Tuesday 20 December 2011

Reasons for Cyber Crime


Reasons for Cyber Crime: Hart in this work “The Concept of Law” has said “human beings are vulnerable so rule of law is required to protect them”. Applying this to the cyber crime we may say that computers are vulnerable so rule of law is required to protect and safeguard them against cyber crime. The reasons for vulnerability of computers may be said to be:

1.       Capacity to store data in comparatively small space: The computer has unique characteristics of storing data in the very small space. This affords to remove or derive information either through physical or virtual medium makes it much easier.


2.       Easy to Access: The problem encountered in guarding a computer system from unauthorized access is that there is every possibility of breach not due to human error but due to the complex technology. By secretly implanted logic bomb, key loggers that can steal access codes, advanced voice recorders, retina imagers etc. that can fool biometric system and bypass firewalls can be utilized to get past many a security system.
3.       Complex: The computers work on operating systems and these operating systems in turn are composed of millions of codes. Human mind is fallible and it is not possible that there might not be a lapse at any stage. The cyber criminals take advantages of these lacunas and penetrate into the computer system.
4.       Negligence: Negligence is very closely connected with human conduct. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber criminal to gain access and control over the computer system.
5.       Lose of evidence: Loss of evidence is a very common and obvious problem as all the data are routinely. Further collection of data outside the territorial extent also paralyses this system of crime investigation.
6.       Unauthorized access to computer systems or networks/Hacking: This kind of offence is normally referred as hacking in the generic sense. However the framers of the information technology act 2000 have no where used this term so to avoid any confusion we would not interchangeably use the word hacking for ‘unauthorized access’ as the letter has hide.

No comments:

Post a Comment