Information on Cyber-Crime
In the start of a particular development
period, people were quietly driven to accomplish decent progress in
prevailing technological activities. From the beginning of
civilization, humans have always been inspired by necessities to
make better technologies to make life easier and more
comfortable.
In 1969, the design of a super parallel
network called ARPANET (Advanced Research Project Agency) was made.
ARPANET was composed of more than fifty computers connected with
web links to facilitate military operations. These networks
gradually grew and later became popular by the name of The
Internet, to share business systems where communication was carried
out in “Cyberspace.”
The term Cyberlaw denotes the legal
jurisdiction and other means of previous regulatory aspects on the
internet. This process is a constantly generic one. At the time
when an internet development strategy is made, various
modifications are enforced during its development, as a result of
which various legal concerns also gets developed via illicit
activists. Child Pornography is one of the most severe cybercrimes.
Online pedophiles devise ways to engage kids in sexual activities
using the Internet. Likewise, the traffic threats, distribution of
indecent material, and posting of pornography with all its dirty
exposure are some of the most significant known criminal cyber
offenses nowadays. Such offenses, in reality, impends to defy the
development of technology and also leave a perpetual scar and
destruction on the younger generation, if not restricted.
In the world of cybercrime, a rather
distinctive form of harassment is Cyber
annoyance. Several types of harassment occur in cyberspace
or by using cyberspace to reach criminal offenses. Different forms
of harassment can be racial, sexual, religious, or any other. People involved in executing this form of
harassment are guilty of cybercrimes. Harassment and Stalking are
among issues that numerous people, particularly women, face in
real-life.
One more type of cybercrime, is cybercrime
against property in varied forms.
Such criminal offenses consist of
unsanctioned computer trespass via cyberspaces, destruction of
computer, and transmission of harmful programs and unauthorized
tenure of computerized information. Until presently, cracking and
hacking are among the largest known cybercrimes. Hacking is known
as breaking into a computer system without the will and knowing of
the authorized person, interfering with the valuable and private
information or data. Utilizing one's programming capabilities as
well as hiring different programmers to attain access to a network
or a specific computer via unauthorized access are among serious
criminal offenses. Similarly, the making and distribution of
damaging computer programs or any type of nasty viruses or software
which causes permanent damage to network or computer systems are
another type of cybercrime; software piracy is a discrete form of
cybercrime. Numerous people in the cyber world disseminate illegal
and unofficial pirated copies of software products for monetary
benefits.
Another form of cybercrime is a crime
against government administration, or also known as Cyber
Terrorism.
With the exponential increase in the use of
the internet, several nation-state individuals or groups have
arisen which use cyberspace to threaten the worldwide governments
and to terrify the residents of the country. This crime exhibits
when a group or an individual "cracks" or hacks into a military or
government maintained website. We can
classify cyber-crimes into three broad categories which
are:
1) Crime against the
Individuals
It can be further categorized into crimes
against:
Person
Property of an individual.
2) Crime against
Organization
It can be further categorized into crimes
against:
Government
Any Firm, Company, or Group of
Individuals.
3) Crime against Society
Below mentioned are examples of some
specific crimes which are committed against the above mentioned
different groups
Crimes against Individuals
a. Cyber-stalking.
b. Harassment through
electronic mails
c. Email spoofing.
d. Defamation.
e. Indecent or Offensive
exposure.
f. Broadcasting
indecent material.
g. Unauthorized control/access over
network or computer system.
h. Cheating.
i. Fraud.