Please enable JavaScript.
Coggle requires JavaScript to display documents.
COMPUTER CRIME, Use of hacking to promote a political cause
Use the…
-
-
- A variety of methods for catching hackers
- Penalties for young hackers
- Security
- Responsibility for Security
- various crimes in which a criminal or large group uses the identity of an unknowing, innocent person
-
- Activation for new credit cards
- Software detects unusual spending activities and will prompt retailers to ask for identifying information
- Authentication of e-mail and Web sites
- Use of encryption to securely store data, so it is useless if stolen
-
:warning: Repeated clicking on an ad to either increase a site’s revenue or to use up a competitor's advertising budget
:warning: Most common method is to buy a stock low, send out e-mails urging others to buy, and then sell when the price goes up, usually only for a short time
:warning: New technologies (scanners and high quality printers) are used to create fake checks, passports, visas, birth certificates, etc., with little skill and investment
Digital Signature Act 1997
Copyright (Amendment ) Act 1997
Telemedicine Act 1997
Computer Crimes Act 1997
Communications & Multimedia Act (CMA) 1998
Information Technology Act 2000
The Induce Act
To gain illegal or unauthorized access to a file, computer, or network