CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

In-depth Analysis of an Indian I.T. Act Related to Unauthorized Access

by Aaruni Goel, Ashok Vasishtha, Manish Gupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 58 - Number 7
Year of Publication: 2012
Authors: Aaruni Goel, Ashok Vasishtha, Manish Gupta
10.5120/9293-3507

Aaruni Goel, Ashok Vasishtha, Manish Gupta . In-depth Analysis of an Indian I.T. Act Related to Unauthorized Access. International Journal of Computer Applications. 58, 7 ( November 2012), 12-15. DOI=10.5120/9293-3507

@article{ 10.5120/9293-3507,
author = { Aaruni Goel, Ashok Vasishtha, Manish Gupta },
title = { In-depth Analysis of an Indian I.T. Act Related to Unauthorized Access },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 58 },
number = { 7 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 12-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume58/number7/9293-3507/ },
doi = { 10.5120/9293-3507 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:01:50.164060+05:30
%A Aaruni Goel
%A Ashok Vasishtha
%A Manish Gupta
%T In-depth Analysis of an Indian I.T. Act Related to Unauthorized Access
%J International Journal of Computer Applications
%@ 0975-8887
%V 58
%N 7
%P 12-15
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cyber Laws are the laws prevailing in the cyber space. Cyber space has a vast definition which encompasses the term like computers, computer networks, software, data storage devices, the Internet, websites, emails and even electronic devices such as cell phones, ATM machines, satellites, Microwaves etc. These Laws covers firstly that they must be standardized by government. Secondly should be in force under some specific region and finally must be obeyed by all persons under such specified region. Any violation of these rules could give the right to government to take action such as imprisonment, or fine or an order to pay compensation as per specified through proper Legal jurisdiction. In India, in general the major concerned on Cyber Laws is on Cyber Crimes, Electronic and Digital Signatures, Intellectual Property, Data Protection and Privacy. It should be noted all that cyber crimes are unlawful in which computer or any resource attached to it, is tampered. Here devices of both attacker and victim are important evidences also. At last the term crime and the punishment to criminal in such offence can vary from country to country. It is so because the Constitution of any country is a law of land where land is the territory of that country.

References
  1. Indian I. T. Act, 2008(Amendment).
  2. Duggal, Pavan, Cyber Law: The Indian Perspective, 2009. Saasksar Publications.
  3. www. asianlaws. org.
  4. Gaur, K. D A text book of the Indian Penal Code, Universal Law Publishing Company Pvt. Limited, Apr-2004.
  5. Ashok Felix, The Constitution of India, 2011.
  6. Godbole, "Information Systems Security", Dec-2008, Willey
  7. Sood, "Cyber Laws Simplified",2011, Mc Graw Hill
  8. Singh,Talwant, Cyber Law & Information Technology, District & Sessions Judge, Delhi.
  9. Gaur, K. D. , Criminal Law and Criminology, Deep and Deep Publications, 2003
  10. www. wikipedia. org
  11. www. cybercellmumbai. com
Index Terms

Computer Science
Information Sciences

Keywords

Computer Networks MAC Spoofing IP Spoofing Firewalls Intrusion Detection and Prevention Systems (IDPS) Key Loggers Hacking Trojans Constitution of India