Cyber crime is the
latest and perhaps the most complicated problem in the cyber world. Any
criminal activity that uses a computer either as an instrumentality, target or
a means for perpetuating further crimes comes within the ambit of cyber crime.
It is rapidly evolving from simple e-mail mischief. The types of cyber crimes
include pornography, cyber fraud, defamation, cyber stalking, harassment, IPR
theft, data hostage, money laundering, phishing, e-mail bombing, cyber war,
illegal EFT. Cyber crime is different and more heinous than conventional crime
as in cyber crime; the crime is committed in an electronic medium. Cyber Crime
in the Act is neither comprehensive nor exhaustive. Capacity of human mind is
unfathomable. It is not possible to eliminate cyber crime from the cyber space.
However, it is quite possible to check them. The home user segment is the
largest recipient of cyber attacks as they are less likely to have established
security measures in place. Users must try and save any electronic information
trail on their computers, use of anti-virus software, firewalls, use of
intrusion detection system etc. and further making the application of the laws
more stringent to check crime.
Answer: The basic organization of computer__ Input Unit: · It accepts (or reads) instructions and data from outside. · It converts these instructions and data in computer acceptable form · It supplies the converted instructions and data to the computer system for further processing. Central Processing Unit (CPU): Control Unit: Control unit of a computer system manages and coordinates the operations of all other components of the computer system. Arithmetic Logic Unit(ALU): Arithmetic logic unit of a computer system is the place, where the actual executions of instruction, takes place during processing operation. Storage Unit: Primary Memory: It is volatile ( loses data on power ...