Computer crime is the illegal use of a computer by an unauthorized individual, either for pleasure such as by a computer hacker or for profit as by a thief. Thus, it refers to any crime such as tampering, physical danger and unwanted disclosure of data that involves a computer and a computer network. It includes the computer that may have been used in the commission of a crime, or it may be the target.
The increasing range of programmable electronic devices, such as PDA, iPad, iPhone, mobiles devices, means that ‘computer”. Crime can affect more than just personal computers (PCs) to all these devices, which are particularly vulnerable to attack because of flexibility. They can be reprogrammed and are frequently connected with other devices. For example, a personal computer connected to the Internet without protection may be infected with malicious software within a minute.
Generally, computer crimes are committed for the following:
Attempt illegally to access information stored on a computer as information may have a sale value, may be valuable to the owner or may be useful for further illegal activity such as fraud.
Try to impede or alter the functioning of the computer itself as if computer can be controlled it can be used to send spam, host illegal content, or conduct further attacks.
Many countries have passed cyber laws. Many other rules and regulations are emerged for the protection of computer and its related resources. The recent surveys dome by different agencies and organizations show that the rate of computer crime has been increasing day by day. A range of technologies is available to home users and organizations to secure their computers from possible computer crimes.
Technological solutions
If correctly installed, the following can help to block attacks:
Firewalls: These are hardware or software devices that block certain network traffic according to their security policy.
Software Solutions: These are use to identify and remove malware and to help manage spam email. Many must be paid for but free versions are also available. For example, Antivirus, Antispyware software.
Authentication: This process involves determining that a particular user is authorized to use a particular computer. This can include simple mechanisms such as passwords, to more complex methods using biometric technology.
Hardware Cryptography: It uses computer chips with cryptographic capabilities intended to protect against a range of security threats.
Patches: These are programs designed by software manufacturers to fix software security flaws. Patching is often installed automatically. This reduces end-user participation and increase ease of use.
Concept of Cyber Law
The term `Cyber’ is a prefix attached to “everyday” words in order to give them a computer-based or internet online meaning, as in Cyber Law, cyberspace, cybercafe etc. Actually, this prefix is derived form the word cybernetics, which refers to the study of mechanisms used to control and regulate complex systems, either human or machine. Cyber law is a term that encapsulates the legal issues related to use of communicative, transactional, and distributive aspects of networked information devices and technologies. Hence, it is related to the practice of law either in relation to or through the use of the Internet. Basically, cyber law deals with internet hacking, pornography, cyber-stalking, cyber-scams, online fraud, software piracy and much more. Legal experts are working in this field to help education and guide the Internet community on crime prevention and the reporting of cybercrimes.
In many countries, Cyber law exists in the name of Information Technology Law (or IT Law). It is a set of recent legal enactments, which governs the process and dissemination of information digitally. These IT laws cover a broad scope of different aspects relating to computer software, protection of computer software, access and control of digital information, privacy, security, internet access and usage, and electronic commerce.
Area of Cyber Law
Cyber law includes many laws relating to the following issues:
Computer Crime Law: Computer crime refers to any crime such as tampering, physical danger and unwanted disclosure of data that involves a computer and a computer network. Some countries have enacted the laws relate to computer crime.
Data Protection and Privacy Law: Ethical issues about storage of personal information are now becoming an increasing problem. With more storage of personal data for social networking arise the problem of selling that information for monetary gain. This gives rise to different ethical situations regarding access, security and the use of hacking in positive and negative situation. Thus, data protection and privacy law deals with these issues.
Intellectual Property Right Law: Intellectual property refers to the creations of the human mind such as musical, literary, photographic and artistic works; discoveries and inventions; and words, phrases, symbols and designs etc. Intellectual property rights protect the interests of creators by giving them property rights over their creations. Common types of intellectual property rights law include copyrights, trademarks, patents, industrial design rights etc.
Electronic and Digital Signature Law: Digital signature is a way of authenticating that an electronic message really come from the person it claims to have come from. A digital signature can be encrypted with your private key. The recipient can decrypt the message with your public key to verify that it is really you. This law deals with the electronic and digital signature in e-Commerce or electronic transaction.
Telecommunication Laws: Communication through the telecommunication also uses the internet. Cyber law also deals with the laws related to the telecommunication.
0 Comments