Important Information About Cyber Crime

Cyber crime is a crime that involves computers and networks. Finding any computer at a criminal place or committing any crime with the computer is called computer crime. Network is not involved in computer crime. Obtaining and misusing someone’s personal information. Taking away or stealing anyone’s personal information from the computer is also a cyber crime.

Computer crimes are also committed in many ways such as stealing information, erasing information, altering information, giving someone’s information to someone else or stealing or destroying computer parts. There are many types of cyber crimes such as spam email, hacking, phishing, inserting viruses, getting someone’s information online or keeping an eye on someone all the time.

Types Of Computer Crimes

  • Stealing information – Extracting personal information from anyone’s computer, such as a username or password.
  • Deleting information – Deleting information from someone’s computer so that it gets damaged or deleting any important information.
  • To change – To delete or add something to the information. To change that information.
  • External harm: Destroying parts, breaking them or stealing parts also comes under computer crime.

Types Of Cyber Crime

  • Spam Email – There are many types of emails which also contain emails which only harm the computer. All computers get damaged due to those emails.
  • Hacking – Hacking anyone’s personal information such as username or password and then changing it.
  • Cyberfishing – Sending spam email to someone so that he gives his personal information and that information can cause harm to him. These emails are shaped.
  • Spreading viruses – Cyber criminals send some software to your computer in which viruses can be hidden, these include viruses, worms, tarjon horses, logic horses etc., these can cause great harm to your computer.
  • Software Piracy – Copying software and selling it at cheap prices also comes under cyber crime, due to which software companies have to suffer huge losses and at the same time your valuable equipment also does not work properly.
  • Fake Bank Call – You may receive fake emails, messages or phone calls that resemble your bank asking you if your ATM number and password are required and if you do not provide this information, you will be debarred from your account or Please inform on this link. Remember, such information is never sought by any bank in this way and do not disclose any such information through internet or phone call or message.
  • Spreading rumors on social networking sites – Many people work to spread social, ideological, religious and political rumors on social networking sites, but users are not able to understand their intentions and keep sharing such links knowingly or unknowingly, but This also comes under the category of cyber crime and cyber-terrorism.
  • Cyber Bullying – Making indecent comments on social networking like Facebook, threatening on the internet, making fun of someone to the point of getting fed up, embarrassing others on the internet, this is called cyber bullying. Narcissistic children become victims of this. This also affects their health

Analysis

Whenever a crime is committed, no matter how smart the criminal is, someone still leaves some evidence. You will find some spelling mistake in the spam email coming to the computer. Such a mistake will never be found in the original email.

Jurisdictional Provisions In Cyberspace Under The Information Technology Law, 2000

From the point of view of the development of human society, the discovery of information and communication technologies can be considered the most important invention of the twentieth century. The importance of its use in various areas of social development, especially in the judicial process, cannot be underestimated, because due to its qualities like fast pace, getting rid of many minor problems, lack of human mistakes, low expenditure, it is important for the judicial process. Can play an important role in making it reliable. Not only this, it can prove to be the best option in the execution of cases where physical presence of all concerned parties is not mandatory. The list of allegations mentioned under the Information Technology Act is as follows:

  • Attempts to tamper with computer resources – Section 65
  • Attempt to hack the data stored in the computer by tampering with it – Section 66
  • Provision of penalties for sending restricted notifications through dialogue services-Section 66 A
  • Provision of penalty for wrongfully obtaining information stolen from computer or any other electronic gadget – Section 66 B
  • Provision of punishment for stealing someone’s identity – Section 66 C
  • Provision of penalty for accessing one’s personal data with the help of computer by concealing one’s identity – Section 66 D
  • Provision of punishment for violating one’s privacy – Section 66 E
  • Provision of penalties for cyber terrorism-Section 66 F
  • Provisions relating to publication of objectionable information – Section 67
  • Provision of penalties for publishing or disseminating sex or pornographic information by electronic means-Section 67 A
  • Publication or transmission by electronic means of objectionable material showing children in an obscene state – Section 67 B
  • Provision of penalties for interrupting or preventing information by intermediaries-Section 67 C
  • Provisions relating to making trespass access to a secure computer-Section 70
  • Misrepresentation of data or figures – Section 71
  • Provisions relating to breach of mutual trust and privacy-Section 72 A
  • Provisions related to making information public in violation of contract terms – Section 72 A
  • Publication of fake digital signatures-Section 73
  • In Section 78 of the Information Technology Statute, an Inspector level police officer has the right to investigate in these cases.

Provisions Related To Cyber Crimes In The Indian Penal Code (IPC)

  • Sending threatening messages via email – Section 503 of the IPC
  • Sending messages through email that lead to defamation – Section 499 of the IPC
  • Use of fake electronic records – Section 463 of IPC
  • Section 420 of Fake Website S or Cyber Fraud-IPC
  • Stealthy tracking of someone’s email – Section 463 of the IPC
  • Section 383 of the Web Jacking-IPC
  • Misuse of email – Section 500 of the IPC
  • Selling medicines online – NDPS Act
  • Online purchase-sale-arms act of weapons

66-F: Penalties for cyberterrorism

Section 66-F has been given place in the Information Technology Law, 2000 for penal legislation in cyber terrorism cases.

(1) If any-

(A) To violate the unity, integrity, security or sovereignty of India or to terrorize its inhabitants –

  1. (a)Prevents or causes any authorized person to stop using the computer.
  2. (b) Attempts to use any computer forcibly without any authority or in violation of his authority.
  3. (c) inserts or tries to insert into the computer something such as a virus, which is likely to endanger the lives of people or endanger the loss of property or deliberately seek to disturb services essential to life or is likely to adversely affect sensitive information under section 70 or-

(B) Knowingly succeeds in obtaining from any computer, by trespassing or encroaching on rights, information which is sensitive from the point of view of the security of the country or its relations with other countries or any confidential information with the intention of;, thereby, India’s security, unity, integrity and sovereignty, its relations with other countries, If there is a negative impact on public life or morality or there is a possibility of it happening, there is contempt or defamation of the courts of the country or there is a possibility of it happening, any crime is encouraged or suspected to be committed, any foreign nation or group of persons or If anyone else benefits from such information, he can be considered an accused of cyber terrorism.

(2) If any person spreads cyber terrorism or is involved in any conspiracy to do so, he can be sentenced to life imprisonment.

The term cyberspace is also defined along these lines in the third edition of Advanced Law Lexicon, published in 2005. In this, a lot of emphasis has been laid on the word floating in electronic mediums, because it can be accessed from any part of the world. The author has further defined the term cyber theft in the context of the use of online computer services. In this dictionary, cyber law has been explained in this way, the area of law which is related to computer and internet and its scope includes intellectual property rights, freedom of expression and unhindered access to information etc.

Some other things have been defined in the Information Technology Law, which are as follows, computer means any electronic, magnetic, optical or any device that exchanges data at high speed, which can be used in various technologies. Is capable of performing mathematical, logical or collectible work with the help of. It includes every program and software connected to or related to a computer system.

According to Section 1 (2) of the Information Technology Statute, 2000, the provisions of this Statute are effective throughout the country with the exceptions mentioned. Also, under the above mentioned provisions, the above provisions will be effective in case of any crime committed outside the country’s borders.

Read Also:

  1. India Cyber Security Challenges: Threats And Solution Strategies
  2. Cyber Crime In India: Types, Vulnerability And Solutions In India
  3. Role Of Police In Integrity And Awareness
  4. What Is Cyber Crime
  5. Detailed Scenario of The Emergence And History Of Cyber Crimes
  6. Financial Fraud How To Reduce Customer Complaints
  7. Financial Fraud In India: Criticality, Prevention, And Technical Solutions
  8. Caution Is Security In The Context Of Cyber Crimes
  9. Cybercrime: An Introduction
  10. Cyber Crime (History, Examples, Types And Laws)
  11. Cyber Crime And The Role Of Social Media
  12. How To Avoid Financial Fraud, Online Fraud, Credit Card Fraud, What To Do If You Become A Victim
  13. How To Protect Yourself From Financial Fraud
  14. Chit Fund Scam: Will Mamata Banerjee Image Be Corrected
  15. Major Scams You Should Know About
  16. What To Do If A Credit Card Is Stolen Or Lost
  17. Smart Use Of Credit Cards: 6 Mistakes To Avoid
  18. Now AI Has Become The New Weapon Of Cyber Attackers, Be Alert If You Get A Call From Someone Close To You For Money, Haste Can Prove Costly
  19. FBI Issued Tips To Avoid AI Scam, Cyber Fraudsters Commit Such Frauds, Know How To Avoid Them
  20. Phone Scams
  21. Email Scams
  22. Text Or SMS Scams
  23. Easy Steps To Detect And Stay Safe From Scams
204660cookie-checkImportant Information About Cyber Crime
Sunil Saini

Recent Posts

Cyber Crime In India

The number of internet users in India is more than 560 million, which is the…

56 years ago

India’s Cyber Security Challenges: Threats And Solution Strategies

As the world is moving forward in the field of digitalization, the threat of cyber…

56 years ago

Cyber Crime Or Computer Oriented Crime

Digital world creates conditions where nothing remains confidential or secret.’ Has the present world really…

56 years ago

Cyber Crime In India: Types, Vulnerability And Solutions In India

‘Cybercrime in India’ is the term used to describe criminal activities involving a computer or…

56 years ago

Role Of Police In Integrity And Awareness

Police is an organization of the government, which has to work promptly to maintain law…

56 years ago

Know The Negative Consequences Of Technology

Today is the era of technology, technology has surrounded us everywhere. If the technology around…

56 years ago