Beruflich Dokumente
Kultur Dokumente
Crime is a social and economic phenomenon and is as old as the human society. The
concept of crime is not a modern one but it has been existing from time immemorial.
In the era of 20th century and with the advent of computer, the criminals have
changed the mode of committing the crimes from conventional methods to
computer based methods.
Conventional crimes are those traditional, illegal behaviours that most people think
of as crime.
Cyber-crime is the latest and perhaps the most complicated problem in the cyber
world. “Cyber crime may be said to be those crime, where either the computer is an
object or subject of the conduct constituting crime. “Any criminal activity that uses a
computer either as an instrumentality, target or a means for perpetuating further
crimes comes within the ambit of cyber crime.”
A generalized definition of cyber crime may be ” unlawful acts wherein the computer
is either a tool or target or both.The computer may be used as a tool in the following
kinds of activity- financial crimes, sale of illegal articles, pornography, online
gambling, intellectual property crime, e-mail spoofing, forgery, cyber defamation,
cyber stalking. The computer may however be target for unlawful acts in the
following cases- unauthorized access to computer/ computer system/ computer
networks, theft of information contained in the electronic form, e-mail bombing, data
didling, salami attacks, logic bombs, Trojan attacks, internet time thefts, web jacking,
theft of computer system, physically damaging the computer system.
Email bombing-
This kind of activity refers to sending large numbers of mail to the victim, which may
be an individual or a company or even mail servers there by ultimately resulting into
crashing.
Data diddling-
This kind of an attack involves altering raw data just before a computer processes it
and then changing it back after the processing is completed.
Salami attacks-
This kind of crime is normally prevalent in the financial institutions or for the purpose
of committing financial crimes.
Logic bombs-
These are event dependent programs. This implies that these programs are created
to do something only when a certain event occurs
Trojan attacks-
In software field this means an unauthorized programme, which passively gains
control over another’s system by representing itself as an authorised programme.
The most common form of installing a Trojan is through e-mail.
Web jacking-
This term is derived from the term hi jacking. In these kinds of offences the hacker
gains access and control over the web site of another. He may even mutilate or
change the information on the site. This may be done for fulfilling political objectives
or for money.
There are various kinds of conventional crimes i.e. crimes against property, crimes against
person, crimes against society, crimes against government or state etc.
White collar crime or economic crime could take different forms, including bribery, cyber
crime, asset misappropriation, cheque and credit card fraud,identity theft, insurance fraud,
money laundering and counterfeiting. -.
The other main contributing offences are criminal breach of trust, cheating, forgery and
illegal money lending.
Apart from this, 'occupational crime' to illegal and unethical activities committed for
individual financial gain - or to avoid financial loss - in the context of a legitimate
occupation..The term 'occupational deviance' is better reserved for deviation from
occupational norms (e.g. drinking on the job; sexual harassment) and the term 'workplace
crime' is better reserved for conventional forms of crime committed in the workplace (e.g.
rape; assault).
Policy must primarily reflect what is necessary for good security. Do you
agree? How you will work out to prepare the security policy for making
the organization free from the cyber crimes.
Q2
and daily lives Algorithm can be defined as "A sequence of steps to be carried out for a
required output from a certain given input". A common example of an algorithm would
be instructions for assembling a model airplane. Given the starting set of a number of
marked pieces, one can follow the instructions given to result in a predictable end-state:
3. The output comes after the algorithm finished the whole process.
So basically, all algorithms perform logically while following the steps to get an output
Algorithm-based inventions may be patentable, but algorithms are not patentable in the
US, because an algorithm is an abstract idea that can be performed in your head. (This is
an old discussion that I'm not interested in having again.) One can obtain a patent on
technology that uses an algorithm, if the "invention" is a technological solution that is
not an abstract idea. Patent laws in most countries specifically block patentability of
“algorithms” but do allow software to be patented, with varying restrictions.
In patent law, an algorithm is an abstract set of steps. Software however is a real, concrete
product. Patent law permits the underlying concept of software to be patented - again, with
different restrictions by country.
Different countries have different rules for how to present and describe software in patent
applications so that it is patentable. Since patents are a per country right, your best bet is to
speak with a patent expert in the country where you want patent protection.