The Nsp Case Study: The Bank NSP Case

Great Essays
 The Bank NSP Case

In this case the management trainee in a bank who used to exchange some E-mails with his fiancé using the computers of his company. After sometime, they broke up and the girl developed a grudge against him and fraudulently created some E-mail IDs and sent E-mails to the boy’s foreign clients, using the bank’s computers. Due to this the boy’s company lost many clients and a case was filed against the bank in court. The bank was held liable for those E-mails sent using Bank’s system.
Cyber Crime Variants (explained)
• Hacking – It is a crime which includes breaking into the systems and having unauthorised access to them.

• Cyber Squatting – It is the act of registering a domain name of interest to someone else (eg. Business
…show more content…
Cyber crimes is no more restricted to time, space or a group of people. Cyber crimes do create a lot of civil and criminal wrongs.
In the global context, now there is a rising importance of cyber-control mechanisms, it is becoming more and more important to push cyber laws to check the spread of cyber crimes. Cyber crimes are a class of crimes which are rapidly increasing, putting the right to privacy of many under threat. Getting the right lead and making accurate interpretations is now an important task, by formulating some effective cyber laws to do away with these crimes.
E-Commerce , which is the biggest future of internet, can only become possible if we are able to get the required legal infrastructure in place to complement its growth.
CYBER CRIMES AND CYBER SECURITY (Invasion of Privacy)
Privacy is a comprehensive right which is of great value to every individual. It, in other words means- ‘The Right to Be Left Alone’. It is a Human Right which is Fundamental to human existence. It is the right of people to be free from any interference in their right and the right to live with human
…show more content…
People should themselves beware and should take steps to ensure that their personal information is not used in a way which might leak the same, and facilitate it for those cyber criminals to use up this personal information to get their way (profit from someone else’s works).
MEASURES TO DEAL WITH CYBER CRIMES

 Role of INTERPOL
INTERPOL has committed itself to fight against Cyber Crimes. Most of these crimes are Trans-National in character, which is the reason why INTERPOL can deal with them more effectively and is capable of investigating crimes like these on a Corporate Level.
INTERPOL has uniquely advanced itself to the fight against cybercrimes on a global level by its proactive research into these emerging crimes. INTERPOL’s main initiatives on Cyber Crimes focus on:
• Digital Forensics
• National Cyber Reviews
• Research and

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Study Guide

    • 432 Words
    • 2 Pages

    1. Name three specific cyber issues that have necessitated new laws. 1) Credit card fraud. 2) Cyberstalking. 3) Theft of intellectual property and Identity theft.…

    • 432 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hackers/Crooks have put hard working people in hardship by ruining their credit causing them to be unable to buy a home or even getting hired on at a job. They have been known to steal credit card numbers from websites, breaking into homes or digging into the trash to retrieve personal information, and an employee you work with that takes a look at your personal file(Federal Trade, National and State, Consumer Sentinel, 2013).Though the internet is one of the main ways identities are stolen, they will pick-pocket you, steal your mail right out of the box, your tax information, and even obtaining medical services(Cassim, 2015).…

    • 105 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    The working group was tasked with preparing a report identifying which laws were sufficient in investigating and prosecuting crimes conducted via the Internet. Moreover, emphasis was placed on the sale of weapons, illegal narcotics, pharmaceuticals, prescription drugs, fraud, and child pornography. Additionally, the working group was to investigate which new technologies, capabilities, and legal authorities were required to investigate and prosecute those individuals and groups that commit crimes using the Internet. Furthermore, the working group was to identify new and existing tools that could be used to educate, empower parents, teachers, to include public and private sector users to prevent or minimize risk posed by unlawful use of the Internet.…

    • 664 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    This article provides insight into the sphere of CyberFraud and its effect internationally and nationally (United States of America), it explores statistics on who the criminals target, why they target their victims, the information that is stolen during the attack(s) and the economic effect the attacks hold. The source focusses on the most common aspects of CyberFraud and has valuable statistics of being affected and becoming a victim of the crime. The source explores the major types of CyberFraud; Phishing, Pharming and Identity Theft. The article concludes with how corporations can prevent the attacks and shows the damage (economically) that CyberFraud generates.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Introduction In 2017, there have been several high profile cyber-attacks that have affected various systems across the country and the world. Among these cyber-criminals is the group known as the Shadow Brokers who debuted in August 2016 after claiming to have breached the spy tools of the Equation Group, an elite NSA-linked operation. In April 2017, the Shadow Brokers released what is said to be significant NSA tools which individuals have used to infect computer systems with ransomware. As a result of the Shadow Brokers’ breach, one strain of ransomware, WannaCry, spread worldwide in May 2017 hitting several targets that included public utilities and large corporations. It even attacked National Health Service facilities in Great Britain,…

    • 657 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In his revealing book Future Crimes, Marc Goodman shows us the threat that we, as inhabitants of this new technological world, either are facing or going to face in future years. Goodman started his cybercrime resume with the Los Angeles Police Department. After the LAPD, he spent years working for federal agencies such as the FBI and the secret service with on their computer crime units. When he began working with the computer crime units, cybercrimes were still in their infancy, now he has seen the eruption of cyber terrorism and Crime Inc. Goodman’s book shows the American public the vulnerabilities of their social media accounts and how the information obtained from them can be used against them. He also reveals how large the Dark Web really is and how it is already causing threats because of the unregulated sale of every product imaginable.…

    • 494 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Great Essays

    While some sites concentrate on laws that defend victims age 18 and under, Working to Halt Online Abuse is a help resource comprising of a list of up-to-date and unresolved cyberstalking-related in the United States federal and state laws. In addition, it lists those states that do not have laws yet and associated laws from other countries. The Global Cyber Law Database (GCLD) wishes to become the most inclusive and influential foundation of cyber laws for all countries.…

    • 1184 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    The lost sense to rights…

    • 269 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Introduction Over the last few decades, American Society has rapidly changed due to the prompt development of advanced computer technology. These advancements continue to energize the next generation to push the boundaries of the possible, by challenging the impossible. Throughout the previous decades these boundaries have continued to be extended and defeated, impelling professionals to reanalyze what is truly impossible. However, due to the incredible pace in which these advancements are being achieved, international communities, like America, are left defending against threats and vulnerabilities that are unknown.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cybercrime In Canada

    • 546 Words
    • 3 Pages

    [5] Convention on cybercrime and additional protocols: Council of Europe, 2001 convention on cybercrime and additional protocols to the council of Europe Convention on cybercrime focuses on acts of racist and xenophobic activities committed via computer systems. [6] INTERPOL: The International Criminal Police Organization facilitates international police corporation. It functions as a network of criminal law enforcement agencies from different countries. [7] National tools: Canadian Charter of Rights: This act gives the freedom and rights to such…

    • 546 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Cyber Crime Research Paper

    • 1158 Words
    • 5 Pages

    Cybercrime: The Easy Way to Commit a Crime Cybercriminals are able to commit detrimentals crimes with a click of a few buttons. Cybercrime is the “unauthorized use or disruption of computer files... the theft of an electronic identity...the use of a computer to facilitate or carry out a traditional crime (Engdahl 100).” According to the author of the article “Cybersecurity,” cyber attacks are becoming more and more common.…

    • 1158 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Introduction When it comes to digital crimes, various methods are used to commit such acts. These include: Hacking, malicious software as well as cyber stalking, to name a few takes place day in and day out. The names that are attached to these crimes in fact explains the what and now, the why has to be explained. In this body of work however, it will be discussed theories surrounding digital crimes. Space Transition Theory and Social Learning Theory will provide detail and insight as to the why factor: why was the crime committed, the rationale of the response, how it relates to crime in general.…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays