際際滷

際際滷Share a Scribd company logo
Introduction:

The term cyber crime is a misnomer. This term has nowhere been defined in any statute/Act
passed or enacted by the Indian Parliament. The concept of cyber crime is not radically different
from the concept of conventional crime. Both include conduct whether act or omission, which
cause breach of rule of law and counterbalanced by the sanction of the state. Though cyber
crimes is new breed of crimes which came into being just after the advent of the computers and
the scenario has become more worse white the influence of internet in our day to day life.

Conventional Crime:

Crime is a social and economic phenomenon and is as old as the human society. Crime is a legal
concept and has the sanction of the law. Crime or an offence is a legal wrong that can be
followed by criminal proceedings which may result into punishment.(1)The hallmark of
criminality is that, it is breach of the criminal law. Per Lord Aitkin  the criminal quality of an
act cannot be discovered by reference to any standard but one: is the act prohibited with penal
consequences.(2)

Cyber Crime:

Cyber crimes are the latest and perhaps the most complicated problem in the cyber world.Cyber
crime may be said to be those species, of which,genus is conventional crime, and where either
the computer is an object or subject of the conduct constituting crime(13).Any criminal activity
that uses computer either as an instrumentally, target or a means for perpetuating further crimes
comes within the ambit of cyber crime(12)

A generalized definition of cyber crime may be unlawful acts where in the computer are either
a tool or target or both (3).When the individual is the main target of cyber crime, the computer
can be considered as the tool rather than the target. These crimes generally involve less technical
expertise as the damage done manifests itself in the real world. The computer may be used as a
tool in the following kind of activity- financial crimes, sale of illegal articles, pornography,
online gambling, intellectual property crimes, e-mail spoofing, forgery, cyber defamation, cyber
stalking.

The computer may however be target for unlawful acts in the following cases- unauthorized
access to computer/computer system/computer network theft of information contained in the
electronic form e-mail bombing, data didling salami attacks, logic bombs, Trojan attacks,
internet time thefts, web jacking, theft of computer system, physically damaging the computer
system.

More Related Content

What's hot (20)

Cyber Law
Cyber LawCyber Law
Cyber Law
ihah
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
Southeast university, Bangladesh
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
Bangladesh Network Operators Group
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurity
FOTIOS ZYGOULIS
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
Dr. Arun Verma
Cyber crime law
Cyber crime lawCyber crime law
Cyber crime law
Jessica Rico
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
Md.Azizul hakim Anik
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context
Bank Alfalah Limited
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
Md. Mehedi Al Hasan Rakib
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
Teeth Maestro
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
ian_oguis
#Digital Caribbean: Electronic Crime Bill
#Digital Caribbean: Electronic Crime Bill#Digital Caribbean: Electronic Crime Bill
#Digital Caribbean: Electronic Crime Bill
CommonwealthBroadcastingAssoc
Cyber Security
Cyber SecurityCyber Security
Cyber Security
RP6997
Cybertorts
CybertortsCybertorts
Cybertorts
panabaha
Electronic defamation
Electronic defamationElectronic defamation
Electronic defamation
Apostolos Syropoulos
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
IshitaSrivastava21
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
Geritt Contillo
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
Ayub Nuri
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
Md Nazmul Hossain Mir
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...
International Islamic University Malaysia
Cyber Law
Cyber LawCyber Law
Cyber Law
ihah
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurity
FOTIOS ZYGOULIS
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
Dr. Arun Verma
Cyber crime law
Cyber crime lawCyber crime law
Cyber crime law
Jessica Rico
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context
Bank Alfalah Limited
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
Md. Mehedi Al Hasan Rakib
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
Teeth Maestro
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
ian_oguis
Cyber Security
Cyber SecurityCyber Security
Cyber Security
RP6997
Cybertorts
CybertortsCybertorts
Cybertorts
panabaha
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
IshitaSrivastava21
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
Geritt Contillo
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
Ayub Nuri
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...
International Islamic University Malaysia

Similar to Ros asignment (20)

Cyber Crimes.pdf
Cyber Crimes.pdfCyber Crimes.pdf
Cyber Crimes.pdf
SunilSaklani6
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
Write My Statistics Paper Vestal
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
Talwant Singh
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
Vishni Ganepola
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
Tushar Rajput
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
Custom Paper Writing Service
Cyber crime
Cyber crimeCyber crime
Cyber crime
Ranjana Adhikari
Cyber crime
Cyber crimeCyber crime
Cyber crime
24sneha
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Rohit Revo
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
Alisha Korpal
Cybercrime
CybercrimeCybercrime
Cybercrime
promit
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Universitas Pembangunan Panca Budi
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
Cyber crime report
Cyber crime reportCyber crime report
Cyber crime report
Ronson Calvin Fernandes
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdf
Shylesh BC
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
Faridah Husin
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rajat Jain
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
poulterbarbara
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
Talwant Singh
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
Vishni Ganepola
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
Tushar Rajput
Cyber crime
Cyber crimeCyber crime
Cyber crime
24sneha
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Rohit Revo
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
Alisha Korpal
Cybercrime
CybercrimeCybercrime
Cybercrime
promit
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Universitas Pembangunan Panca Budi
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdf
Shylesh BC
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
Faridah Husin
Cyber crime
Cyber crimeCyber crime
Cyber crime
Rajat Jain
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
poulterbarbara

Ros asignment

  • 1. Introduction: The term cyber crime is a misnomer. This term has nowhere been defined in any statute/Act passed or enacted by the Indian Parliament. The concept of cyber crime is not radically different from the concept of conventional crime. Both include conduct whether act or omission, which cause breach of rule of law and counterbalanced by the sanction of the state. Though cyber crimes is new breed of crimes which came into being just after the advent of the computers and the scenario has become more worse white the influence of internet in our day to day life. Conventional Crime: Crime is a social and economic phenomenon and is as old as the human society. Crime is a legal concept and has the sanction of the law. Crime or an offence is a legal wrong that can be followed by criminal proceedings which may result into punishment.(1)The hallmark of criminality is that, it is breach of the criminal law. Per Lord Aitkin the criminal quality of an act cannot be discovered by reference to any standard but one: is the act prohibited with penal consequences.(2) Cyber Crime: Cyber crimes are the latest and perhaps the most complicated problem in the cyber world.Cyber crime may be said to be those species, of which,genus is conventional crime, and where either the computer is an object or subject of the conduct constituting crime(13).Any criminal activity that uses computer either as an instrumentally, target or a means for perpetuating further crimes comes within the ambit of cyber crime(12) A generalized definition of cyber crime may be unlawful acts where in the computer are either a tool or target or both (3).When the individual is the main target of cyber crime, the computer can be considered as the tool rather than the target. These crimes generally involve less technical expertise as the damage done manifests itself in the real world. The computer may be used as a tool in the following kind of activity- financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crimes, e-mail spoofing, forgery, cyber defamation, cyber stalking. The computer may however be target for unlawful acts in the following cases- unauthorized access to computer/computer system/computer network theft of information contained in the electronic form e-mail bombing, data didling salami attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer system, physically damaging the computer system.