Question: Let's say that a cyber-criminal develops a fake website that looks like a genuinely famous online clothing brand website. By accessing the site's source code
Let's say that a cyber-criminal develops a fake website that looks like a genuinely famous online clothing brand website. By accessing the site's source code and copying graphics from real website, finding it impossible for a user to recognize the difference. A registration and login form is available on the website asking the user to enter confidential personal details. After the user has opened the fake website and entered his information, this information will be forwarded to hacker system.This is used to contravened the confidentiality of the password of the user and other financial details.
After reading the above scenario, answer the following Question:
1.Identify the name of cyber-crime(s) in which the above-mentioned case falls?
2.Identify the offence of the above cyber-crime under Electronic/Cyber Crime Bill 2007 in Pakistan.
3.What is the punishment and fine for the above offence(s)?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
