Cyber Crimes

 Cyber Crimes


The current world is digital world. To cope with the digitalized world, people are forced to use internet for all types of services. On the other hand digitalization also brought unprecedented threats, cybercrime. Cybercrime is a crime attempted through a computer for crime like hacking, spamming, phishing etc. Cybercriminals or Hackers use the internet to hack user’s personal computers, smart phone data, and personal details from social media, business secrets, national secrets etc.

Cybercrime is growing rapidly and many people have become victims. Various categories of harassment take place in cyberspace. Cybercrime, being a burning issue across the globe, many countries have implemented laws and other regulatory mechanisms in an attempt to minimize cybercrime. The government working hard to fight against this.




Forms of Cyber Crimes


Any crime that takes place online referred  as cybercrime. Cybercrime can range from security breaches to identity theft.

1. Crime against Individuals: Person/Property


Against Individuals Person: - Harassment via electronic mails, dissemination of obscene material, cyber-stalking, defamation and fraud etc.

Against Individual Property: - Computer vandalism, transmission of virus, control over computer system, intellectual property thefts etc.

2. Crime against Organization: Government/Firm/Company/Group of Individuals

Against Organization: - Unauthorized access / control over computer system, distribution of Pirate software.

3. Crime against Society

Against Society: - Pornography, sale of illegal articles, trafficking, forgery, online gambling.


Terminology


Phishing: using fake email messages to get personal information from internet users.

Misusing personal information (identity theft): accessing data about a person’s bank account, credit cards, debit card and other sensitive information to buy things online in the victim’s name.

Hacking: personal or sensitive information can be accessed. The criminal uses a variety of software to crack a person’s computer and the person may not be aware that his computer has been accessed from a remote location.

Distributing pornography: internet is being highly used to abuse anybody sexually worldwide.

Piracy or Theft: occurs when a person violates copyrights and downloads music, movies, games, and software.

Computer Vandalism: a type of malicious behavior, involves creation of malicious programs to perform harmful tasks such as erasing hard drive data or extracting login credentials.

Malicious Software: Internet-based programs used to gain access to  a system to steal sensitive information or damaging to software present in the system.

Causes of Cybercrime

Easy access – many possibilities of breach due to the complex technology.

Store data in comparatively small space – makes easier to steal data and use  them for own profit.

Complex – The computers run on operating systems those are programmed of millions of codes. The human mind is imperfect, leads to mistakes at any stage and become prey for cybercriminals.

Loss of evidence – Data related to the crime can be easily destroyed. Loss of evidence has become a very common problem that paralyzes the system behind the investigation.

Combating Cybercrimes


To combat cybercrime, establishment of multidimensional public-private collaborations needed between law enforcement agencies, information technology industry, information security organizations, internet companies, and financial institutions.

Cybercrime can be particularly difficult to investigate and prosecute as it often crosses legal and even international boundaries. However an investigation tends to start with an IP Address trace, though that is not sufficient to solve a case.

Enforcement of strong law and setting high penalties.

Government of India under National Mission for the safety of women facilitate victims to report cybercrime online through cybercrime reporting portal.

Law enforcement agency (local police department) has an obligation to assist the victims.

The Internet Crime Complaint Center (IC3) thoroughly reviews and evaluates the complaints and refers to the appropriate federal, state, local or international law enforcement/ regulatory agency that has jurisdiction over the matter. IC3 is a partnership between the Federal Bureau of Investigation and the National White Collar Crime Center (funded, in part, by the Department of Justice’s Bureau of Justice Assistance).

Federal Trade Commission (FTC) is a secure online database, used by civil and criminal law enforcement authorities worldwide to detect patterns of wrong- doing, leading to investigations and prosecutions. It does not resolve complaints but operate the Consumer Sentinel and provides resources for victims, businesses and law enforcement.

Local victim services provider: these providers offer information, emotional support and advocacy as needed.

Collect and keep evidence to provide them for investigation. The evidences may be a cancelled check, certified or other mail receipts, chat room text, credit card receipts, received envelopes, social media messages, money order receipts, pamphlets or brochures, phone bills, printed or preferably electronic copies of emails/web pages etc.

Complete Termination of Online Session: - Closing the browser window or typing in a new website address without log in gout may give others a chance of gaining access to account information. Always terminate online session by clicking on the "Log out or Sign Out" button. Avoid using the option of "remember" your username and password information.

Create Backup of Important Data: - Backup of all the important files  whether personal or professional should be created. Getting used to back up files regularly is the first step towards security of personal computer. Protect data by using encryption for most sensitive files such as financial records and tax returns.

Use Security Programs: - If system does not have data protection software to protect online, then buy internet security program for the computer. Nowadays, almost all new computer systems come with some kind of security programs installed.

Use Strong Passwords: Maintain different password and username combinations for each account and resist the temptation to write them down. Weak passwords can be easily cracked using certain attacking methods like Brute force attack, Rainbow table attack etc. Try creating a password that  consists of a combination of letters (both upper and lower case), numbers and special characters. Password should be changed regularly. Do not share password with others.

Be social media savvy: Be sure to keep social networking profiles (Face book, Twitter, YouTube, etc.) are set to private. Beware of what information posting online, once it is on the internet it is there forever.

Secure Devices: Be sure to download applications only from trusted sources and keep operating system up-to-date, install anti-virus software and use a secure lock screen as well to prevent access of personal information.

Protect identity: Be cautious when sharing personal ID such as name, address, phone number and/or financial information on the internet. Be sure websites are secure when making online purchases.

Keep computer updated: By regularly updating computer, one can block attackers from being able to take advantage of software vulnerabilities. Security software essentials include firewall and antivirus programs. A firewall is usually computer’s first line of defense. Most internet browsers and Internet service providers provide a spam-blocking feature to prevent unwanted messages, such as fraudulent emails and phishing emails, from getting into inbox. However, every user must ensure to turn them on and do not turn them off. Also, users must install and keep up-to-date antivirus programs, firewalls and spyware checkers and make sure that they run the scans regularly.

Call the right person for help: Try not to panic if become a victim. Just like any other crime report to local police. There are many websites to get help on cybercrime such as https://digitalpolice.gov.in, http://www.cybercrimehelpline.com

Use Own Computer: - It's generally safer to access financial accounts from own computer only. If using  some others computer, always delete all the "Temporary Internet Files", and clear all "History" after logging off account.

Using Email: - A simple rule in using email is not to open any links in emails from stranger. Hackers do use E- mail as the main target seeking to steal personal information, financial data, security codes and other. Do not use the link sent. If need to access to any website, visit the website by typing the address in menu bar. Use secure website search, look for URL's that starts with “https”.


Cybercrimes will always be an ongoing challenge. Understanding the threat of cybercrimes is mandatory because technology holds a great impact on society as a whole. Cybercrime is growing every day since technological advancing and makes it very easy for anyone to steal without physically harming anyone. Cybercriminals are evolving in terms of computer knowledge per technological advancement made thus it is almost impossible to reduce cybercrime from the cyber-space. It is therefore recommend that every individuals and businesses need to make sure they are educated on what to do in terms of prevent in becoming the next victim of cybercrimes. This basic awareness can help prevent potential cybercrimes against them.



Comments

  1. Amazing work!!! Really insightful!!

    ReplyDelete
  2. Jo dost bharose wale hote hain na woh bosdiwale bhi hote hain

    ReplyDelete
  3. Amazing work ๐Ÿ™Œ๐Ÿ‘Œ

    ReplyDelete

Post a Comment

Popular posts from this blog

Youth Internet Safety