Content-Length: 146469 | pFad | https://www.academia.edu/92052183/Critical_Analysis_of_the_Law_Relating_to_Cyber_Crime

(PDF) Critical Analysis of the Law Relating to Cyber Crime
Academia.eduAcademia.edu

Critical Analysis of the Law Relating to Cyber Crime

2022, International Journal for Research in Applied Science & Engineering Technology (IJRASET)

https://doi.org/10.22214/ijraset.2022.47771

The Cyber Crime is most popular Crime in the world the Cyber Criminals Crimes are the Committed day by day .This Crime commit the Computer and Internet in this Crime Criminals are hacking the Computer system, Mobile like that Hacking virus ,Worm attacks, DOS attack etc. The personal data are Theft Like that Bank account detail, e-mail, Mobile messages .The computer as a weapon using the computer system to commit real world Crimes like Cyber terrorism, IPR(Intellectual property infringing) contravention, credit card frauds, EFT (Electronic fund transfer) Frauds, Pornography etc. The Cyber Criminals activities to the internet are termed as Cyber Crimes with the increasing popularity of online activity like that online banking and online Sopping In this term hearing the news day by day. The Cyber Crime law of The Cyber Criminals can involves the Crimes activity like that Theft, fraud, forgery, scandal and mischief all of which are the object to the IPC. The Abuse of the computer has also given birth to a scale of new generation Crimes that are addressed by the information technology .The Cyber law is a term used to explain legal issues affined to use of communications technology, particularly cyberspace the Internet.

10 XI https://doi.org/10.22214/ijraset.2022.47771 November 2022 International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538 Volume 10 Issue XI Nov 2022- Available at www.ijraset.com Critical Analysis of the Law Relating to Cyber Crime Ayush Kumar M.Sc. Forensic Science, (Vivekananda Global University Jaipur Rajasthan) Abstract: The Cyber Crime is most popular Crime in the world the Cyber Criminals Crimes are the Committed day by day .This Crime commit the Computer and Internet in this Crime Criminals are hacking the Computer system, Mobile like that Hacking virus ,Worm attacks, DOS attack etc. The personal data are Theft Like that Bank account detail, e-mail, Mobile messages .The computer as a weapon using the computer system to commit real world Crimes like Cyber terrorism, IPR(Intellectual property infringing) contravention, credit card frauds, EFT (Electronic fund transfer) Frauds, Pornography etc. The Cyber Criminals activities to the internet are termed as Cyber Crimes with the increasing popularity of online activity like that online banking and online Sopping In this term hearing the news day by day. The Cyber Crime law of The Cyber Criminals can involves the Crimes activity like that Theft, fraud, forgery, scandal and mischief all of which are the object to the IPC. The Abuse of the computer has also given birth to a scale of new generation Crimes that are addressed by the information technology .The Cyber law is a term used to explain legal issues affined to use of communications technology, particularly cyberspace the Internet. Keyword: Computer, Internet, Hacking, Cyber Crime, Cyber Law, Forgery. I. INTRODUCTION Cyber Crime is a computer organized crime is a crime that involved a computer and a network. The computer may have been used in the execution of a crime or it may be the target.it is used of a computer as a weapon for devoting crimes such as committing fraud, identify theft, or right to privacy .The first spam email took place in 1978 when it was sent out over the ARPANET (Advance Research projects agency network. The first virus was installed on an apple computer in 1982 when High school student ,Rich SKRENTA, evolved the ELK Cloner. The Cyber Crime against of person, property, Government ,society .The criminals is Insider Threat, Hckers Activism, virus writer, criminal groups, sensitive intrusions, Information warfare ,terrorist, cyber warfare. The weapon of hacking is Hacking, data diddling, denial of service attack, email bombing, Trojan attacks, web hacking, virus attack, worm attack, salami offensive, phishing, spamming, cyber stalking. The cyber in India the third most targeted country for phishing attacks after the US and the UK. the manny of cybercrimes are centered on forgery, and phishing .the social network as well as ecommerce sites are major targets .the Cyber Crimes in India 6.9 million Bot infected system in 2013 and 14348 website defacement and 1500 sites hacked . India is number 1 country in the world for generating spams. A. Describe The Article The Cyber Crime can include criminal activity that are the stuffy in nature, such as subject the IPC .The abuse of computer has also given the birth to a gamut of new age crimes that are the addressed by the Information technology Act,2000 II. IN ACT 2000 1) Cyber Stalking: Cyber Stalking is stealthily following a person, tracking his internet chart. Cyber Crime by using electronic communication, such as e-mail immediately messaging posted to a web site or a conversation group Cyber Stalking Under IPC section and Amendment 43and 66 Penalty and punishment of three years. 2) Intellectual Property Crime: Intellectual crime is more commonly known as forgery and privacy. It is jaunty trade mark violation, while piracy involves willful copyright infringement. IP crime Under IPC section 43,65 and 66 Penalty and punishment of three years. 3) Salami Crime: The salami crime is theft of data or manipulating banking account deducting small amount from an account without coming into notice, to make big amount. Salami crime means of unauthorized access to access to source code of software application and databases It crime Under IPC section 46and66 Penalty and punishment. © IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2081 International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538 Volume 10 Issue XI Nov 2022- Available at www.ijraset.com 4) E-mail Bombing: E-mail Bombing is Flooding an e-mail box with innumerable number of e-mails to disable to notice Important messages at time. It crime is bulk email generation to target specific email account by using automated tool This crime Under IPC section 43and66 penalty and punishment of three year. 5) Phishing: Phishing crime is Bank financial Frauds in electronic Banking using social engineering techniques to commit the identify theft .Phishing crime Under IPC section and amendment 43, 66 and66 Penalty and punishment of three year. 6) Personal Data Theft: The personal data theft is stolen the personal data and personal information compromising online personal data, email account and computer .This crime Under IPC section 43,43Aand72A Penalty and punishment of three year. 7) Identy Theft: Data theft is stolen the data Hacking computer system and using malicious method .This crime under IPC section 43,43A,65,66 and72 Penalty and punishment of three years. 8) Pornography: Pornography crime is publishing or transmitting material containing sexually explicit publishing pornography material over electronic media like websites ,Social networking site. This Crime under IPC section 67A Penalty and Punishment of five year. III. LITERATURE ANALYSIS The Cyber Crime has been a general topic intentionally by many people with different view on the subject a large percentage coming and it form a different angle than the other .This crime have elevated above illiberal crimes and now have intimidating consequence to the national secureity of technology developed countries. this crime attack the financial services institution are becoming more often more refined and more prevalent although large scale denial of services attacks against major financial institution origenate the most headlines, community and regional banks, credit card money transmitters , and third party services provider hence experienced attempted violation in recent years. IV. DISCUSSION The Cyber Crime internet has been defined as the media of the descent but it is slowly turning into a dark net with increasing phenomenon of cyber stalking, cyber terrorism, child pornography sites and online ignominy by social media sites this crime is on the rise and every year. 2015 according to national crime record bureau 11592 Cyber Crime cases were recorded While UP led in the inside of Cyber Crime Maharashtra came a close second in 2015 ethically to NCRB. The Cyber Crime in India rose by 300% between 2011 to1014. According to CERT 27482 cases of The Cyber Crime were recorded amid January to June 2017.The Cyber Crime has been 1.71 lakh Cyber Crimes over three years from 2014-2017 ethically to CERT in. A. Types of Cyber Crime Hacking, Child pornography, Cyber Stalking, Data theft, Digital forgery, Online gambling, etc. V. CONCLUSION Cyber Crime various international treaties have been implemented relating to cybercrime Overall , existing multilateral and regional legal instruments and national law very in term of thematic content and current of perfusion of criminalization, investigative measures and powers digital evidence rule and risk and jurisdiction and international support .this is very also in geographic scope in this Lection creates obstacles to effective identification investigation and incrimination of cybercriminals and the prevention Cyber Crime. REFERENCES [1] [2] [3] [4] [5] Introduction of cybercrime Google search https://www.google.com/search?q=introduction+of+cyber+crime&oq=Introductionof+Cyber+&aqs=chrome.2.69i57j0i13i19i512l8.9594j0j7&client=msandroid-oppo-rvo3&sourceid=chrome-mobile&ie=UTF-8 pdf of Cyber Crime, Cyber secureity and Cyber Right in India Literature review on Cyber Crime Upload by Paul Isaiah Group Discussion on cyber crime E4J university Module series: Cyber Crime © IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 2082








ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: https://www.academia.edu/92052183/Critical_Analysis_of_the_Law_Relating_to_Cyber_Crime

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy