Loading...

Articles on Cyber Security

Impact of Cyber Laws in India: Cyber Law is a term that encapsulates the legal issues related to use of Communicative, Transactional, and Distributive aspects of networked information Devices and Technologies. It is less a distinct field of law in the way that property or contracts are, as it is a domain covering many areas of law and regulation. Some leading topics include Intellectual Property, Privacy, Freedom of Expression, and Jurisdiction. In Indian law, Cyber Crime has to be voluntary and willful, an act or omission that adversely affects a person or property. The IT Act provides the backbone for E-Commerce and India’s approach has been to look at E-Governance and E-Commerce primarily from the promotional aspects looking at the vast opportunities and the need to sensitize the population to the possibilities of the information age. There is the need to take in to consideration the security aspects.

Let us know Cyber Forensics & Cyber Crime: From the Editor’s Desk
Computer Forensics is the application of scientifically proven methods to gather, process, interpret, and to use digital evidence to provide a conclusive description of Cyber Crime activities.  Cyber Forensics also includes the act of making digital data suitable for inclusion into a criminal investigation.

Cyber Crime encompasses a broad range: From the Editor’s Desk
Cyber Crime encompasses a broad range of potentially illegal activities. Generally, however, it may be divided into one of two types of categories;

  • Crimes that target computer networks or devices directly;
  • Crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.

 Examples of crimes that primarily target computer networks or devices would include,
 

Spam:
Spam, or the unsolicited sending of bulk email for commercial purposes, is unlawful to varying degrees. As applied to email, specific anti-spam laws are relatively new, however limits on unsolicited electronic communications have existed in some forms for some time.

A Young, inexperienced, and possessing Cyber Criminal/ Cracker with vast quantities of time to waste, to get into just one more system. However, there is a far more dangerous type of system cracker out there. One who knows the ins and outs of the latest security auditing and cracking tools, who can modify them for specific attacks, and who can write his/her own programs. One who not only reads about the latest security holes, but also personally discovers bugs and vulnerabilities. A deadly creature that can both strike poisonously and hide its tracks without a whisper or hint of a trail.