necessary pre-requisites like offer,
acceptance, consideration etc provided under section 10 of the Indian
Contract Act. 1872.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Advantages of E Contracts

• Time saving
• Building Customer relationship by obtaining regular feedback from CUSTOMERS
• 24 X7 availability
• Instant updates of catalogues and prices
• Worldwide visibility
• Creating opportunities for the buyers
• An effective option for the physically challenged
• Reduction in distribution cost

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Electronic Governance
E-governance is the application of ICTs for delivering government
services to citizens in a convenient, efficient and transparent manner

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Cyber Crime
Cyber Crime is defined as, "a crime in which a computer is
the object of the crime or is used as a tool to commit an
offence".

Common types of cyber crime include online bank


information theft, identity theft, online predatory crimes and
unauthorised computer access. With the advancement of
technology, cyber crimes have also increased.

The primary source of Cyber law in India is the Information


Technology Act, 2000.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Classification of Cyber Crime
• Crimes where a computer system itself is the target such as
backing, dissemination of viruses, and denial of service attacks
• Traditional crimes like fraud, theft, and child pornography that
are facilitated and enabled by a computer
• theft of money, financial instruments, property, services, or
valuable data
• unauthorized access to computer time
• illegal use of computer programs
• unauthorized acquisition of stored data

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Cyber Terrorism

Cyber terrorism refers to the convergence of cyberspace and


terrorism and it covers politically motivated hacking operations
intended to cause grave harm such as loss of life or severe
economic damage. It is the use of cyber space to cause harm to
the general public and disrupt the integrity and sovereignty of
the target country.

If these acts cause injuries to persons, cause to death of any


person, damage or disrupt any property, cause disruption of
essential supplies or services or negatively affect the critical
information structure, they become punishable acts.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Scope of Cyber Terrorism

Unlawful attacks and threats of attack against


computers, networks, and the information stored
therein are the major weapons used by terrorists
with the view to intimidate or force a government or
public in furtherance of their objectives are
generally covered under cyber terrorism. Targets
may include power plants, military installations, the
banking industry, air traffic control centres, water
systems etc.

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Categories of Cyber Crimes

Cyber crimes are broadly classified under 4 heads

1.Crime against individuals


2.Cyber Crime against property
3.Cyber crime against Government
4.Cyber crime against society

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Types of Cyber Crimes

1.Hacking

Types of Hackers

i.The white hat hacker


ii.The black hat hacker
iii.The grey hat hacker

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Types of Cyber Crimes

2. Identity Theft

The identity theft may be either through Phishing or Pharming

a. Phishing

b. Pharming

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Types of Cyber Crimes
3. Cyber Stalking

4. Web Hijacking

5. Pornography

6. Denial of service attack

7. Malicious software

8. Financial crimes

Y-COMMERCE INFORMATICS AND CYBER LAW


Y-COMMERCE Kerala University B.com 2nd Semester
Types of Cyber Crimes

9. Intellectual property crimes

10. E-mail crimes

11. Cyber defamation

12. Cyber terrorism

13. Cyber theft


Y-COMMERCE INFORMATICS AND CYBER LAW

You might also like