Preview

Cyber Crime

Good Essays
Open Document
Open Document
8636 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Crime
Computer Crime and e-Evidence

What is the link between the development of technology and criminal offences?

Trends are developing to shift the nature of crimes from traditional to Hi-Tech and it is impossible to prevent people from misusing technology to commit crimes. Computer or networks may be used as a tool or a storage medium to commit crimes. In the meantime, we must keep in mind that all computers related systems are vulnerable to destruction and intrusion. As a result some authors classify computer crimes under three areas such as :

1.Computer related offences – the accused uses the computer/network as tool/s to commit offences.

2. Computer integrated offences – the accused commits offences through Computer/system/programme e.g. modification by virus, Trojan horse etc.

3. Contents related offences – the accused changes/destroys data e.g. offences relating to intellectual property.

Under these circumstances, application of new methodology to investigate and seizure of data stored in Computer hardware, software, communication devices, or any other forms, its forensic issues will play a vital role relating to Computer Crimes.

What is the legal position on Computer Crimes in Sri Lanka?

The Parliament of Sri Lanka has enacted the long awaited Computer Crime Act and that was gazetted on the 13th July 2007. However, there is no implementation of the Act up to date due to various shortcomings of the Administration of the country such as public unawareness of the existence of the Act, shortage of experts, trained Police officers to investigate offences under the Act, non-availability of computer forensic laboratories.

What are the major Offences under the Computer Crime Act?

Part I of the Act explains the offences relating to cyber crimes. These offences are common offences (subject to some variations) identified and recognised internationally.

What is Computer hacking ?

Section 3 of the Act deals with ‘unauthorised access’

You May Also Find These Documents Helpful

  • Good Essays

    Following the proper procedures within the means of the law and following a chain of command will help to ensure a conviction in cybercrimes. There are many different kinds of cybercrime, knowing the investigative process for the differences will assist in locating electronic evidence. The electronic evidence may include following Internet Protocol (IP) addresses, computer history logs, emails, files, and videos. While poor investigating will let the criminal avoid prosecution, conducting a proper cybercrime investigation can ensure a conviction.…

    • 664 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    Whichever the case, computer forensics can be used to investigate computer related crime or misconduct. “Computer forensics is the application of computer investigation and analysis techniques to gather evidence suitable for presentation in a court of law” (Rouse, 2007). This means that the information that is gathered must follow strict rules for forensic investigation. These rules may vary from state to state but are at least responsible for strict control over how the evidence is obtained, protected, and documented. “The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    References: Britz, M. T. (2013). Computer Forensic and Cyber Crime: An Introduction. Clemson University, SC: Pearson Education…

    • 667 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    References: Britz, Marjie T. (2003). Traditional Problems in Computer Investigations. Computer Forensics and Cyber Crime: An Introduction, 144. New Jersey: Pearson Education, Inc.…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Information Acts Paper

    • 418 Words
    • 2 Pages

    The United States Computer Fraud and Abuse Act of 1986 (referred to in this article as the "Act") was an amendment to the Counterfeit Access Device and Computer Fraud and Abuse Act of 1984 (the "1984 Act"). It was the first comprehensive legislation in the United States to identify and provide for the prosecution of crimes committed through and against computer systems (Zegarelli, 2002). The initial 1984 Act addressed crimes in a very limited circle involving the government computers, but also consumer credit and government data, but did not cover any areas outside the afore mentioned scopes.…

    • 418 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Personal Data Breach

    • 889 Words
    • 4 Pages

    Unauthorised modification of computer material. The most serious of the three offences, taking into account actions such as distributing virus or any malicious deletion of files, as well as altering an account to obtain fraudulent…

    • 889 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This type of crime is the illegal exploitation of computer technologies, usually involving the Internet, to support crimes such as fraud, identity theft, sharing of information, and embezzlement.…

    • 803 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cyber Crime is an unlawful act commited using a computer (and/or internet), where it can be either a tool or a target or both. It can also be defined as any unethical activity facilitated by or commited with computer and information technologies.…

    • 1906 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Detection of Cyber Crime

    • 1029 Words
    • 5 Pages

    The term 'cyber crime' has not been defined in any Statute or Act. A simple yet sturdy definition of cyber crime would be “unlawful acts wherein the computer is either a tool or a target or both”. These acts committed are punishable by the IT Act.…

    • 1029 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Catergories of Computers

    • 531 Words
    • 3 Pages

    There are so many computer crimes out there, but I am only going to explain four of them. These four computer crimes are the most common crimes that are talked about. My first crime is computer fraud. Computer fraud is when a victim is conned into believing that he will receive money or something else of value. A good example is when you get an email that starts off good to get you to open it and then it will say if you fill out this survey you will be in a drawing to win $5,000. Computer industrial espionage is my second and it is when a person is stealing of trade secrets or spying on somebody through technology mean. Like blackmail because, there are so many people getting blackmail every day. A computer virus transmitter is someone who creates a malicious virus to infect computers from functioning properly, run annoying programs, and gain access to the victim’s personal data. It is best known as ‘’malware’’ this can be download from like emails and pop-up windows. Software piracy is one of several forbidden actions that may be taken by the end user of a particular piece of software. A good example is when a user purchases a software application; it does not belong to them. You will always have an issued license to use the software on a single computer this protects your privacy.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cybercrime, which also indicated as ‘Computer Crime’, ‘High Tech Crime’ or ‘ICT Crime’ is a term used for a concept that is rather difficult to define (Pieter et al., 2011). According to Garlik (2008), at present, the exact definition of cybercrime is still unclear and there is still no formal scientific or legally agreed meaning. This phenomenon is likely to continue as cybercrime is still considered in its infancy and different types of cybercrimes are so likely to emerge as the advancement of technology grows day by day. The Australian bankers’…

    • 2971 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Crime

    • 3651 Words
    • 15 Pages

    All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of a computer or computer system.…

    • 3651 Words
    • 15 Pages
    Powerful Essays