Cyber Security: Learn The Basics of Cyber Security, Threat Management, Cyber Warfare Concepts and Executive-Level Policies. by Onyshko Dana & Zhang Noah

Cyber Security: Learn The Basics of Cyber Security, Threat Management, Cyber Warfare Concepts and Executive-Level Policies. by Onyshko Dana & Zhang Noah

Author:Onyshko, Dana & Zhang, Noah [Onyshko, Dana]
Language: eng
Format: epub, azw3
Published: 2020-07-11T16:00:00+00:00


Defining Cyber-Crime

Let us first define "cyber-crime" and understand how it is different from a "conventional Crime." Computer crimes can include conventional criminal offenses, like forgery, theft, scam, defamation, and malice. All of these crimes are subject to the Penal Codes. Such type of computer abuses have also given rise to several modern crimes which are addressed by the Information Technology Act, 2000.

It is not appropriate to define cyber-crimes, as "actions which carry a punishment by the Information Technology Act" since the Indian Penal Code also covers several cyber-crimes, for example, cyber defamation, email spoofing, and sending intimidating emails, etc. We can simply define cyber-crime as unlawful actions in which the computer is either a target or a tool or else both".

Let’s have a look at the acts where the computer is used as a tool for an illegal action. This type of activity generally consists of a variation of a traditional crime by using computers. Few examples are given in the following text:



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.