Definitions

Android’s Sandbox

Android's foundation of Linux brings with it a well-understood heritage of Unix-like process isolation and the principle of least privilege. Specifically, the concept that processes running as separate users cannot interfere with each other, such as sending signals or accessing one another’s memory space. Ergo, much of Android’s sandbox is...

Read more...

Computer Ethics

Definition Computer Ethics is a part of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. Computer ethics deals with the procedures, values and practices that govern the process of consuming computing technology and its related disciplines without damaging or violating the moral values and...

Read more...

Crimes in which computer systems are used as tools/instruments

a.Financial fraud (Several sections under IPC, ITAA 2008 and other applicable laws) Financial frauds include business frauds, investment frauds, mass marketing frauds, offering jobs overseas, Nigerian Frauds, business opportunity frauds, etc., where unsuspecting people are lured in trap by the promise of such opportunities and deceived of their money and other valuables. b.Data...

Read more...

Crimes targeting computer systems

a. Hacking (Under Section 66 ITAA 2008) Hacking is a broader term and can be defined as gaining entry into a computer system without the permission, with an intention to cause loss, steal, or destroy the data contained in it. It is often done by people who are well versed with...

Read more...

Types of Cyber Crimes

Cyber crimes cover a wide range of illegal activities, which are either done solely using computer resources (as defined under Section 2 of ITAA, 2008) or, done in conjunction with traditional means using the computer resources and communication devices as tools to commit conventional crimes. The Information Technology (Amendment) Act,...

Read more...

Tools and Techniques used to Commit Cyber Crimes

Cyber Crimes make use of various tools and techniques and many of these tools are used for the commission of the cyber crimes and are installed on the victim’s systems through - exploitation of the vulnerabilities in the systems / networks or by surreptitiously gaining access to the victim’s systems...

Read more...

Cyber Crimes

There are various definitions of Cyber Crimes and couple of them are discussed below: Any violations of criminal law that involve knowledge of computer technology for their perpetration, investigation, or prosecution. — U.S. Department of Justice (DOJ) The communication addresses computer crime in its broadest sense as any crime involving the use...

Read more...

Overview of Cyber Crimes

Information Technology and the Internet have led to innovation and economic growth, but have also created new avenues for malicious actors to perpetrate crimes. The perpetrators range from sophisticated hackers to common criminals to foreign intelligence agencies and international terrorists. Cyber threats are increasing for governments, commercial enterprises and industry...

Read more...