Cyber Crime
Cyber Crime
Cyber Crime
Causes of cybercrime
o Easy to Access: The trouble behind shielding a PC from unapproved access
is that there is high likelihood of break because of compound innovation.
Programmers can take code, retina pictures, voice recorders and so on that can
simple nitwit biometric frameworks and sidestep firewalls can be used to get
numerous security frameworks.
o Capacity to store information in similarly little space: Computer can store
information at tiny space. This makes simple for individuals to take information
from other gadget and use them for their own benefit.
o Complex: The PCs chips away at working framework and these OS are
modified with a huge number of codes. So, individuals can do botches at different
stage. The digital crooks exploit these mix-ups.
o Negligence: There might be a possibility that ensuring the PC framework
individuals might make any carelessness which gives a criminal to access and
command over the PC framework.
o Loss of Evidence: The data identified with the wrongdoing can simple to
annihilated. Along these lines, loss of proof has become exceptionally normal and
clear issue which harm the framework behind the examination of digital
wrongdoing.
Types
Cybercrime can be widely portrayed as an illegal activity where electronic devices
such as computers, cell phones, and networks are affected. It is for both individuals
and businesses/organizations. The perpetrators of these crimes are attacking
businesses primarily for the sake of financial gain, vandalism or disruption. People
are also targeted by high-level fraud by compromising their cell phones or
computers. The following are some of the types of cybercrime that criminals use to
commit atrocities:
1) Phishing - This is a type of cybercrime where user data is compromised by
hacking into a mobile phone or computer. May include debit/credit card number
and other sign-in credentials. It has been found that the attacker presents itself as a
loyal business to the user. User is tricked by opening mail, text message, etc. Or
opening any anonymous connection that could lead to the installation of powerful
malware viruses. It can capture the user's digital device system and enable
attackers to access logical and valuable information that the user can use for
financial gain.
2) Identity Theft - In this type of cybercrime, personal information is compromised
such as name, contact or identification number, credit/debit card number.
Important information is available and obtained by the attackers without human
consent. So that cyber criminals can use someone else's identity to gain financial
benefits. A person whose identity has been compromised may suffer serious
consequences such as loss of a set amount. Other personal information may include
birthdate, driver's license number, PINs, fingerprints, digital signatures, etc. It can
also be used by attackers to obtain that person's financial resources.
3) Hacking - Hacking is a term widely used to describe the activity of
compromising on electronic devices such as mobile phones, computers and
networks. It is done primarily on account or system without the permission of the
authorities and therefore, illegal or data theft is committed by cyber attackers.
Nowadays, hackers do not need to have high coding skills or need a degree in
computer science to change programs, etc. They work with a variety of newly
developed methods of simplicity and simplicity to carry out those processes.
Attackers trick its users into opening anonymous links in order to obtain sensitive
information from the public.
4) Spreading hatred and promoting terrorism- It is a type of cybercrime where
cyber criminals use the internet to commit violent and horrific acts that lead to loss
of life, threats, property damage, etc. It can be due to political gain or ideological
factors. Some hackers may spread hatred and terrorism by hacking into
unauthorized networks and servers. With the disruption of networks or computer
servers, these attackers use a variety of tools such as viruses, cybercrime, and other
malicious software. Experienced cyber criminals or cyberterrorists can lead to
serious harm not only to private sector programs but also to public sector
programs. Their motives can be political, intellectual or personal to create harm
online.
5) Cyberstalking- In this type of cybercrime, criminals use the internet to harass a
person, a group. It can also hurt the organization. The main purpose of
cyberstalking is to control or influence any person for personal or financial gain.
The methods of committing these crimes can be in various ways such as false
accusations, degradation, identity theft, threats, destruction of property, etc. Any
stalker can be anonymous, stranger from social media, or someone the victim
knows.
Keep Strong passwords – Use passwords that no one can guess and try not
to save them written or recorded anywhere. Do not use any personal
information as your password. Use different symbols and numbers to keep
your password strong.
Set privacy on your social media accounts – Keep your private and
personal information safe. The cyber criminals can get your any information
from your social media accounts and use that for various purposes. So, the
less you provide your personal information, the better it is.
Beware of spam emails - Do not open the links attached with unknown
emails. Do not open any URL you receive through message or email which
is asking for your personal or financial information. Almost every email
provider enables spam filters, so it would be better if you check occasionally
that this filter is working.
Keep your mobile devices secured – Your mobile devices can also be
exposed to malicious software, hackers and various computer viruses. So it
is recommended to download any application from reliable sources only.
You should keep anti-virus installed in your device and also put a lock
screen password, so that no one can access your personal information.
Keep your wireless network secured – Wireless networks are likely to give
way to cybercrimes if you do not keep them secured. Avoid using unsecured
public wireless networks criminal minded people can hack all personal
information including your credit card numbers, WhatsApp conversation and
also the passwords. And also, do not make corporate or financial
transactions using public wireless network.
Digital misrepresentation and wholesale fraud are remembered for the Indian
Penal Code (IPC), 1980 and the Information Technology Act, 2000.
• False records, (Section 465) - Anyone who submits extortion will be at risk to
detainment for any term of as long as two years, or a fine, or both.
References –
• https://us.norton.com/internetsecurity-how-to-how-to-recognize-and-
protect-yourself-from-cybercrime.html
• https://en.wikipedia.org/wiki/Cybercrime
• https://www.kaspersky.co.in/resource-center/threats/what-is-cybercrime
• https://www.redpoints.com/blog/cybercrime/
• https://www.computerweekly.com/news/252493515/Top-10-cyber-crime-
stories-of-2020
• https://www.jigsawacademy.com/major-causes-of-cyber-crimes-you-must-
be-aware-of/
• https://www.telegraphindia.com/odisha/first-case-of-cyber-
crime/cid/1413198
• https://www.britannica.com/topic/cybercrime
• https://www.appknox.com/blog/cybersecurity-laws-in-india
• https://www.legalserviceindia.com/legal/article-1019-importance-of-cyber-
law-in-india.html