Sunteți pe pagina 1din 3

VINEET GARG 1344_Vineet

Ques.1

What makes cyber crimes different form conventional crime? Explain. The cyber crime is not totally different from the conventional crime:-

Cyber crime is the latest and perhaps the most complicated problem in the cyber world. whereas genus is the conventional crime, where either the computer is an object or subject of the conduct constituting crime. The involvement of medium makes cyber crime distinct from conventional crimes. Cyber space does not have geographical boundaries, Cyber criminals refuse to be bounded by the conventional jurisdictional areas of nations, originating an attack from almost any computer in the world, passing it across multiple national boundaries, or designing attacks that appear to be originating from foreign sources, Such techniques dramatically increase both the technical and legal complexities of investigating and prosecuting cyber crimes, Unlike conventional crimes against persons or property such as rape, burglary and murder, cyber crimes are very skill intensive. Stock of hacking skills is thus a prerequisite to cyber crimes. Whereas minimal skill is needed for opportunistic attacks, targeted attacks require more sophisticated skills. Ques.2 Ques.3 Explain the reasons for vulnerability of computers? What are the cyber crimes that can be committed against individuals and individuals property? Explain A generalized definition of cyber crime is unlawful acts wherein the computer is either a tool or target or both. Cyber crime against individuals are: Harassment via e-mails 1. Email spoofing 2. b)Cyber pornography (exm.MMS) Cyber-stalking. Dissemination of obscene material. Defamation. Unauthorized control/access over computer system. Indecent exposure Email spoofing Cheating & Fraud Breach of Confidentiality

VINEET GARG 1344_Vineet

Crime against Individual property: Computer vandalism Transmitting virus Netrespass Unauthorized control/access over computer system Intellectual Property crimes Internet time thefts. Ques.4 Explain the provisions relating to cyber crimes under the IT Act, 2000? The various provisions of the IT Act, 2000 enables to fight against the various cyber crimes. There are some other legislation, along with IT Act to enforce that the cyber space is free from crime. These statutory provisions will control and regulate the various activities in cyber space. The Indian parliament considered it necessary to give effect to the resolution by which the General Assembly adopted Model Law on Electronic Commerce adopted by the United Nations Commission on Trade Law. As a consequence of which the Information Technology Act, 2000 was passed and enforced on 17th May 2000.33 The preamble of this Act states its objective to legalise ecommerce and further amend the IPC 1860, the Indian Evidence Act 1872, the Bankers Book Evidence Act 1891 and the Reserve Bank of India Act 1934.

VINEET GARG 1344_Vineet

Ques.5

Explain the following: (a) Cyber Stalking It is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include false accusations, monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass. Cyber stalking is different from spatial or offline stalking in that it occurs through the use of electronic communications technology such as the internet. However, it sometimes leads to it, or is accompanied by it. Both are criminal offenses. Cyberstalking shares important characteristics with offline stalking. Many stalkers - online or off are motivated by a desire to control their victims.

(b)

Email spoofing

Email spoofing is email activity in which the sender address and other parts of the email header are altered to appear as though the email originated from a different source. Because core SMTP doesn't provide any authentication, it is easy to impersonate and forge emails. Although there may be legitimate reasons to spoof an address, these techniques are commonly used in spam and phishing emails to hide the origin of the email message. A number of measures to address spoofing have been proposed, including: SPF, Sender ID, and DKIM, and these are now widely implemented

S-ar putea să vă placă și