Name: Nirja Pal Class: 6 Sec: E House: Chenab Roll Number: 24 Subject: Introduction of Cybercrimes: - Cyberstalking - Identity Theft
Name: Nirja Pal Class: 6 Sec: E House: Chenab Roll Number: 24 Subject: Introduction of Cybercrimes: - Cyberstalking - Identity Theft
Name: Nirja Pal Class: 6 Sec: E House: Chenab Roll Number: 24 Subject: Introduction of Cybercrimes: - Cyberstalking - Identity Theft
Class: 6 Sec: E
House: Chenab
Roll Number: 24
Subject: Introduction
of Cybercrimes:
- Cyberstalking
- Identity Theft
CYBERSTALKING
MEANING OF CYBERSTALKING
Cyberstalking refers to the use of the internet and other technologies to harass or stalk
another person online, and is potentially a crime in the India. This online harassment, which
is an extension of cyberbullying and in-person stalking, can take the form of e-mails, text
messages, social media posts, and more. It is often methodical, deliberate, and persistent.
Most of the time, the interactions do not end even if the recipient expresses their displeasure
or asks the person to stop. The content directed at the target is often inappropriate and
sometimes even disturbing, which can leave the person feeling fearful, distressed, anxious,
and worried.
Cyber-stalkers often start with small. In the beginning they may send few strange, unpleasant
messages to their intended victim. Then later they may brush off these messages as funny,
annoying or mildly weird and ignore them taking any action.
Over time, the messages may become systematic, sustained and repetitive and take on an
increasingly intimidating or frightening tone.
CONSEQUENCES OF CYBERSTALKING
Just like stalking, cyberstalking has the potential to cause a wide range of physical and
emotional consequences for those who are targeted. For instance, it's not uncommon for those
who are being harassed online to experience anger, fear, and confusion. They also might have
trouble sleeping and even complain of stomach trouble.
Overall, the findings revealed that victims of harassment may suffer high levels of
psychological distress as a consequence of the experience with victims of cyberstalking
experiencing psychological effects which are broadly comparable to the symptoms seen in
the PTSD, leaving the victim experiencing feelings of isolation.
They are especially important for mobile devices which contain valuable data and track your
exact location. There are numerous cases in which cyberstalking begins when an attacker
pays someone to hack your email or phone and uses the gathered information against you. A
such, protecting yourself from hackers is key to cyberstalking prevention.
To mask your IP address you can use a Virtual Private Network (VPN). This hides your real
IP address and replaces it with from a location of your choice, so you could even appear to be
in a different country. It also encrypts all of your internet traffic, keeping it safe from the
prying eyes of hackers.
INDENTITY THEFT
1. True-name identity theft means the thief uses PII to open new accounts. The thief
might open a new credit card account, establish cellular phone service or open a
new checking account to obtain blank checks.
2. Account-takeover identity theft is when the imposter uses PII to gain access to the
person's existing accounts. Typically, the thief will change the mailing address on
an account and run up a bill before the victim realizes there is a problem. The
internet has made it easier for identity thieves to use the information they've stolen
since online transactions are made without any personal interaction.
To protect yourself from identity theft, experts recommend individuals regularly check credit
reports with major credit bureaus, pay attention to billing cycles and follow up with creditors
if bills do not arrive on time.
Many state attorney general websites also offer identity theft kits designed to educate
people on identity theft prevention and recovery. Some offerings include helpful
documents and forms. The Identity Theft Affidavit, for example, is the form used to
officially file a claim of identity theft with a given business. This form in particular is
most often used when new accounts have been opened using a victim’s personal data,
not when an existing account has been illegally accessed.
If an individual experiences tax-related identity theft, they should continue to pay and
file taxes, even if they must file paper returns.