Disclosure: Techzet may get little commission on purchases through this page, which does not any cost to you.*Note-Prices, Discounts may vary and Coupon is for limited period..

Cyber crime or Computer crime, is any crime that involves a computer and a network. the personal computer can be used in the commission of against the law, or it’s going to be the target.


Offences that are committed against people or teams of people with a criminal motive to on purpose hurt the name of the victim or cause physical or mental hurt, or loss, to the victim directly or indirectly, victimization conventional telecommunication networks like web (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS).

Such crimes might threaten a nation’s security and money health. Problems closed to these varieties of crimes become high-profile, significantly those closes to hacking, violation etc.

Dr. Debarati Halder and Dr.K.Jaishankar(2011) defined cyber crime  from the attitude of gender and defined cyber crime  against women as Crimes targeted against women with a motive to on purpose hurt the victim psychologically and physically, using modern communication networks such as internet and mobile phones.

Internationally both governmental and non-state engage in cybercrimes, including espionage, financial theft, and other cross-border crimes.

Activity crossing international borders and involving the interests of a minimum of one nation state is usually observed as cyber warfare. The international system is making an attempt to carry actors answerable for their actions through the International court.


Classification:-

  • Fraud and money crime
  • Cyber act of terrorism
  • Cyber extortion
  • Cyber warfare
  • Computer as a target
  • Computer as a tool

Combating computer  crime:-

  • Diffusion of Cyber crime: The broad diffusion of cyber criminal activities is difficult to detect computer crimes and prosecution.
  • Investigation: A computer can be taken as a source of evidence (see digital forensics). Even computer is not directly used for criminal activities, yet it may contain records in the form of a logfile.
  • Legislation: cyber criminals use developing countries in order to evade detection and prosecution from law enforcement due to its exploitable laws.

Reference: https://en.wikipedia.org/wiki/Cybercrime

Leave a Reply

Your email address will not be published. Required fields are marked *