SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Introduction:

The term „cyber crime‟ is a misnomer. This term has nowhere been defined in any statute/Act
passed or enacted by the Indian Parliament. The concept of cyber crime is not radically different
from the concept of conventional crime. Both include conduct whether act or omission, which
cause breach of rule of law and counterbalanced by the sanction of the state. Though cyber
crimes is new breed of crimes which came into being just after the advent of the computers and
the scenario has become more worse white the influence of internet in our day to day life.

Conventional Crime:

Crime is a social and economic phenomenon and is as old as the human society. Crime is a legal
concept and has the sanction of the law. Crime or an offence is “a legal wrong that can be
followed by criminal proceedings which may result into punishment.”(1)The hallmark of
criminality is that, it is breach of the criminal law. Per Lord Aitkin “ the criminal quality of an
act cannot be discovered by reference to any standard but one: is the act prohibited with penal
consequences”.(2)

Cyber Crime:

Cyber crimes are the latest and perhaps the most complicated problem in the cyber world.”Cyber
crime may be said to be those species, of which,genus is conventional crime, and where either
the computer is an object or subject of the conduct constituting crime”(13).”Any criminal activity
that uses computer either as an instrumentally, target or a means for perpetuating further crimes
comes within the ambit of cyber crime”(12)

A generalized definition of cyber crime may be “unlawful acts where in the computer are either
a tool or target or both” (3).When the individual is the main target of cyber crime, the computer
can be considered as the tool rather than the target. These crimes generally involve less technical
expertise as the damage done manifests itself in the real world. The computer may be used as a
tool in the following kind of activity- financial crimes, sale of illegal articles, pornography,
online gambling, intellectual property crimes, e-mail spoofing, forgery, cyber defamation, cyber
stalking.

The computer may however be target for unlawful acts in the following cases- unauthorized
access to computer/computer system/computer network theft of information contained in the
electronic form e-mail bombing, data didling salami attacks, logic bombs, Trojan attacks,
internet time thefts, web jacking, theft of computer system, physically damaging the computer
system.

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Law
Cyber LawCyber Law
Cyber Lawihah
 
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityFOTIOS ZYGOULIS
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspaceDr. Arun Verma
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context Bank Alfalah Limited
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshMd. Mehedi Al Hasan Rakib
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Cybertorts
CybertortsCybertorts
Cybertortspanabaha
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crimeIshitaSrivastava21
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)Geritt Contillo
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in IraqAyub Nuri
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...International Islamic University Malaysia
 

Was ist angesagt? (20)

Cyber Law
Cyber LawCyber Law
Cyber Law
 
Present Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in BangladeshPresent Trend of Cyber Crime in Bangladesh
Present Trend of Cyber Crime in Bangladesh
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurity
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
Cyber crime law
Cyber crime lawCyber crime law
Cyber crime law
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
#Digital Caribbean: Electronic Crime Bill
#Digital Caribbean: Electronic Crime Bill#Digital Caribbean: Electronic Crime Bill
#Digital Caribbean: Electronic Crime Bill
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybertorts
CybertortsCybertorts
Cybertorts
 
Electronic defamation
Electronic defamationElectronic defamation
Electronic defamation
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)A study on internet libel in the philippines (2)
A study on internet libel in the philippines (2)
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Cyber crime-in-bangladesh
Cyber crime-in-bangladesh Cyber crime-in-bangladesh
Cyber crime-in-bangladesh
 
Online defamation through social media an attempt to reconcile conflicts bet...
Online defamation through social media  an attempt to reconcile conflicts bet...Online defamation through social media  an attempt to reconcile conflicts bet...
Online defamation through social media an attempt to reconcile conflicts bet...
 

Ähnlich wie Ros asignment

Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfShylesh BC
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxpoulterbarbara
 

Ähnlich wie Ros asignment (20)

Cyber Crimes.pdf
Cyber Crimes.pdfCyber Crimes.pdf
Cyber Crimes.pdf
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cyber crime report
Cyber crime reportCyber crime report
Cyber crime report
 
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdf
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docxVol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
Vol. 6(1), pp. 1-12, August 2016 DOI 10.5897JIIS2015.0.docx
 

Ros asignment

  • 1. Introduction: The term „cyber crime‟ is a misnomer. This term has nowhere been defined in any statute/Act passed or enacted by the Indian Parliament. The concept of cyber crime is not radically different from the concept of conventional crime. Both include conduct whether act or omission, which cause breach of rule of law and counterbalanced by the sanction of the state. Though cyber crimes is new breed of crimes which came into being just after the advent of the computers and the scenario has become more worse white the influence of internet in our day to day life. Conventional Crime: Crime is a social and economic phenomenon and is as old as the human society. Crime is a legal concept and has the sanction of the law. Crime or an offence is “a legal wrong that can be followed by criminal proceedings which may result into punishment.”(1)The hallmark of criminality is that, it is breach of the criminal law. Per Lord Aitkin “ the criminal quality of an act cannot be discovered by reference to any standard but one: is the act prohibited with penal consequences”.(2) Cyber Crime: Cyber crimes are the latest and perhaps the most complicated problem in the cyber world.”Cyber crime may be said to be those species, of which,genus is conventional crime, and where either the computer is an object or subject of the conduct constituting crime”(13).”Any criminal activity that uses computer either as an instrumentally, target or a means for perpetuating further crimes comes within the ambit of cyber crime”(12) A generalized definition of cyber crime may be “unlawful acts where in the computer are either a tool or target or both” (3).When the individual is the main target of cyber crime, the computer can be considered as the tool rather than the target. These crimes generally involve less technical expertise as the damage done manifests itself in the real world. The computer may be used as a tool in the following kind of activity- financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crimes, e-mail spoofing, forgery, cyber defamation, cyber stalking. The computer may however be target for unlawful acts in the following cases- unauthorized access to computer/computer system/computer network theft of information contained in the electronic form e-mail bombing, data didling salami attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer system, physically damaging the computer system.