Essay on Cyber Crime and National Security

Only available on StudyMode
  • Download(s) : 1177
  • Published : December 13, 2012
Open Document
Text Preview
Essay on Cyber Crime And National Security

When we talk about national security, we talk about the security of over one billion people and sovereignty of a country that is culturally rich, politically stable, socially compact and economically emerging. The worst victim of terrorism and naxalism India and its national security has been threatened recently by cyber crime. They concept of cyber crime is not radically different from the concept of conventional crime. Cyber crime is the latest and perhaps the most complicated problem in the crime world of the country. In the context of national security, cyber crime may involve hacktivism (on-line activity intended to influence polity), traditional espionage or information warfare and related activities. Another way to define cyber crime is simply as criminal activity involving the information technology infrastructure, including illegal access, illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting etc.) misuse of device, forgery (ID theft) and electronic fraud. The rising level of cyber crime is an indication of an enormous threat to national security. Lawmakers and law enforcement agencies have to give immediate attention to the matter. Cyber crime is a rampant evil with its roots firmly planted on the growing dependence on computers in the contemporary scenario. In today's age when everything from small gadgets to nuclear plants is being operated through computers, cyber crime has assumed threatening ramifications Various kinds of cyber crimes are prevailing in the world today. Hacking, bombing, diddling, spoofing, botnet attacks, salami attacks and viruses are capable of breaching the security in the...
tracking img