codescracker


computer networking

Cyber Crimes



« Previous Tutorial Next Tutorial »


Crimes committed with the use of computers or relating to computers, especially through the Internet is known as Cyber Crimes.

Universally, cyber crimes is understood as an unlawful act where in the computer is either a tool or a target or both.

Cyber crimes are different from conventional crimes as in cyber crimes, the cyber crime is committed in an electronic medium.

Here are the list of cyber crimes:

Let's take a brief look at all the above cyber crimes classification one by one.

Tempering with Computer Source Documents

A person who knowingly or intentionally, conceals (hides or keeps secret), destroys (demolishes or reduces), alters (change in characteristics) or causes another to conceal, destroy, and alter any computer source code used for a computer, computer program, computer system or computer network, when the computer source code is required to be kept or maintained by law punishable.

For instance, hiding the C.D.ROM in which the source code files are stored, making a C File into a CPP File or removing the read only attributes of a file.

Hacking

Hacking is the unauthorized access of a computer system and networks. Whoever with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person destroys or deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by means is said to commit hacking.

Publishing of Obscene Information

A person who publishes or transmits or causes to be published in the electronic form, any material which is lascivious, or if its effect is such as to tend to deprave and corrupt persons who are likely to read, see or hear the matter contained or embodied in it, is liable to punishment.

The important ingredients of such an offence are publishing (make generally known or issue copies for sale to public), or transmitting (transfer or be a medium for), or causing to be published (to produced the effect of publishing), pornographic material in the electronic form.

Child Pornography

Child Pornography is a part of cyber pornography but it is such a grave offence that it is individually also recognized as a cyber crime.

Accessing Protected System

Any unauthorized person who secures access or attempts to secure access to a protected system is liable to be punished with imprisonment and may also be liable to fine.

Breach of Confidentiality and Privacy

Any person who, secures access to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned or discloses such electronic record, book, register, correspondence, information, document or other material to any other person shall be liable to be punished under the Information Technology Act.


« Previous Tutorial Next Tutorial »



Tools
Calculator

Quick Links
Signup - Login - Give Online Test