Professional Documents
Culture Documents
Introduction
Classifications of Cybercrimes
Cyber Era
Cyber Crime
Techno-crime
A premeditated act against a system or systems with the intent
Techno-vandalism
These acts of “brainless” defacement of websites and/or other
1. Hacking:
It is an act of gaining unauthorized access to a computer system
or network.
2. Denial Of Service Attack:
In this cyber attack, the cyber-criminal uses the bandwidth of the
victim’s network or fills their e-mail box with spammy mail.
Here, the intention is to disrupt their regular services.
3. Software Piracy:
Theft of software by illegally copying genuine programs or
counterfeiting. It also includes the distribution of products
intended to pass for the original.
4. Phishing:
Pishing is a technique of extracting confidential information from
the bank/financial institutional account holders by illegal ways.
5. Spoofing:
It is an act of getting one computer system or a network to
pretend to have the identity of another computer. It is mostly used
to get access to exclusive privileges enjoyed by that network or
computer.
Cybercrime against property
Forgery
Cyber terrorism
Web jacking
E-Mail Spoofing
Difficult to control
Cognizable offense
1,368,737,513
Cyber space is boundary less world, which cannot divide in particular countries or territories as
like the physical world.
However, it is duty of legal system to protect the rights of their citizens in the cyber space.
A safe and secure online environment enhances trust and confidence and contributes to a stable
and productive community.
In initial period the countries, which are having the more territory and the strong power to
protect are known as powerful countries.
In this age of information technology the countries, which is having latest techniques about
internet, are call the powerful country.
Cybercrime Era:
Survival Mantra for the Netizens
Netizens
5P Mantras
Precaution
Prevention
Protection
Preservation
Perseverance
Stranger is Danger
Cybercrime Era: Survival Mantra for the Netizens
Address Protection
Information Technology Act 2000- An overview
To provide legal recognition for transactions:-
Carried out by means of electronic data interchange, and other means