Search icone
Search and publish your papers

Cyber crime

Or download with : a doc exchange

About the author

 
Level
General public
Study
others
School/University
PUNJAB...

About the document

Published date
Language
documents in English
Format
.ppt
Type
presentations
Pages
20 slides
Level
General public
Accessed
2 times
Validated by
Committee Oboolo.com
0 Comment
Rate this document
  1. Introduction
  2. Cyber crime: Meaning
  3. Reasons for cyber crime
  4. Cyber criminals
  5. Technologies exploited by cyber criminals
  6. Modes of committing cyber crime
  7. Detection of cyber crime
  8. Cyber crime prevention
  9. Bibliography

Cyber crime refers to anything done in the cyber space with a criminal intent. These could be either the criminal activities in the conventional sense or could be activities, newly evolved with the growth of the new medium. Cyber crime includes acts such as hacking, uploading obscene content on the Internet, sending obscene e-mails and hacking into a person's e-banking account to withdraw money. Cyber crime can broadly be defined as criminal activity involving an information technology infrastructure, illegal access, non-public transmissions of computer data to, from or within a computer system, unauthorized damaging, deletion, deterioration, alteration or suppression of computer data,Systems interference ,misuse of devices, forgery, and electronic fraud. The problem encountered in guarding a computer system from unauthorized access is that there is every possibility of breach not due to human error but due to the complex technology.

Similar documents you may be interested in reading.

Cyber law in India

 Law & contracts   |  Other law subjects   |  Case study   |  03/05/2009   |   .doc   |   33 pages

Cyber Terrorism: The darker side of internet applications

 Science & technology   |  Computer science   |  Term papers   |  06/11/2009   |   .pdf   |   4 pages

Top sold for other law subjects

Co-Ownership and joint tenancy problem question

 Law & contracts   |  Other law subjects   |  Presentation   |  08/13/2008   |   .doc   |   5 pages