Research Article

In-depth Analysis of an Indian I.T. Act Related to Unauthorized Access

by  Aaruni Goel, Ashok Vasishtha, Manish Gupta
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 58 - Issue 7
Published: November 2012
Authors: Aaruni Goel, Ashok Vasishtha, Manish Gupta
10.5120/9293-3507
PDF

Aaruni Goel, Ashok Vasishtha, Manish Gupta . In-depth Analysis of an Indian I.T. Act Related to Unauthorized Access. International Journal of Computer Applications. 58, 7 (November 2012), 12-15. DOI=10.5120/9293-3507

                        @article{ 10.5120/9293-3507,
                        author  = { Aaruni Goel,Ashok Vasishtha,Manish Gupta },
                        title   = { In-depth Analysis of an Indian I.T. Act Related to Unauthorized Access },
                        journal = { International Journal of Computer Applications },
                        year    = { 2012 },
                        volume  = { 58 },
                        number  = { 7 },
                        pages   = { 12-15 },
                        doi     = { 10.5120/9293-3507 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2012
                        %A Aaruni Goel
                        %A Ashok Vasishtha
                        %A Manish Gupta
                        %T In-depth Analysis of an Indian I.T. Act Related to Unauthorized Access%T 
                        %J International Journal of Computer Applications
                        %V 58
                        %N 7
                        %P 12-15
                        %R 10.5120/9293-3507
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Cyber Laws are the laws prevailing in the cyber space. Cyber space has a vast definition which encompasses the term like computers, computer networks, software, data storage devices, the Internet, websites, emails and even electronic devices such as cell phones, ATM machines, satellites, Microwaves etc. These Laws covers firstly that they must be standardized by government. Secondly should be in force under some specific region and finally must be obeyed by all persons under such specified region. Any violation of these rules could give the right to government to take action such as imprisonment, or fine or an order to pay compensation as per specified through proper Legal jurisdiction. In India, in general the major concerned on Cyber Laws is on Cyber Crimes, Electronic and Digital Signatures, Intellectual Property, Data Protection and Privacy. It should be noted all that cyber crimes are unlawful in which computer or any resource attached to it, is tampered. Here devices of both attacker and victim are important evidences also. At last the term crime and the punishment to criminal in such offence can vary from country to country. It is so because the Constitution of any country is a law of land where land is the territory of that country.

References
  • Indian I. T. Act, 2008(Amendment).
  • Duggal, Pavan, Cyber Law: The Indian Perspective, 2009. Saasksar Publications.
  • www. asianlaws. org.
  • Gaur, K. D A text book of the Indian Penal Code, Universal Law Publishing Company Pvt. Limited, Apr-2004.
  • Ashok Felix, The Constitution of India, 2011.
  • Godbole, "Information Systems Security", Dec-2008, Willey
  • Sood, "Cyber Laws Simplified",2011, Mc Graw Hill
  • Singh,Talwant, Cyber Law & Information Technology, District & Sessions Judge, Delhi.
  • Gaur, K. D. , Criminal Law and Criminology, Deep and Deep Publications, 2003
  • www. wikipedia. org
  • www. cybercellmumbai. com
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Computer Networks MAC Spoofing IP Spoofing Firewalls Intrusion Detection and Prevention Systems (IDPS) Key Loggers Hacking Trojans Constitution of India

Powered by PhDFocusTM