Tag - privileged access

Types of Cyber Crimes

Cyber crimes cover a wide range of illegal activities, which are either done solely using computer resources (as defined under Section 2 of ITAA, 2008) or, done in conjunction with traditional means using the computer resources and communication devices as tools to commit conventional crimes. The Information Technology (Amendment) Act,...

Read more...

Tools and Techniques used to Commit Cyber Crimes

Cyber Crimes make use of various tools and techniques and many of these tools are used for the commission of the cyber crimes and are installed on the victim’s systems through - exploitation of the vulnerabilities in the systems / networks or by surreptitiously gaining access to the victim’s systems...

Read more...