Acknowledgements
Acknowledgements
Acknowledgements
CYBER CRIME
Submitted by
Sudeep Sharma 23BDS03151
Arindam Banerjee 23BKT0034
Mayuraksha Banerjee 23BDS0160
Agrim Dev 23BAI0049
Submitted to
Dr N.S VISHNU PRIYA
Associate Professor Sr.
Department of English
School of Social Sciences and Languages
VIT, Vellore
Submitted on
ACKNOWLEDGEMENTS
We wish to express our special thanks of gratitude towards our professor Dr.
Vishnu Priya N.S. who has bestowed upon us this amazing opportunity to work
on the report titled “Cybercrime” .This topic has helped us understand the need
for awareness among people and we have also come to know about so many
new things.
The report in general has helped us a lot understand some of the primary
mechanics involved in research. It has imparted to us the skill of report writing
which we are sure will be very useful in our future as professionals.
2
Table of Contents
INTRODUCTION
Herbert Lionel Adolphus Hart (18 July 1907-19 December 1992), in his work "The Concept of
Law" has said 'human beings are vulnerable so rule of law is required to protect them'. Applying
this to the cyberspace we may say that computers are vulnerable so rule of law is required to
protect and safeguard them against cyber- crime. The reasons for the vulnerability of
computers may be said to be:
1. Capacity to store data in comparatively small space: The computer has unique characteristic
of storing data in a very small space. This affords to remove or derive information either
through physical or virtual medium makes it much easier.
2. Easy to access: The problem encountered in guarding a computer system from unauthorized
access is that there is every possibility of breach not due to human error but due to the
complex technology. By secretly implanted logic bomb, key loggers that can steal access codes,
advanced voice recorders; retina imagers etc. that can fool biometric systems and bypass
firewalls can be utilized to get past many a security system.
3. Complex: The computers work on operating systems and these operating systems in turn are
composed of millions of codes. Human mind is fallible and it is not possible that there might not
be a lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate into
the computer system.
4. Negligence: Negligence is very closely connected with human conduct. It is therefore very
probable that while protecting the computer system there might be any negligence, which in
turn provides a cyber-criminal to gain access and control over the computer system.
5. Loss of evidence: Loss of evidence is a very common & obvious problem as all the data are
routinely destroyed. Further collection of data outside the territorial extent also paralyses this
system of crime investigation.
6
7
7. Virus / worm attacks-Viruses are programs that attach themselves to a computer or a file and
then circulate themselves to other files and to other computers on a network. They usually
affect the data on a computer, either by altering or deleting it. Worms, unlike viruses do not
need the host to attach themselves to. They merely make functional copies of themselves and
do this repeatedly till they eat up all the available space on a computer's memory.
8. Logic bombs:
These are event dependent programs. This implies that these programs are created to do
something only when a certain event (known as a trigger event) occurs.
E.g. even some viruses may be termed logic bombs because they lie dormant all through the
year and become active only on a particular date (like the Chernobyl virus).
CLASSIFICATION:
Cybercrimes can be classifies into 4 major categories as the following:
8
(iii) Cyber Defamation: This occurs when defamation takes place with the help of computers
and/or the Internet. E.g. someone publishes defamatory matter about someone on a website or
sends e-mails containing defamatory information.
(iv) Harassment & Cyber stalking : Cyber Stalking Means following an individual's activity over
internet. It can be done with the help of many protocols available such as e- mail, chat rooms,
user net groups.
(ii) Intellectual Property crimes : These include Software piracy: Illegal copying of programs,
distribution
METODOLOGY
Our team took assistance of one of the most popular data collection methods; survey. The
survey targeted respondents who were undergraduate students of Vellore Institute of
Technology across the ages of 18-22.they were asked a series of questions. The purpose of this
study is to better understand the cybercrime problem and collect relevant information for
analysis.
The first method of data collection was an administrative survey using Google forms. The
survey included a series of questions designed to measure knowledge, understanding and
awareness of cybercrime. The questions covered topics such as personal familiarity with cyber
threats, security awareness, and attitudes toward cyber security. These responses provide
insight into youth’s general understanding of cybercrime, revealing patterns and trends of
awareness and behavior.
In addition to collecting primary data, secondary data was also used to support the report. We
reviewed national newspapers to gather information on cybercrime incidents, police responses.
This analysis helps to place the findings in a social and legal context.
Interviews were conducted with representatives from the general public and those
academically interested in the issue to gather diverse opinions on the challenges posed by
cybercrime and the effectiveness of current measures. These interview provided a broader
understanding of public perception and the complexities of cybercrime prevention.
A survey was conducted among the public to gather information and opinions on cybercrime.
The questions for survey were set with an intention to gather relevant data, and the survey
population was selected without bias or preference. Simple random sampling used to make
sure we had a diverse group of participants. The questionnaire included 20 questions, featuring
a mix of closed-ended , open-ended response questions. The survey was prepared, distributed,
and responses were collected via Google Forms. Google tools were utilized to analyze the
responses, maintaining a diverse group of respondents with no restrictions on participation.
Care was taken to ensure that the research does not violate the privacy or rights of the
individuals involved.
The prepared questions include.
1. How much trust do you have in your online privacy?
2. Have your ever taken a course or training on cyber security?
3. What is the most common loss due to cybercrime?
4. Have you ever experienced cybercrime? If yes, what type of cybercrime did you experience?
10
Although this approach provides good insight, it is important to acknowledge its limitations.
While the sample size is sufficient for preliminary findings, it may not be representatives of the
general population. Additionally, self-reported data may introduce bias because participants
reported past experiences or expressed knowledge of cyber security practices.
1. Even while many college students are aware of the risks associated with cybercrime, some
still use weak passwords. This suggests a gap between their actions and their realizations.
Program that teach online safety and strong password usage must be implemented in schools.
Students can increase their self-defense with practical advice.
2. Just 30% of students have completed cybersecurity-related courses, making them the least
likely to get formal cybersecurity training. This implies that pupils are not being adequately
prepared for internet threats by their institutions. Cybersecurity workshops or courses have to
be required at colleges. Students will learn how to protect their personal information from this.
3. Even well-educated people can be targeted, as seen by the 25% of students who reported
having experienced cybercrime. This suggests that young adults frequently underestimate the
risks they face when using the internet. Campaigns to raise awareness should focus on actual
cybercrime cases.
4.With more than 60% of students voicing misgivings about authorities, many students fear that
corruption in law enforcement makes it difficult to combat cybercrime. This can exacerbate the
issue by discouraging people from reporting crimes. Improved assistance and openness are
necessary to increase public trust in law enforcement. Involving the community helps facilitate
communication between the general population and law enforcement.
5. Many people are reluctant to report cybercrimes due to concerns about privacy. Students
frequently mistrust the system or fear reprisals. Authorities must to explain how they safeguard
victim data when conducting investigations. Encouraging people to come forward requires
establishing a safe environment for reporting.
12
RECOMMENDATIONS
Most significant suggestions to protect our-self from Cyber Crime.
1. Strengthen Password Policies : Encourage the use of strong, unique passwords and
regular updates.
2. Implement Two-Factor Authentication: Make two-factor authentications
mandatory for sensitive accounts.
3. Update Software Regularly: Keeping our software and systems fully up to date.
4. Encourage Multi-Factor Authentication: Beyond two-factor, promote the adoption
of multi-actor authentication methods.
5. Strengthen Home Network: To protect home network from malicious cyber acts,
setting a strong Wi-Fi password and using WPA2 encryption.
6. Use of VPN: Virtual Private Networks add an extra layer of security by encrypting
internet connections.
7. Backup Data: Storing essential information on external devices against data loss in
the event of hardware failure etc.
8. Educating Our self : Staying informed about the least developments in cybercrime
and security.
9. Protect your personal information:
10. Exercise caution when sharing personal information such as your name, home
address, phone number, and email address online
• Don't respond to email messages that ask for personal information.
• Steer clear of fraudulent Web sites used to steal personal information.
• Pay attention to privacy policies on Web sites and in software.
Online offers that look too good to be true usually are:
While you may not directly pay for the software or service with money, the free
software or service you asked for may have been bundled with advertising software
("adware") that tracks your behavior and displays unwanted advertisements. You may
have to divulge personal information or purchase something else in order to claim your
supposed content winnings. If an offer looks so good it's hard to believe, ask for
someone else's opinion, read the fine print, or even better, simply ignore it.
13
Conclusion:
Cybercrime is a serious threat to people, businesses, and society at large in the current digital
era. The definition of cybercrime, the factors contributing to its growth, and the numerous
tactics employed by cybercriminals have all been covered in this paper. The results point to a
troubling discrepancy between people's awareness and behavior, especially among young
adults. Even though a large portion of students are aware of the dangers posed by cybercrime,
many continue to use weak passwords and other risky online behaviors.
A survey of Vellore Institute of Technology undergraduate students found that many of them
lacked formal cybersecurity training, even if they were well-informed about cyberthreats. This
suggests that educational establishments must incorporate thorough cybersecurity instruction
into their curricula. Online safety workshops and seminars can give students the information
and abilities they need to safeguard themselves in a world that is becoming more
interconnected by the day.
The research also highlights how crucial it is to increase public confidence in law enforcement in
order to promote the reporting of cybercrimes. Many respondents voiced worries about
perceived inefficiency of agencies and corruption, which can discourage victims from coming
forward. A safer online environment can be promoted by increasing law enforcement's
openness and communication with the public.
Adopting strong security measures, such as creating strong passwords, turning on two-factor
authentication, and keeping up with the most recent advancements in cybersecurity, is
essential to effectively combating cybercrime. The likelihood of becoming a victim of
cybercriminals can be considerably decreased by promoting a culture of prudence and
attentiveness.
In conclusion, the strategies used by cybercriminals are always changing along with technology.
Governments, businesses, and individuals must collaborate to raise awareness of cybersecurity
issues and put preventative measures in place.By doing this, we can make the internet
landscape safer for everyone.
15
Reference
1.Slideshare. (n.d.). A report on cyber crime.
Retrieved from https://www.slideshare.net/slideshow/a-report-on-cyber-crime/70799178
5.https://www.google.com/search?
sca_esv=173e33c9059ff87d&q=newspaper+article+on+cyber+crime+in+india&udm=2&fbs=AEQ
Nm0Aa4sjWe7Rqy32pFwRj0UkWd8nbOJfsBGGB5IQQO6L3J5MIFhvnvU242yFxzEEp3BcbXWGQj
Bp6XyyqfUu6Wz8hDrmQY6r35AfNzVfNsL-IsJAaetF9yPOU-
SEO5PZfYsNis3jDptA3FnHsJ39fki4iqqzfa8bS3aREzMDiVF3cGeJ4MfM&sa=X&ved=2ahUKEwirscm
viLaJAxVHxjgGHf0TInMQtKgLegQIEBAB&biw=1396&bih=663&dpr=1.38#imgrc=wfUePMzdgaCTt
M&imgdii=Dc7FbBn9I_XzqM
https://www.lawyersclubindia.com/articles/classification-of-cybercrimes--1484.asp
16
Annexure I- Newspaper reports
17
18
19
20
21
22
23
24
25
26
27
Annexure II- Survey Reports
28
29
30
31
32
33
34
35