Skip to main content

Cyber Crime



Cyber crime is the latest and perhaps the most complicated problem in the cyber world. Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime. It is rapidly evolving from simple e-mail mischief. The types of cyber crimes include pornography, cyber fraud, defamation, cyber stalking, harassment, IPR theft, data hostage, money laundering, phishing, e-mail bombing, cyber war, illegal EFT. Cyber crime is different and more heinous than conventional crime as in cyber crime; the crime is committed in an electronic medium. Cyber Crime in the Act is neither comprehensive nor exhaustive. Capacity of human mind is unfathomable. It is not possible to eliminate cyber crime from the cyber space. However, it is quite possible to check them. The home user segment is the largest recipient of cyber attacks as they are less likely to have established security measures in place. Users must try and save any electronic information trail on their computers, use of anti-virus software, firewalls, use of intrusion detection system etc. and further making the application of the laws more stringent to check crime.

Popular posts from this blog

Draw the basic organization of computer

Answer:                 The basic organization of computer__ Input Unit: ·          It accepts (or reads) instructions and data from outside. ·          It converts these instructions and data in computer acceptable form ·          It supplies the converted instructions and data to the computer system for further processing. Central Processing Unit (CPU): Control Unit: Control unit of a computer system manages and coordinates the operations of all other components of the computer system. Arithmetic Logic Unit(ALU): Arithmetic logic unit of a computer system is the place, where the actual executions of instruction, takes place during processing operation. Storage Unit: Primary Memory: It is volatile ( loses data on power dissipation). It is used to hold running program instruction, data, intermediate results, and results of ongoing processing of jobs. Secondary Memory: It i

Describe the four basic data types. How could we extend the range of values they represent?

Answer: The basic four data types are: Data Type Integer Type Character Type Floating Point Type Void Type signed int short int long int unsigned unsigned int unsigned short int unsigned long int char signed char unsigned char float double long double