Abstract
The term "cyber crime" refers to crimes that involve the use of a communication channel or device as a medium,
whether it be a laptop, desktop, PDA, mobile phone, watch, or a vehicle, directly or indirectly. Government and
corporate leaders should be concerned about cyber-attacks, according to the "Global Risks for 2012" study.
The impact of cybercrime on victims can last for years since it is difficult to identify and impossible to stop once
it has occurred. This is a word we hear a lot in the media because of the growing popularity of online banking
and shopping, both of which need sensitive personal and financial data. Now that we know what this crime is
and how it operates against us, we can better defend ourselves. This paper presents a brief overview of all about
cyber criminals and crime with its Evolution, Causes, Types, CYBER law, importance of cyber law, cyber law
required, components of cyber law, prevent cyber crime, and find conclusion
Reference
- Authored by Laxmi Narayan Opposite NKT college, Ganpat JairamKharkar Marg, Shivanjali CHS,Kharkar Alley,Thane, Maharashtra
- Authored by Dr. Mrs. Pratibha Cyber laws and Information Technology Dr. Mrs
- Cyber Crimes And The Cyber Laws in India.Cyber Stalking & the Impact of its
- An overview of cyber laws Vs cybercrimes: in Indian
- cyber law and cyber security in developing and emerging economies Zeninab karake- Shalhoub, Lubna Al Qasimi.
- March 2012K. Elissa, “Title of paper if known,” unpublished.
- Birk, D.; Gajek, S.; Grobert, F.; Sadeghi, A.-R.; , 'Phishing Phishers - Observing and Tracing Organized Cybercrime,' Internet Monitoring and Protection, 2007. ICIMP 2007. Second International Conference on , vol., no., pp.3, 1-5 July 2007
- International Conference on , vol., no., pp.3, 1-5 July 2007 8. McCombie, S.; Pieprzyk, J., 'Winning the Phishing War: A Strategy for Australia,' Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second , vol., no., pp.79,86, 19-20 July 2010.
- Neufeld, D.J.; , 'Understanding Cybercrime,' System Sciences (HICSS), 2010 43rd Hawaii International Conference on , vol., no., pp.1-10, 5-8 Jan.2010
- Mesko, G.; Bernik, I.; , 'Cybercrime: Awareness and Fear: Slovenian Perspectives,' Intelligence and Security Informatics Conference (EISIC), 2011 European , vol., no., pp.28-33, 12-14 Sept. 2011
- Cybercrime at a glance,' Spectrum, IEEE , vol.43, no.4, pp.17,, April 2006
- Yasinsac, A.; Erbacher, R.F.; Marks, D.G.; Pollitt, M.M.; Sommer, P.M., 'Computer forensics education,' Security & Privacy, IEEE , vol.1, no.4, pp.15,23, July-Aug. 2003 doi: 10.1109/MSECP.2003.1219052
- S.C Bhatt, D. Pant, 'Cyber Crime in India,' IJARCS, vol. 2 No.5 pp. 153-156, Sept-Oct 2011
- M. Sharma, Pragati. G, “Challenges and Countermeasures for Web Applications” , IJARCS, vol. 2 No.3 pp. 381-384, May-June 2011
Yashika Nagpal
Amity Law School, Delhi (Affiliated to Guru Gobind Singh Indraprastha University)
Received: 14-08-2020, Accepted: 24-09-2020, Published Online: 06-10-2020