Downloads: 46 | Views: 267 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Law | India | Volume 10 Issue 2, February 2021 | Popularity: 6.9 / 10
Cyber Crime and Cyber Terrorism in India
Sarita Singh
Abstract: From cars to kitchen appliances, computers and the Internet continue to pervade human life in everything. With the discovery of machines, the Internet has amplified human enslavement. Although we have achieved many benefits in terms of effectiveness and management, many detrimental consequences and drawbacks have also been brought to the forefront. Cyberspace may now be used by individuals or organizations to serve foreign governments, or to terrorize a nation's people. By hooking a person Cracking on a government or military-maintained website, the crime of cracks will accelerate into terrorism. Cyber-terrorism could be a hospital hack. As a retaliatory act, dose. Informatics is a double-edged sword that can be used both for negative and positive work. Therefore, the fate of many businesses depends on the benevolent or vice intentions of the individual working with and through the technology, as the case may be. A malevolent intention communicated in the form of hacking, data theft, virus attack, etc. , for example, can only bring negative effects. However, these methods can also be used to search for the authenticity, protection and security of one's technical device, which has been mainly relied on and effective to provide a specific organization with security. The whole thing seems to be intolerable, for example, the train ticketing system, if we currently think of society without the machine. Airline Ticketing and Traffic Control as well. Bill for electricity. The Telephone Bill Office functions etc. Without the machine, it seems to be intolerable. The most important means of communication, information, trade and entertainment has become computers with the aid of the Internet today. The internet is like life being expanded and carrying on in the real world in another medium that cuts space, time, nationality, citizenship, across borders, Competence, gender, sexual orientation, and age. Likewise, each coin has two sides, the internet with all the advantages of obscurity, transparency, and convenience has become an ideal place for criminals involved in making the net for illicit lucrative purposes, either monetary or otherwise.
Keywords: The Information Technology IT Act, 2000, Joint Academic Network, JANET, National Science Foundation Network, NSENET
Edition: Volume 10 Issue 2, February 2021
Pages: 1430 - 1436
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 919 | Views: 1303 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Law, Indonesia, Volume 9 Issue 1, January 2020
Pages: 1 - 6Legal Protection of Medical Records as Evidence Tool in Law Enforcement Process
Bahrain Damanik, Erni Agustina
Downloads: 597 | Views: 891 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Law, Indonesia, Volume 9 Issue 1, January 2020
Pages: 7 - 12Juridical Analysis of Telemedic Legality in Medical Services Using Technology
Ahmad Ghozali, Erni Agustina
Downloads: 471 | Views: 815 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Law, Indonesia, Volume 9 Issue 1, January 2020
Pages: 13 - 19Juridicic Aspect of Improving Hospital Health Services and Dispute Resolution between Hospitals and Patients
Enrico Adhitya Rinaldi, Laksanto Utomo
Downloads: 365 | Views: 667 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Law, India, Volume 9 Issue 6, June 2020
Pages: 14 - 16Cyber Crime during COVID-19
Adv Purva Saini
Downloads: 352 | Views: 636 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Law, India, Volume 8 Issue 9, September 2019
Pages: 1288 - 1290Abrogation of Article 370
Kashika Mahajan