Cyber crimes against Government:
The growth of
Internet has shown that the medium of cyberspace is being used by individuals
and groups to threaten the governments as also to terrorize the citizens of a
country. This crime manifests itself into terrorism when an individual hacks
into a government or military maintained website. There are certain offences
done by a group of persons intending to threaten the international governments
by using internet facilities.
They include:
Cyber Terrorism: Cyber terrorism is a major burning issue in the
domestic as well as global arenas. The common form of these terrorist attacks
on the internet is by distributed denial of service attacks, hate websites and
hate e-mails, attacks on sensitive computer networks etc. Cyber terrorism
activities endanger the sovereignty and integrity of the nation.
Cyber warfare: Cyber warfare is politically motivated hacking
of conducting sabotage and espionage. It is a form of information warfare and
sometimes it is analogous to conventional warfare.
Distribution of pirated software: It
involves the distribution of pirated software from one computer to another
intending to destroy the data and official records of the government.
Possession of Unauthorized Information: Terrorists easily
access in the information with the help of internet and possess information of
political, religious, social, and ideological objectives.
They include:
Cyber Terrorism: Cyber terrorism is a major burning issue in the
domestic as well as global arenas. The common form of these terrorist attacks
on the internet is by distributed denial of service attacks, hate websites and
hate e-mails, attacks on sensitive computer networks etc. Cyber terrorism
activities endanger the sovereignty and integrity of the nation.
Cyber warfare: Cyber warfare is politically motivated hacking
of conducting sabotage and espionage. It is a form of information warfare and
sometimes it is analogous to conventional warfare.
Distribution of pirated software: It
involves the distribution of pirated software from one computer to another
intending to destroy the data and official records of the government.
Possession of Unauthorized Information: Terrorists easily
access in the information with the help of internet and possess information of
political, religious, social, and ideological objectives.