网络跟踪评估的预防和保护措施 [2]
论文作者:英语论文论文属性:作业 Assignment登出时间:2014-10-10编辑:zcm84984点击率:10314
论文字数:4116论文编号:org201409161253222957语种:英语 English地区:加拿大价格:免费论文
关键词:网络跟踪Law Essay侵犯隐私电子信息
摘要:本文是一篇关于网络跟踪的Law Essay,网络跟踪,是指一个人在网络上被跟随和追踪,他/她的线上隐私被入侵,并且他/她的一举一动都受到监视。随后当事人会受到骚扰,这会破坏他/她的生活并且/或经常害怕受到威胁。
Devices are continually being added to the Net as it grows in sophistication and complexity. Although the technologies will change and the devices will morph, or change into something else, the basic issues can be expected to remain essentially the same.
Cyber Crime: The dark side of a virtual world
Cyber Crimes: an Introduction
The offences which take place on or using the medium of the Internet are known as cyber crimes. These include a plethora of illegal activities. A precise and sturdy definition of cyber crime may be ‘unlawful acts wherein the computer is either a tool or a target, or both’. The sine qua non for cyber crime is that there should be an involvement, at any stage, of the virtual cyber medium i.e. the computer.
‘Cyber crime’ has nowhere been defined in any statute, Act, or law, passed by the Indian Parliament. The concept of cyber crime is not radically different from that of a conventional crime as both include conduct whether act or omissions, which causes breach of rules of law and entail punishment. In the Indian context, cyber crime may be defined as “acts that are punishable under the Information Technology Act or which would be liable to penal consequences under the Indian Penal Code”. The term; ‘cyber crime’ is normally used to show a range of criminal activities which specifically relate to computers and telecommunication infrastructure that supports their use. But it is preferred to use the term ‘cyber crime’ to encompass within it any proscribed conduct perpetrated through the use of, or against, digital technologies. [4]
Classification of Cyber Crimes:
Computer as the target:
There is a wide range of criminal activities in which, the target is the Computer or data residing in it. It could be the common theft of computer parts or it could amount to computer break-ins by foreign intelligence personnel for espionage. Unauthorized access to a computer can be physical as well as virtual. [5]
Physical crimes include theft, arson, etc. That has the characteristics of common crimes. However, the stakes could be much higher since a theft or destruction of a computer may lead to valuable data loss with much higher costs than the physical loss. An example is the theft of some Computer hard discs from DRDO laboratories in Delhi. Though the authorities claim it as an instance of common theft, the implications were much higher since these hard discs contained data relating to certain codes used in the communication systems of Indian armed forces, thereby compromising their secrecy.
In the cyber world, however, it is the other type of crimes that are more serious because of their consequences. Here the target is not the Hardware and contact not physical, but it is the wrongful taking of information or the causing of damage to information contained in the computer. This unauthorized access to the computers, in order to carry out data theft or data damage, mainly involves what is normally known as hacking. The hacker or unauthorized user may gain entry by passing the security system like passwords and carryout some activities which may include mere “passing through”, making slight changes to the web pages, complete destruction of the site or stealing of passwords and other personal data, or re-routing or denial of service to the owner. The costs involved are much more and affects the confid
本论文由英语论文网提供整理,提供论文代写,英语论文代写,代写论文,代写英语论文,代写留学生论文,代写英文论文,留学生论文代写相关核心关键词搜索。