Skip to content

KrishnaRanjani/Defence-on-Cyber-Crimes

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Defence-on-Cyber-Crimes

Defence on Cyber Crimes Against Women and Laws in India



Cybercrime or computer-oriented crime, criminal activities carried out by means of computers or the Internet.Cybercriminals may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes. 

Major Cyber Crime Areas:

1. Cyber stalking

Use of the Internet or other electronic means to stalk or harass an individual, group, or organization.

2. Morphing

Morphing - act of using technology to modify photographs of a person without their consent and using them.

3. Cyber Pornography

Cyber pornography - act of using cyberspace to create, display, distribute, import, or publish pornography or obscene materials.

4. E-mail spoofing

Email spoofing is a fraudulent email activity hiding email origins. eg: Phishing

5. Trolling

Trolling (cyber bullying) - anti-social act of causing personal conflict and controversy online.

6. Defamation

Act of making false statements about another which damages his/her reputation. It is a statement that injures someone's reputation.


Cyber Law under the Information and Technology Act, 2000

⚖️ The stalkers and cybercriminals can be booked under several sections for breaching of privacy.

  • Section 66A: Sending offensive messages.
  • Section 66B : Dishonestly receiving taken computer resource.
  • Section 66D : Cheating by person on victimization compute resource.
  • Section 66E : Privacy violation.
  • Section 66F : Cyber terrorism.
  • Section 72 : Breaching one’s space and confidentiality.
  • Section 72 A : revealing data throughout lawful contract.
  • Section 441 IPC : criminal misdemeanour.
  • Section 354D : deals with stalking.

Cybercrime Tools

Analysis Tools

  • Open Source Software Cyber Security Tools : Security at data and network level is greatly enhanced by these software tools which open the door to a more safe and secure cyber world.
  • Security Information and Event Management : A SIEM system provides real-time analysis of security alerts generated by applications and network hardware.
  • AI primarily based Sandbox: With AI and machine learning we can do inference and pattern-based monitoring and alerting, but the real opportunity is the predictive restoration.
  • Sandbox : used to detect malware offers an additional layer of protection against security threats, such as stealthy attacks and exploits that use zero-day vulnerabilities.

AI and Machine Learning can boost Cyber Defences

  • The use of artificial intelligence and machine learning is being used to transform cyber security and aid security analysts identity threats more accurately.

LEARN MORE ABOUT THE ACTS AND TO REPORT CRIME : CLICK HERE