0% found this document useful (0 votes)
677 views1 page

Short Essay On Cyber Crime

The document discusses cyber crimes such as pornography, fraud, stalking, and theft. It notes that cyber crimes are different than conventional crimes because they occur electronically rather than physically. The Indian government passed the Information Technology Act in 2000 to address cyber crimes, but the Act has proven inadequate with certain loopholes. Specifically, it does not sufficiently address issues like cyber stalking, spam, and defamation. While cyber crimes cannot be entirely eliminated, awareness of individual rights and security measures can help reduce vulnerabilities and check criminal activity.

Uploaded by

Asis Mahalik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
677 views1 page

Short Essay On Cyber Crime

The document discusses cyber crimes such as pornography, fraud, stalking, and theft. It notes that cyber crimes are different than conventional crimes because they occur electronically rather than physically. The Indian government passed the Information Technology Act in 2000 to address cyber crimes, but the Act has proven inadequate with certain loopholes. Specifically, it does not sufficiently address issues like cyber stalking, spam, and defamation. While cyber crimes cannot be entirely eliminated, awareness of individual rights and security measures can help reduce vulnerabilities and check criminal activity.

Uploaded by

Asis Mahalik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

11/4/2019 Short Essay on Cyber Crime

The types of cyber crimes include pornography, cyber fraud, defamation, cyber stalking,
harassment, IPR theft, data hostage, money laundering, phishing, e-mail bombing, cyber war,
illegal EFT.

Cyber crime is different and more heinous than conventional crime as in cyber crime; the crime is
committed in an electronic medium and here means read is not a requirement but is rather a
general rule under the penal provisions of the Information Technology Act. The Indian Parliament
considered it necessary to give effect to the resolution by which U.N.

General Assembly adopted Model Law on Electronic Commerce adopted by the United Nations
Commission on Trade Law. As a consequence of which the Information Technology Act, 2000 was
passed. This Act was a welcome step at a time when there was no legislation on this field. The Act
has however during its application proved to be inadequate and there are certain loopholes in the
Act.

ADVERTISEMENTS:

Cyber Crime in the Act is neither comprehensive nor exhaustive. The Information Technology Act
has not dealt with cyber nuisance, cyber stalking, and cyber defamation and so on. Cases of spam,
hacking, stalking and e-mail fraud are rampant although cyber crimes cells have been set-up in
major cities. The problem is that most cases remain unreported due to lack of awareness.

Capacity of human mind is unfathomable. It is not possible to eliminate cyber crime from the cyber
space. However, it is quite possible to check them.

The home user segment is the largest recipient of cyber attacks as they are less likely to have
established security measures in place and therefore it is necessary that people should be made
aware of their rights and duties.

Users must try and save any electronic information trail on their computers, use of anti-virus
software, firewalls, use of intrusion detection system etc. and further making the application of the
laws more stringent to check crime.

www.shareyouressays.com/essays/short-essay-on-cyber-crime/85884 1/1

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy