Skip to content Skip to sidebar Skip to footer

[Download] ~ Cyber Crime in South Africa - Hacking, Cracking, And Other Unlawful Online Activities # by Law and Technology Journal of Information ~ eBook PDF Kindle ePub Free

Cyber Crime in South Africa - Hacking, Cracking, And Other Unlawful Online Activities

📘 Read Now     📥 Download


eBook details

  • Title: Cyber Crime in South Africa - Hacking, Cracking, And Other Unlawful Online Activities
  • Author : Law and Technology Journal of Information
  • Release Date : January 01, 2009
  • Genre: Computers,Books,Computers & Internet,Professional & Technical,Law,
  • Pages : * pages
  • Size : 89 KB

Description

1. Introduction Computer crime or commonly referred to as Cyber Crime or ICT Crime (van der Merwe, 2008, p.61) is a new type of criminal activity which started showing its ugly head in the early 90's as the Internet became a common place for online users worldwide. This is due to the fact that computer criminals now have the opportunity to gain access to sensitive information if they possess the necessary know-how. This generally causes huge problems in the economic sphere and results in companies and individuals having to take costly steps to ensure their safety and reduction in commission of cyber-crime (Gordon, 2000, p.423). Cyber crime or also known as computer crime can be defined as any criminal activity that involves a computer and can be divided into two categories .One, it deals with crimes that can only be committed which were previously not possible before the advent of the computer such as hacking, cracking, sniffing and the production and decimation of malicious code (Ibid) The other category of computer crimes are much wider and have been in existence for centuries but are now committed in the cyber environment such as internet fraud, possession and distribution of child pornography to name a few. It is clear from the above that ICT crime has to be tackled with a more sophisticated multidisciplinary approach (van der Merwe, 2008, p.61). In modern times there is more focus from protecting the 'container' of valuables (the computer is merely the modern equivalent of a bank vault), only instead of money or gold it contains data) to protecting the real valuables in most ICT crimes, namely the data contained in the computer , the cell phone's GPS device and so on. (van der Merwe, 2008, p.63). The question then usually arises as to what types of criminal offences may be committed online and what laws one must apply to charge an offender to successfully get a prosecution.


Download Books "Cyber Crime in South Africa - Hacking, Cracking, And Other Unlawful Online Activities" PDF ePub Kindle


Post a Comment for "[Download] ~ Cyber Crime in South Africa - Hacking, Cracking, And Other Unlawful Online Activities # by Law and Technology Journal of Information ~ eBook PDF Kindle ePub Free"