Question

What will happen when there is no cybercrime law?

What will happen when there is no cybercrime law?

Homework Answers

Answer #1

QUESTION

What will happen when there is no cybercrime law?

ANSWER

INTRODUCTION

Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.The first recorded cyber crime took place in 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c. In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. The first spam email took place in 1976 when it was sent out over the ARPANT. The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.

CRIME & CYBERCRIME

• Crime – Engaging in conduct that has been outlawed by a particular society

• Cybercrime – Differ in the tool: guns are change for computers Harm to: Individuals, property, government and morality

• Cybercrime is any illegal act committed using a computer network (especially the Internet).

• Criminal activities that take place in cyberspace (the Internet).

• Computer used to commit a crime – Child porn, threatening email, assuming someone’s identity, sexual harassment, defamation, spam, phishing

• Computer as a target of a crime – Viruses, worms, industrial espionage, software piracy, hacking

CLASSIFICATION OF CYBER CRIME

  • Cybercrime includes a wide variety of crime
  • Offences under cyber crime:

– Offences against the confidentiality integrity and availability of computer data and systems

– Content-related offences

– Copyright-related offences

TYPES OF CYBER CRIME

  • Viruses
  • Fraud
  • Worms
  • Theft
  • Trojans
  • Piracy
  • Mail bombs
  • Break-ins
  • Threats
  • Terrorism
  • Harassment

CYBER LAW IN USA

• Protect America Act of 2007

• Key component “Electronic Surveillance”

• USA Patriot ACT

– Hacking, cracking, extortion, fraud and malware.

• Advertising Law

• E-Signatures

• Electronic Contracts

• Cryptography Laws

• Electronic Evidence

• Copyright Law

• Domain Names

• Confidentiality

NATIONAL & INTERNATIONAL EFFORTS

• First Wave (privacy)

– Sweden (1973) ; USA (1974); Federal Republic of German (1977); Austria, Denmark, France and Norway (1978), etc.

• Second Wave (property)

– Italy (1978); UK (1981,1990); USA (1980s); Canada and Denmark (1985), etc.

• Third Wave (intellectual property)

• Convention on Cybercrime

– Ensuring that countries adopt procedural laws.

– Harmonizing national cybercrime law.

CYBER LAW

• Law governing cyber space

• Cyber law encompasses laws relating to:

   – Cyber Crimes

    – Electronic and Digital Signatures

   – Intellectual Property

   – Data Protection and Privacy

It is the area of law that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information systems (IS).Cyber law is also known as Cyber Law or Internet Law. Cyber laws prevent or reduce large scale damage from cybercriminal activities by protecting information access, privacy, communications, intellectual property (IP) and freedom of speech related to the use of the Internet, websites, email, computers, cell phones, software and hardware, such as data storage devices.The increase in Internet traffic has led to a higher proportion of legal issues worldwide. Because cyber laws vary by jurisdiction and country, enforcement is challenging, and restitution ranges from fines to imprisonment.

THE INFORMATION TECHNOLOGY AMENDMENT ACT, 2008 (IT ACT 2008)

  • It is a substantial addition to India's Information Technology Act (ITA-2000). The IT Amendment Act was passed by the Indian Parliament in October 2008 and came into force a year later. The Act is administered by the Indian Computer Emergency Response Team (CERT-IN). The original Act was developed to promote the IT industry, regulate e-commerce, facilitate e- governance and prevent cybercrime. The Act also sought to foster security practices within India that would serve the country in a global context.
  • The Amendment was created to address issues that the original bill failed to cover and to accommodate further development of IT and related security concerns since the original law was passed.
  • Changes in the Amendment include: redefining terms such as "communication device" to reflect current use; validating electronic signatures and contracts; making the owner of a given IP address responsible for content accessed or distributed through it; and making corporations responsible for implementing effective data security practices and liable for breaches.

MAIN OBJECTIVES OF I T ACT 2000

The following are its main objectives of I T Act 2000

1. It is objective of I.T. Act 2000 to give legal recognition to any transaction which is done by electronic way or use of internet.

2. To give legal recognition to digital signature for accepting any agreement via computer.

3. To provide facility of filling document online relating to school admission or registration in employment exchange.

4. According to I.T. Act 2000, any company can store their data in electronic storage.

5. To stop computer crime and protect privacy of internet users.

6. To give legal recognition for keeping books of accounts by bankers and other companies in electronic form.

7. To make more power to IPO, RBI and Indian Evidence act for restricting electronic crime.

TEN COMMANDMENTS OF COMPUTER ETHICS

1. Thou shalt not copy or use proprietary software for which you have not paid.

2. Thou shalt not use other people's computer resources without authorization or proper compensation.

3. Thou shalt not appropriate other people's intellectual output.

4. Thou shalt think about the social consequences of the program you are writing or the system you are designing.

5. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.

6. Thou shalt not use a computer to harm other people.

7. Thou shalt not interfere with other people's computer work.

8. Thou shalt not snoop around in other people's computer files.

9. Thou shalt not use a computer to steal.

10. Thou shalt not use a computer to bear false witness.

CYBER SECURITY

  • Cyber Security: Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks.
  • Cyber security actually preventing the attacks, cyber security.
  • Privacy Policy: Before submitting your name, e-mail, address, on a website look for the sites privacy policy.
  • Keep Software Up to Date: If the seller reduces patches for the software operating system your device, install them as soon as possible.
  • Installing them will prevent attackers form being able to take advantage.
  • Use good password which will be difficult for thieves to guess.
  • Do not choose option that allows your computer to remember your passwords.

ADVANTAGES OF CYBER SECURITY

  1. The cyber security will defend us from critical attacks.
  2. It helps us to browse the site, website.
  3. Internet Security processes all the incoming and outgoing data on your computer.
  4. It will defend us from hacks and virus.
  5. Application of cyber security used in our PC needs update every week

EFFECTS OF LACK OF CYBERCRIME LAW

  1. System will face critical attacks.
  2. The site, website etc can’t be browsed
  3. Hacks and virus.
  4. Lack of updates for applications
  5. Increase in cyber crimes
  • We can categorize cyber crime in two ways.
  • The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc.
  • The computer as a weapon: - using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.

Types of cyber crime

  • Hacking:- hacking in simple terms means illegal intrusion info a computer system and/or network. It is also known as cracking. Government websites are the hot target of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. Motive behind the crime called hackers motive behind the crime called hacking greed power, publicity, revenge, adventure desire to access forbidden information destructive mindset wants to sell n/w security services.
  • Child pornography: The internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of paedophiles.How do they operate : how do they operate paedophiles use false identity to trap the children , paedophiles connect children in various chat rooms which are used by children to interact with other children.
  • Denial of service attacks: This is an act by the criminals who floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the service he is entitled to access or provide. Many dos attacks, such as the ping of death and tear drop attacks.
  • Virus dissemination: malicious software that attaches itself to other software. Virus, worms, Trojan horse, web jacking, e-mail bombing etc.
  • Computer vandalism: Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.
  • Cyber terrorism: Terrorist attacks on the internet are by distributed denial of service attacks, hate websites and hate e-mails, attacks on service network etc.
  • Software piracy: theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.
  • Cyber crimes threaten national security cyber crimes threatens national security: There is huge potential for damage to national security through cyber attacks. The internet is a means for money bounding and funding terrorist attacks in an organized manner.

PROTECT YOUR SYSTEM

• Use anti-virus software and firewalls - keep them up to date

• Keep your operating system up to date with critical security updates and patches

• Dont open emails or attachments from unknown sources

• Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist

• Back-up your computer data on disks or CDs often

• Dont share access to your computers with strangers

• If you have a wi-fi network, password protect it

• Disconnect from the Internet when not in use

• Re-evaluate your security on a regular basis

• Make sure your employees and family members know this info too.

CONCLUSION

Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily. In fact, it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
What a person can learn from cybercrime?
What a person can learn from cybercrime?
what will happen if supply increases and demand decreases for cassette tapes? What will happen when...
what will happen if supply increases and demand decreases for cassette tapes? What will happen when there is a simultaneous decrease in demand and decrease in supply? What will happen when there is an increase in demand for and a decrase in supply of milk?
What happen when the cologne store in the refrigerator? What happen to the fragrance, persistence and...
What happen when the cologne store in the refrigerator? What happen to the fragrance, persistence and the effect on the skin and fabric of the cologne. Explain briefly!
Explain in a few sentences what would happen according to the Law of One Price to...
Explain in a few sentences what would happen according to the Law of One Price to the supply and demand if identical assets were priced differently in two different regions.
Please describe the corporate veil and its purpose. What would happen if the law allowed shareholders...
Please describe the corporate veil and its purpose. What would happen if the law allowed shareholders to be sued for the actions of a corporation?
what will happen when light falls on a solid crystalline?
what will happen when light falls on a solid crystalline?
According to the law of large numbers, what should happen as an insurance company increases the...
According to the law of large numbers, what should happen as an insurance company increases the number of loss exposures that it insures? A) Fewer losses should be expected to occur. B) The amount of premiums needed to cover losses should decrease. C) The volatility of the insurance company's underwriting results should increase. D) The difference between actual and expected results should decrease
According to the law of large numbers, what should happen as an insurance company increases the...
According to the law of large numbers, what should happen as an insurance company increases the number of loss exposures that it insures? A) Fewer losses should be expected to occur. B) The amount of premiums needed to cover losses should decrease. C) The volatility of the insurance company's underwriting results should increase. D) The difference between actual and expected results should decrease
When the allelic frequencies of two generations are different. What happen?
When the allelic frequencies of two generations are different. What happen?
what would happen if mitosis happened too quickly or when it was not supposed to.
what would happen if mitosis happened too quickly or when it was not supposed to.
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT