Hello friends, My today's topic of Basic Gyaan is about "Cyber Crimes".
Know about digital photos
click here
know about IOT
Click here for Current Awareness daily updates
Click here for wide range of Bicycles
The increasing use of computer and Internet has taken us far ahead in the technical field. Today our daily life is largely dependent on it. Today there is no shortage of opportunities due to rapid technological growth and development. But these technologies have also brought many financial and security threats with them, which you should know about. In this post we will know what is Cyber Crime. Also Know about latest communication technologies
So the only way to protect yourself from the effect of Cybercrimes is that you should have knowledge about them. In this post, we will know in detail what is cybercrime? You will also learn about the types of cybercrime as well as how to avoid cyber threats.
What is CyberCrimes?
Cybercrime word
is used to widely describe criminal activity in which computer and internet is
a tool, a target, or a place of criminal activity and it includes everything
from electronic crash to denial of service attacks. cybercrime is also used to
include classic crimes in which computers or internet are used to enable the
illegal activity [12]. Usage of Internet has become a day to day routine for
bulk of people for everyday activities. By end of 2016, there are going to be
462,124,989 internet users in India with a penetration of 34.8% sharing around
13.5% share of World Internet Users [8].
Cyber Law took place
in order to take control over the crimes committed through the computer
networks or the cyberspace or through the uses of computer devices. Description of the legal issues that are
related to the uses of communication technology can be called as Cyber Law.
Cyber law performs a very important role in this new era of technology. It is
important as it is concerned to almost all facets of activities and
transactions that take place either on the internet or other communication
technology. Whether we are aware of it or not, but each action and each
reaction in Cyberspace has some legal and Cyber legal views [5]. Cyber law deals with all the online
transactions, activities going on the internet and cyberspace. Every action in
cyberspace has cyber legal perspective. There are various cyber laws issues
associated at every point of time [9].
Cyber crimes basic classification :
I. Hacking:
Hacking is identifying deficiency in computer networks to exploit its weaknesses to achieve access [9].
Hacking is identifying deficiency in computer networks to exploit its weaknesses to achieve access [9].
II. Child Pornography:
Child pornography is pornography that exploits children for sexual incentive by child abuse images. It may be composed with the direct involvement or sexual assault of a child or it may be simulated child pornography [13].
Child pornography is pornography that exploits children for sexual incentive by child abuse images. It may be composed with the direct involvement or sexual assault of a child or it may be simulated child pornography [13].
III. Cyber Stalking:
Cyber stalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging, or messages posted to a Web site or a discussion group [3].
Cyber stalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging, or messages posted to a Web site or a discussion group [3].
IV.Denial of service Attack:
A Denial of Service attack is an attack meant to shut down a computer or computer networks, making it inaccessible to its intended users. Denial of Service attacks achieve this by flooding the target with traffic, or sending it data that triggers a crash. [10].
A Denial of Service attack is an attack meant to shut down a computer or computer networks, making it inaccessible to its intended users. Denial of Service attacks achieve this by flooding the target with traffic, or sending it data that triggers a crash. [10].
VI.
Software Piracy:
Theft of software through the illegal copying of genuine programs and distribution of products without any legal rights [10].
Theft of software through the illegal copying of genuine programs and distribution of products without any legal rights [10].
VII. IRC Crime:
Internet Relay Chat (IRC) allow the people around the world to come together under a single platform which is sometime called as chat rooms and they chat to each other. Cyber Criminals basically uses it for meeting and Hacker uses it for discussing their techniques [5].
Internet Relay Chat (IRC) allow the people around the world to come together under a single platform which is sometime called as chat rooms and they chat to each other. Cyber Criminals basically uses it for meeting and Hacker uses it for discussing their techniques [5].
IX. Net Extortion:
Copying the company confidential data in order to demand money from them [14].
Copying the company confidential data in order to demand money from them [14].
X.
Phishing:
Phishing attacks are the process of sending fraudulent communications that present to come from a trustworthy source. It is mostly done through email. The intention is to take sensitive data like credit card and login information, or to install virus on the victim’s device [16].
Phishing attacks are the process of sending fraudulent communications that present to come from a trustworthy source. It is mostly done through email. The intention is to take sensitive data like credit card and login information, or to install virus on the victim’s device [16].
Today
information technology is affecting us as individual and as a society.
Information technology mainly stands on both the hardware and the software of a
computer and its tele-communication infrastructure. But this is only one aspect
of the information technology, today the other aspects are the challenges for
the whole world like cybercrimes and more over cyber terrorisms. When the
founding father was developing internet, he hardly had any linking that
internet could transform itself into an all extending revolution which could be
misused for criminal activities and which required rules for its regulations.
The exploitation of the
technology has lead the need of employment of the cyber laws but whether this
cyber laws are capable to control the cybercrime activities.
References :
- I. Navalagund, “Cybercrimes In India : Knowledge and Awareness Among Advocates , Suggested Remedial Measures,” Our Heritage, no. 1, 2020.
- M. S. Aravazhi, “UNDERSTANDING CYBER CRIME AND CYBER LAUNDERING : THREAT AND SOLUTION EPRA,” International Journal of Research and Development ( IJRD ), vol. 7838, no. January, 2020.
- E. Verma, “From Awareness To Action : a Cyber Security Agenda in Digital Age,” International Journal of Enhanced Research in Management & Computer Applications, vol. 07, issue 3, pp. 794–801, 2018.
- P. Rao, “Emerging Laws for Cyber-crime and Cyber security in India : Information Technology Act , 2000,” vol. 21, no. 16, pp. 248–251, 2019.
- A. Sarmah, R. Sarmah, and A. J. Baruah, “A brief study on Cyber Crime and Cyber Law ’s of India,” Int. Res. J. Eng. Technol., vol. 4, no. 6, 2017.
- J. Jain and P. Ram Pal, “A Recent Study over Cyber Security and its Elements,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 3, pp. 791–793, 2017.
- B. M. Iqbal, Juneed; Beigh, “Cybercrime in India : Trends and Challenges,” Int. J. Innov. Adv. Comput. Sci., vol. 6, no. 12, pp. 187–196, 2017.
- [8] J. Shah, “A Study of Awareness About Cyber Laws for Indian Youth,” Int. J. Trend Sci. Res. Dev., vol. Volume-1, no. Issue-1, pp. 10–16, 2016.
- G. Aggarwal, “General Awareness on Cyber Crime,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 5, issue no. 8, pp. 204–206, 2015.
- E. Ramdinmawii, S. Ghisingh, and U. M. Sharma, “A Study on the Cyber-Crime and Cyber Criminals: A Global Problem,” Int. J. Web Technol., vol. 004, no. 001, pp. 7–11, 2015.
- R. Broadhurst, P. Grabosky, M. Alazab, and S. Chon, “Organizations and cyber crime: An analysis of the nature of groups engaged in cyber crime,” Int. J. Cyber Criminol., vol. 8, no. 1, pp. 1–20, 2014.
- S. Das and T. Nayak, “Impact of Cyber Crime: Issues and Challenges,” Int. J. Eng. Sci. Emerg. Technol., vol. 6, no. 2, pp. 142–153, 2013.
- V. Kandpal and R. K. Singh, “Latest Face of Cybercrime and Its Prevention In India,” International Journal of Basic and Applied Sciences, vol. 2, no. 4, pp. 150–156, 2013.
- [14] B. Sahu, S. K. Sahu, N. Sahu, and P. Sahu, “Identify uncertainty of cyber crime and cyber laws,” Proc. - 2013 Int. Conf. Commun. Syst. Netw. Technol. CSNT 2013, pp. 450–452, 2013.
- S. Jeet, “Criminal Law Cyber crimes against women in India : Information Technology Act , 2000,” vol. 47, pp. 8891–8895, 2012.
- V. K. Gandhi, “An overview study on Cyber Crimes in Internet,” J. Inf. Eng. Appl., vol. 2, no. 1, pp. 1–6, 2012.
- A. Gillespie, “Cyber-bullying and harassment of teenagers: The legal response,” J. Soc. Welf. Fam. Law, vol. 28, no. 2, pp. 123–136, 2006.
- "Cabinet approves Personal Data Protection Bill", The Hindu, PTI, 4 December 2019, ISSN 0971-751X, Retrieved 4 December 2019.
- “Notification under IT(Amendment) Act, 2008”, Ministry of Electornics & IT, Government of India, Retrieved 20 January 2020.
Know about digital photos
click here
know about IOT
Click here for Current Awareness daily updates
Click here for wide range of Bicycles