Abstract

Cyber-crime is typically understood to consist of accessing a computer without the owner’s permission, exceeding the scope of one’s approval to access a computer system, modifying or destroying computer data or using computer time and resources without proper authorization. Cyber-terrorism consists essentially of undertaking these same activities to advance one’s political or ideological ends. Terrorist actions in the cyberspace could be done not only by isolated persons or terrorist groups, but one state against another. By that, cyber terrorism does not differ from other kind of terrorism in any way. The specific nature of the threat can range from denial of service to eavesdropping, fraud, sabotage, and theft of intellectual property and proprietary information. This paper aims to provide a broad overview of the challenges faced by the world in cyber crime and problems faced by law enforcement agencies and Information and Communication Technology security specialists in cyber investigations and the benefits that may be gained by the international community and of course the public-private partnerships (PPP) to the prevention, detection and prosecution of cyber crimes and how third world countries need to keep pace with the ever changing technologies and the manipulation of this technology by what we may term cyber criminals in order to make profit.KeywordsCyber CrimeDigital EvidenceSecurityHackingRisk AnalysisIntellectual Property (IP)Cyber TerrorismICT

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call