We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

See Pricing

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
2/4 steps

How Many Pages?

3/4 steps

Sign Up and See Pricing

"You must agree to out terms of services and privacy policy"
Get Offer

Cybercrime – computer crime

Hire a Professional Writer Now

The input space is limited by 250 symbols

Deadline:2 days left
"You must agree to out terms of services and privacy policy"
Write my paper

1. 1BackgroundCybercrime is besides called computing machine offense. The usage of computing machines as an instrument to farther illegal terminals. such as perpetrating fraud. trafficking in kid erotica and rational belongings. stealing individualities. or go againsting privateness is cybercrime. Cybercrime. particularly through the Internet. has grown in importance as the computing machine has become cardinal to commerce. amusement. and authorities. 1 New engineerings creates new condemnable chances because of the early and widespread acceptance of computing machines and the Internet. these yearss computing machine offense has been a turning issue even here in Nepal.

Don't use plagiarized sources. Get Your Custom Essay on
Cybercrime – computer crime
Just from $13,9/Page
Get custom paper

1. 2 Statement of ProblemThe development on information engineering and internet made the universe as a little planetary small town. Peoples can acquire entree right through the universe from their place with cyberspace. The tendencies of planetary terrorist act are besides changed by utilizing such IT. Cyber offense as a “new weapon” becomes a possible menace in international peace. In peculiar. this paper is focused on cyber offense. its effects. challenges and impact of cyber offense on planetary security.

1. 3Objectives of the Survey:a. To cognize how far cybercrimes are happening in Nepalb. Cyber offense in Nepal and the jurisprudence into forcec. To larn about cyber security

1. 4Importance of the StudyThe research work is fundamentally utile for all research workers and scholars who are willing to analyze about cyber offense. It is every bit good to build up and patrol forces. the pupils of strategic surveies. political scientific discipline. history and international relationship. Cyber offense. at present is being a great challenge in each and every development sector. So. it will be utile for the contrivers and policy shapers excessively.

1. 5Limitation of the StudyIt is because of clip constrains ; the research is limited in analyzing on cyber offense. its effects and cyber security merely. However. broaden construct of cyber offense has been drawn in the survey. Field visit was really dearly-won in footings of clip and resources. so merely secondary beginnings ( informations ) have been used to finish the survey. It is specifically focused on placing the causes. aims. and impacts of cyber offense. the development in cyber infinite and information warfare. and possible menace in international peace. At last assorted steps for battling it and recommendations.

1. 6MethodologyIn this survey. descriptive and analytical method has been chosen. Because of the clip constrains. the information has been used in the research work are based on secondary beginnings. They were obtained through books. and World Wide Web sites.

Chapter IIHistory OF CYBER CRIME

The first recorded cyber offense took topographic point in the twelvemonth 1820. In 1820. Joseph-Marie Jacquard. a fabric maker in France. produced the loom. This device allowed the repeat of a series of stairss in the weaving of particular cloths. This resulted in a fright amongst Jacquard’s employees that their traditional employment and support were being threatened. They committed Acts of the Apostless of sabotage to deter Jacquard from farther usage of the new engineering. This is the first recorded cyber offense. In Nepal. concern houses. organisations started utilizing electronic stuffs and computing machines where authorities was missing in electronic regulations and ordinances. There is no exact day of the month recorded for the first cyber offense in Nepal boulder clay day of the month. But we can see many people being the victim of cybercrime. Particularly in Nepal. many celebrated companies are having electronic mails from proxy get offing reference demanding for money. Beside this. choping web sites of Bankss. newspaper and face book histories. mortifying misss and uploading images in porn sites. gross revenues of pirated CDS and DVDS are the most normally practiced cybercrime in Nepal.

Chapter IIICATEGORIES OF CYBERCRIMEBasically we can categories cybercrime into two types:( a ) The computing machine as Target: utilizing of computing machine to assail another computing machine like choping. virus/ worms onslaughts.

( B ) The computing machine as a arm: utilizing a computing machine to perpetrate existent universe offense like cyber terrorist act. recognition card fraud and erotica. DoS onslaught and many more. 2

Chapter IVEffects OF CYBERCRIMEAs the universe goes mobile. cybercrime follows. Criminal takes advantage of engineerings and cyberspace in many ways to perpetrate offense which is really difficult to command by solo attempt. Some of the effects of cybercrime that is often happening in Nepal are as follows ; ( a ) Hacking: This is a type of offense wherein a person’s computing machine is broken into so that his personal or sensitive information can be accessed. This is different from ethical hacking. which many organisations use to look into their Internet security protection. In choping. the condemnable uses a assortment of package to come in a person’s computing machine and the individual may non be cognizant that his computing machine is being accessed from a distant location.

( B ) Larceny: This offense occurs when a individual violates right of first publications and downloads music. films. games and package. There are even peer sharing web sites which encourage package buccaneering and many of these web sites are now being targeted by the FBI. Today. the justness system is turn toing this cyber offense and there are Torahs that prevent people from illegal downloading.

( degree Celsius ) Cyber Stalking: This is a sort of on-line torment wherein the victim is subjected to a bombardment of on-line messages and electronic mails. Typically. these stalkers know their victims and alternatively of fall backing to offline stalking. they use the Internet to stalk. However. if they notice that cyber still hunt is non holding the coveted consequence. they begin offline stalking along with cyber stalking to do the victims’ lives more suffering.

( vitamin D ) Identity Larceny: This has become a major job with people utilizing the Internet for hard currency minutess and banking services. In this cyber offense. a condemnable entrees informations about a person’s bank history. recognition cards. Social Security. debit card and other sensitive information to syphon money or to purchase things online in the victim’s name. It can ensue in major fiscal losingss for the victim and even botch the victim’s recognition history.

( vitamin E ) Malicious Software: These are Internet-based package or plans that are used to interrupt a web. The package is used to derive entree to a system to steal sensitive information or information or causation harm to package nowadays in the system.

( degree Fahrenheit ) Child beging and Abuse: This is besides a type of cyber offense wherein felons solicit bush leagues via confab suites for the intent of kid erotica. The FBI has been passing a batch of clip supervising chat suites frequented by kids with the hopes of cut downing and forestalling kid maltreatment and soliciting.

Chapter V


5. 1Cyber security: Cyber Security involves protection of sensitive personal and concern information through bar. detainment and response to different online onslaughts. The steps of using cyber security are as follows: ( a ) Privacy Policy: Before subjecting your name. e-mail reference. on a website expression for the sites privateness policy.

( B ) Keep Software Up to Date: If the marketer reduces spots for the package runing system your devices put in them every bit shortly as possible. Installing them will forestall aggressors from being able to take advantages. Don’t choose options that will let your computing machine to retrieve your watchwords. ( degree Celsius ) Disable distant connectivity: Some devices are equipped with wireless engineerings like Bluetooth that can be used to link to other devices.You should disenable these characteristics when they are non in usage.

5. 2Advantages of Cyber Security: The advantages of cyber security are mentioned below: ( a ) The cyber security will support us from critical onslaughts. ( B ) It will support us from drudges and virus.

( degree Celsius ) Internet Security processes all the entrance and surpassing informations on your computing machine. ( vitamin D ) Application of cyber security used in our Personal computer needs update every hebdomad. ( vitamin E ) It helps us to shop the site. web site.

Chapter VICYBER LAW IN NEPALNepal has moved a measure further in the information and communicating engineering ( ICT ) as the authorities has promulgated Electronic Transaction Act-2063 and Regulations. legalising all electronic minutess and digital signatures. 4 Cyber jurisprudence or Electronic Transaction Act clearly defines the rights. responsibilities and governments of the endorsers. web service supplier. etc. The act had proviso of separate organic structures. IT Tribunal and Appellate Tribunal. The both look into all instances related to computing machine offense and the cyber offense. The IT court is headed by the District Court Judge and has 3 members. The chief intent of this act ( jurisprudence ) is to legalise the electronic minutess and digital signatures for both private and public minutess. protecting the electronic paperss from the unauthorised entree and to command the illegal activities or the cyber offenses. This act has 12 subdivisions and 79 clauses. Electronic Transaction Act 2006 is here to fore addressed in the capacity of cyber jurisprudence. The Cyber jurisprudence 2006 dictates the restriction for ailment within 35 yearss of first knowhow of offense and breaching of the cyber jurisprudence. The penalty varies from Rs. 50000 to Rs. 300000 punishment and 6 months to 5 old ages imprisonment as the efforts to deter the cyber offense.

Chapter VIICHALLENGES IN CYBER CRIMEThough there is cyber jurisprudence in Nepal. but yet there are many challenges in look intoing Cybercrime due to: a. Internet and the computing machines as the Sceneof Crime there are many types of computing machine offense that exist. every bit good as the legal and proficient challenges that face jurisprudence enforcement and prosecuting officers in their attempts to battle this offense. b. Investigator’s accomplishments ( non trained ) to battle cyber terrorist act. c. knowhow of cyber security

d. hi-tech offenses and confusionse. Low engagement of tech groups and less co-operation of resource groups f. Imitation of traditional position for specifying cyber offense. A ambitious facet of cybercrime is its nonlocal character: actions can happen in legal powers separated by huge distances. g. Making a Safer Information Society by Bettering the Security of Information Infrastructures.

Chapter VIIIRecommendationMany people has become the victim of cybercrime particularly misss. famous persons. politicians and many other celebrated personalities. It’s a good known stating that “Prevention is ever better than cure” . Therefore. it is ever better to take certain safeguard beforehand instead than repenting afterwards. Whosoever is accessing the net should take Safety and privateness activation on societal networking site. Some of the safety steps are mentioned below: a. Stay informed. pay attending to intelligence beginnings to larn about recent menaces and web sites that have been attacked. B. Be careful. to ne’er come in private or fiscal informations into web sites that don’t show cogent evidence of security. c. Clean and unclutter your cyberspace cache. lost fragments. orphaned register keys. impermanent files. deleted email messages. and other impermanent files on your computing machine frequently. d. Google yourself and do certain there is nil out at that place that gives out excessively many inside informations about you. e. Never supply your recognition card figure as a cogent evidence

f. Report maltreatment. if you are stalked or harassed online. don’t respond to the aggressor. Alternatively maintain a record of the communications and describe the maltreatment to the web sites decision maker.

Chapter IXDecisionThere are appropriate fact-finding jurisprudence enforcement bureaus. District Police Offices of Police Headquarters or Local Police office. Metropolitan Crime Division who are working against cybercrime and the felons. Cybercrime is so acquiring the acknowledgment it deserves. However. it is non traveling to be restricted that easy. In fact. it is extremely likely that cybercrime and its hackers will go on developing and upgrading to remain in front of the jurisprudence. So. to do us a safer we must necessitate cyber security. Furthermore. every person most use the possible manner to remain alert.


FBI- Federal Bureau of InvestigationDoS- Denial-of-ServicePC- Personal ComputerIT- Information TechnologyCD-Compact DiscDVD-Digital Versatile Disc / Digital Video DiscICT-Information and Communication Technology


a. hypertext transfer protocol: //www. britannica. com/EBchecked/topic/130595/cybercrime b. hypertext transfer protocol: //www. bezaspeaks. com/cybercrime/history. htmc. hypertext transfer protocol: //www. slideshare. net/aemankhan/cybercrimeppt-27376284 d. hypertext transfer protocol: //www. slideshare. net/aemankhan/cybercrimeppt-27376284 e. hypertext transfer protocol: //egovernancenepal. blogspot. com/2007/03/cyber-law-electronic- transaction-act. hypertext markup language f. hypertext transfer protocol: //www. crossdomainsolutions. com/cyber-crime/

g. hypertext transfer protocol: //www. spotlightnepal. com/News/Article/-Cyber-Law-And-Its-Challenge- h. hypertext transfer protocol: //www. ekantipur. com/2014/05/25/oped/cybercrime-without-cyber-rules/390001. hypertext markup language i. hypertext transfer protocol: //www. thehimalayantimes. com/fullNews. php? headline=Journo+charged+with+cyber+crime & A ; NewsID=38http: //setopati. net/politics/1775/0963 j. hypertext transfer protocol: //mybhaktapur. com/2011/12/20/nepal-police-arrests-facebook-mis-user-for-cyber-crime/ k. hypertext transfer protocol: //www. thehimalayantimes. com/fullNews. php? headline=Cyber+criminals+to+target+mobile % 26sbquo % 3B+social+in+2014 & A ; NewsID=401622 l. hypertext transfer protocol: //surendraphuyalnepal. wordpress. com/

m. Kantipur Dailyn. Nagarik DainikO. A Guide to Computer Crime from legal. practician. comp. International Journal of Cyber Criminologyq. Cybercrime Nepalese Prospective by Nepal Policer. Moore. R. ( 2005 ) “Cyber offense: Investigating High-Technology Computer Crime. ” Cleveland. Mississippi: Anderson Publishing.

Cite this Cybercrime – computer crime

Cybercrime – computer crime. (2017, Aug 13). Retrieved from https://graduateway.com/cybercrime-computer-crime-essay-2606-essay/

Show less
  • Use multiple resourses when assembling your essay
  • Get help form professional writers when not sure you can do it yourself
  • Use Plagiarism Checker to double check your essay
  • Do not copy and paste free to download essays
Get plagiarism free essay

Search for essay samples now

Haven't found the Essay You Want?

Get my paper now

For Only $13.90/page