Pages

Tuesday, 28 April 2020

Cyber Crimes

Hello friends, My today's topic of  Basic Gyaan is about "Cyber Crimes".

     The increasing use of computer and Internet has taken us far ahead in the technical field. Today our daily life is largely dependent on it. Today there is no shortage of opportunities due to rapid technological growth and development. But these technologies have also brought many financial and security threats with them, which you should know about. In this post we will know what is Cyber ​​Crime. Also Know about latest communication technologies


      So the only way to protect yourself from the effect of Cybercrimes is that you should have knowledge about them. In this post, we will know in detail what is cybercrime? You will also learn about the types of cybercrime as well as how to avoid cyber threats.


What is CyberCrimes?

      Cybercrime word is used to widely describe criminal activity in which computer and internet is a tool, a target, or a place of criminal activity and it includes everything from electronic crash to denial of service attacks. cybercrime is also used to include classic crimes in which computers or internet are used to enable the illegal activity [12]. Usage of Internet has become a day to day routine for bulk of people for everyday activities. By end of 2016, there are going to be 462,124,989 internet users in India with a penetration of 34.8% sharing around 13.5% share of World Internet Users [8]. 




      Cyber Law took place in order to take control over the crimes committed through the computer networks or the cyberspace or through the uses of computer devices.  Description of the legal issues that are related to the uses of communication technology can be called as Cyber Law. Cyber law performs a very important role in this new era of technology. It is important as it is concerned to almost all facets of activities and transactions that take place either on the internet or other communication technology. Whether we are aware of it or not, but each action and each reaction in Cyberspace has some legal and Cyber legal views [5].  Cyber law deals with all the online transactions, activities going on the internet and cyberspace. Every action in cyberspace has cyber legal perspective. There are various cyber laws issues associated at every point of time [9].


Cyber crimes basic classification :

I. Hacking:

Hacking is identifying deficiency in computer networks to exploit its weaknesses to achieve access [9].




II. Child Pornography: 

Child pornography is pornography that exploits children for sexual incentive by child abuse images. It may be composed with the direct involvement or sexual assault of a child or it may be simulated child pornography [13]. 




III. Cyber Stalking: 

Cyber stalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging, or messages posted to a Web site or a discussion group [3].





IV.Denial of service Attack: 

A Denial of Service attack is an attack meant to shut down a computer or computer networks, making it inaccessible to its intended users. Denial of Service attacks achieve this by flooding the target with traffic, or sending it data that triggers a crash. [10].

V. Virus Dissemination: 

Malicious software that attaches itself to other software [2].




VI. Software Piracy: 

Theft of software through the illegal copying of genuine programs and distribution of products without any legal rights [10].

VII. IRC Crime: 

Internet Relay Chat (IRC) allow the people around the world to come together under a single platform which is sometime called as chat rooms and they chat to each other. Cyber Criminals basically uses it for meeting and Hacker uses it for discussing their techniques [5].

VIII. Credit Card Fraud:

The unlawful and illegal use of a credit card to purchase property [12].




IX. Net Extortion: 

Copying the company confidential data in order to demand money from them [14].

X. Phishing: 

Phishing attacks are the process of sending fraudulent communications that present to come from a trustworthy source. It is mostly done through email. The intention is to take sensitive data like credit card and login information, or to install virus on the victim’s device [16]. 



       Today information technology is affecting us as individual and as a society. Information technology mainly stands on both the hardware and the software of a computer and its tele-communication infrastructure. But this is only one aspect of the information technology, today the other aspects are the challenges for the whole world like cybercrimes and more over cyber terrorisms. When the founding father was developing internet, he hardly had any linking that internet could transform itself into an all extending revolution which could be misused for criminal activities and which required rules for its regulations.




                The exploitation of the technology has lead the need of employment of the cyber laws but whether this cyber laws are capable to control the cybercrime activities.


References :

  1.  I. Navalagund, “Cybercrimes In India : Knowledge and Awareness Among Advocates , Suggested Remedial Measures,” Our Heritage,  no. 1, 2020.
  2.      M. S. Aravazhi, “UNDERSTANDING CYBER CRIME AND CYBER LAUNDERING : THREAT AND SOLUTION EPRA,” International Journal of Research and Development ( IJRD ), vol. 7838, no. January, 2020.
  3. E. Verma, “From Awareness To Action : a Cyber Security Agenda in Digital Age,” International Journal of Enhanced Research in Management & Computer Applications, vol. 07, issue 3, pp. 794–801,  2018.
  4.  P. Rao, “Emerging Laws for Cyber-crime and Cyber security in India : Information Technology Act , 2000,” vol. 21, no. 16, pp. 248–251, 2019.
  5.  A. Sarmah, R. Sarmah, and A. J. Baruah, “A brief study on Cyber Crime and Cyber Law ’s of India,” Int. Res. J. Eng. Technol., vol. 4, no. 6, 2017.
  6.  J. Jain and P. Ram Pal, “A Recent Study over Cyber Security and its Elements,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 3, pp. 791–793, 2017.
  7. B. M. Iqbal, Juneed; Beigh, “Cybercrime in India : Trends and Challenges,” Int. J. Innov. Adv. Comput. Sci., vol. 6, no. 12, pp. 187–196, 2017.
  8. [8]      J. Shah, “A Study of Awareness About Cyber Laws for Indian Youth,” Int. J. Trend Sci. Res. Dev., vol. Volume-1, no. Issue-1, pp. 10–16, 2016.
  9. G. Aggarwal, “General Awareness on Cyber Crime,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 5, issue no. 8, pp. 204–206, 2015.
  10. E. Ramdinmawii, S. Ghisingh, and U. M. Sharma, “A Study on the Cyber-Crime and Cyber Criminals: A Global Problem,” Int. J. Web Technol., vol. 004, no. 001, pp. 7–11, 2015.
  11. R. Broadhurst, P. Grabosky, M. Alazab, and S. Chon, “Organizations and cyber crime: An analysis of the nature of groups engaged in cyber crime,” Int. J. Cyber Criminol., vol. 8, no. 1, pp. 1–20, 2014.
  12. S. Das and T. Nayak, “Impact of Cyber Crime: Issues and Challenges,” Int. J. Eng. Sci. Emerg. Technol., vol. 6, no. 2, pp. 142–153, 2013.
  13. V. Kandpal and R. K. Singh, “Latest Face of Cybercrime and Its Prevention In India,” International Journal of Basic and Applied Sciences,  vol. 2, no. 4, pp. 150–156, 2013.
  14. [14]   B. Sahu, S. K. Sahu, N. Sahu, and P. Sahu, “Identify uncertainty of cyber crime and cyber laws,” Proc. - 2013 Int. Conf. Commun. Syst. Netw. Technol. CSNT 2013, pp. 450–452, 2013.
  15. S. Jeet, “Criminal Law Cyber crimes against women in India : Information Technology Act , 2000,” vol. 47, pp. 8891–8895, 2012.
  16. V. K. Gandhi, “An overview study on Cyber Crimes in Internet,” J. Inf. Eng. Appl., vol. 2, no. 1, pp. 1–6, 2012.
  17. A. Gillespie, “Cyber-bullying and harassment of teenagers: The legal response,” J. Soc. Welf. Fam. Law, vol. 28, no. 2, pp. 123–136, 2006.
  18. "Cabinet approves Personal Data Protection Bill", The Hindu, PTI, 4 December 2019, ISSN 0971-751X, Retrieved 4 December 2019.
  19. “Notification under IT(Amendment) Act, 2008”, Ministry of Electornics & IT, Government of India, Retrieved 20 January 2020.


                              Know about digital photos


                                                                   click here

                                                               know about IOT


                           Click here for Current Awareness daily updates

                        Click here for wide range of Bicycles





1 comment: