Advertisements
Advertisements
Question
What are the various crimes happening using computers?
Solution
Crime:
- Crime Function
- Cyberstalking
- Malware
- Harvesting
- Identity theft
- Intellectual property theft
- Salami slicing
Function:
- Hacking, threats, and blackmailing towards a business or a person.
- Harassing online.
- Malicious programs can perform a variety of functions including stealing, encrypting, or deleting sensitive data, altering or hijacking core computing functions, and monitoring user’s computer activity without their permission.
- A person or program collects login and password information from a legitimate user to illegally gain access to others’ account(s).
- It is a crime where the criminals impersonate individuals, usually for financial gain.
- Stealing practical or conceptual information developed by another person or company.
- Stealing tiny amounts of money from each transaction.
RELATED QUESTIONS
What is biopiracy?
What is harvesting?
Write a short note on cracking.
What are ethical issues? Name some.
What is piracy?
How piracy can be prevented?
Mention the types of piracy?
GEAC stands for ________.
Which one is used in the production of insulin by genetic engineering?
Which of the following Indian products were preys of biopiracy?
The illegal and unlawful development of biomaterials without payment to the inhabitants of their origin is called ______.
GEAC (Genetic Engineering Approval Committee) is set by ______.
While creating genetically modified organisms, genetic barriers are not respected. How can this be dangerous in the long run?
Why has the Indian Parliament cleared the second amendment of the country’s patents bill?
Give any two reasons why the patent on Basmati should not have gone to an American Company.
What is GEAC and what are its objectives?
For which variety of Indian rice, the patent was filed by a USA Company?
Ignoring our traditional knowledge can we prove costly in the area of biological patenting. Justify.