Cybercrime or computer-oriented crime, criminal activities carried out by means of computers or the Internet.Cybercriminals may use computer technology to access personal information, business trade secrets or use the internet for exploitative or malicious purposes.
Use of the Internet or other electronic means to stalk or harass an individual, group, or organization.
Morphing - act of using technology to modify photographs of a person without their consent and using them.
Cyber pornography - act of using cyberspace to create, display, distribute, import, or publish pornography or obscene materials.
Email spoofing is a fraudulent email activity hiding email origins. eg: Phishing
Trolling (cyber bullying) - anti-social act of causing personal conflict and controversy online.
Act of making false statements about another which damages his/her reputation. It is a statement that injures someone's reputation.
Section 66A: Sending offensive messages.
Section 66B : Dishonestly receiving taken computer resource.
Section 66D : Cheating by person on victimization compute resource.
Section 66E : Privacy violation.
Section 66F : Cyber terrorism.
Section 72 : Breaching one’s space and confidentiality.
Section 72 A : revealing data throughout lawful contract.
Section 441 IPC : criminal misdemeanour.
Section 354D : deals with stalking.
Open Source Software Cyber Security Tools
: Security at data and network level is greatly enhanced by these software tools which open the door to a more safe and secure cyber world.Security Information and Event Management
: A SIEM system provides real-time analysis of security alerts generated by applications and network hardware.AI primarily based Sandbox
: With AI and machine learning we can do inference and pattern-based monitoring and alerting, but the real opportunity is the predictive restoration.Sandbox
: used to detect malware offers an additional layer of protection against security threats, such as stealthy attacks and exploits that use zero-day vulnerabilities.
- The use of artificial intelligence and machine learning is being used to transform cyber security and aid security analysts identity threats more accurately.
LEARN MORE ABOUT THE ACTS AND TO REPORT CRIME
: CLICK HERE