Disclaimer:

Disclaimer:
(Disclaimer: Contents of this page have been provided for general information and should not be construed to be legal advice. This web site is not a complete or authoritative source of legal information. Information on this site therefore should not be considered legal advice or otherwise relied upon. If you have any specific questions please contact a lawyer or otherwise seek independent professional advice before acting on anything contained herein. We do not take any responsibility for reliance on errors or omissions in the content contained on our web site.

Thursday 16 May 2013

Security Related Crimes under Information and Technology Act 2000.


Security Related Crimes

With the growth of the internet, network security has become a major concern. Private confidential information has become available to the public. Confidential information can reside in two states on the network. It can reside on the physical stored media, such as hard drive or memory or it can reside in the transit across the physical network wire in the form of packets. These two information states provide opportunities for attacks from users on the internal network, as well as users on the Internet.
1 Network Packet Sniffers
2 IP Spoofing
3 Password attacks
4 Distribution of sensitive internal information to external sources:
5 Man-in-the-middle-attacks

1 comment:

  1. Hi everyone,
    If you had got any fraud, scam with credit/debit card, Contact us for cyber crime investigation.
    Best regards
    mukesh choudhary
    cyber security expert in india

    ReplyDelete