top of page

India's Cybercrimes: A Systematic Evaluation




Yogiraj Sadaphal, B.A. LL.B., Bharati Vidyapeeth New Law College, Pune

INTRODUCTION

As a result of technological advancements, today man is completely dependent on the internet for all of his requirements. The internet has a power to allowed man to have everything while seated in one location, such as social networking, online purchasing, online education, and online employment, among other things.

Cybercrime, which includes everything from electronic theft to denial-of-service attacks, is a broad term used to describe criminal activities in which computers or computer networks are a tool, a target, or a location. Cybercrime is distinct from other types of crime that take place in society. The reason is because it has no geographical limits and that no one knows who the cybercriminals are.

HOW CYBERCRIMES OPERATES:

Anywhere there is digital data, opportunity, or motive, cybercrime may begin. Cybercriminals exist in a wide variety of forms, from a single user who engages in cyberbullying to state- sponsored assault. Cybercrime is, in many ways, a scattered phenomenon; it does not occur on its own. Cybercriminals use a number of attack pathways to execute their cyberattacks, and they are constantly searching for new strategies to accomplish their goals without being discovered or caught. Cybercriminals usually employ malware and other sorts of software, but ethical hacking is generally a crucial step in the performance of the majority of cybercrimes.

Comentarios


Indian Journal of Law and Legal Research

Abbreviation: IJLLR

ISSN: 2582-8878

Website: www.ijllr.com

Accessibility: Open Access

License: Creative Commons 4.0

Submit Manuscript: Click here

Open Access Logo

Licensing:

​All research articles published in The Indian Journal of Law and Legal Research are fully open access. i.e. immediately freely available to read, download and share. Articles are published under the terms of a Creative Commons license which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

Disclaimer:

The opinions expressed in this publication are those of the authors. They do not purport to reflect the opinions or views of the IJLLR or its members. The designations employed in this publication and the presentation of material therein do not imply the expression of any opinion whatsoever on the part of the IJLLR.

bottom of page