Free help with homework

Why join Brainly?

  • ask questions about your assignment
  • get answers with explanations
  • find similar questions



This Is a Certified Answer

Certified answers contain reliable, trustworthy information vouched for by a hand-picked team of experts. Brainly has millions of high quality answers, all of them carefully moderated by our most trusted community members, but certified answers are the finest of the finest.
Cyber-crime or cyber terrorism has emerged as a new way of spreading terror and harming people as individuals or communities as a whole. With development of computers and technology, they have been employed by a section of people to commit offences. Cyber-crime at a lower level can be used to harm an individual person causing him physical or mental harm directly or indirectly. At a larger level, Communities or nations as a whole can be terrorized causing them financial, social, cultural, political losses and putting their integrity and security at stake.

Cyber-crime can be seen  in various forms like copyright infringement, juvenile crime, dealings of drug trafficking, human or child trafficking, identity theft, frauds, cyber stalking, information warfare or even cyber-warfare. Cyber terrorism in general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources. Cyber warfare is basically referred to activity crossing international borders and involving the interest of at least one nation. Spams or unsolicited sending of bulk emails for commercial purposes is also considered unlawful in some jurisdictions. Many spam mails even cause frauds and tempt people with job or academic opportunities for huge amounts of money. Altering, tampering or destroying data stored in computers for national security or political reasons is another form of computer crime.  Drug traffickers and dealers often take help of the internet to sell drugs illegally.  Computer viruses are malicious softwares which are put into computer systems to corrupt the system files, extract data illegally or malfunction the systems. Many hackers and criminals use such softwares to freeze national or community computers. Other forms of fraud may be facilitated using computers like bank fraud, identity theft, extortion and theft of classified information.

There have been many cases where cyber-crime has affected world powers and has put their national security, political stand and financial strength in danger. Many big universities have also been detected as source of malicious codes to computers all over the world. Some sites have pop-ups and links that might be containing threat. Obscene media is often circulated over the internet. Many organization heads, famous leaders, celebrities and high officials have been victims of personal identity theft.

Computer crime needs to be combatted. We can take precautions to avoid being victimized by taking care not to rely on any information over the net easily. Spam mails should be removed. Anti-viruses and software securities should be installed in computers. Public computers should not be allowed to be used by anyone without checking their identity. National computer systems should have a backup of all their data and the information in their computer systems should be secured well. Such steps can minimize chances of cyber-crime.

0 0 0
Short Essay on Cyber Crime – Cyber crime is the latest and perhaps the most complicated problem in the cyber world. The term “Cyber Crime” has nowhere been defined in any statute or Act passed or enacted by the Indian Parliament.

Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime.

It is rapidly evolving from simple e-mail mischief where offenders send obscene e-mail, to more serious offences like theft of information, e-mail bombing to crashing servers etc.

The types of cyber crimes include pornography, cyber fraud, defamation, cyber stalking, harassment, IPR theft, data hostage, money laundering, phishing, e-mail bombing, cyber war, illegal EFT.
0 0 0
The Brain
  • The Brain
  • Helper
Not sure about the answer?
Learn more with Brainly!
Having trouble with your homework?
Get free help!
  • 80% of questions are answered in under 10 minutes
  • Answers come with explanations, so that you can learn
  • Answer quality is ensured by our experts