Cyber crime is emerging as a very serious threat in today's world. The Internet brings happiness into our lives but at the same time it also has some negative sides. Cybercriminal is always looking for new ways to attack possible Internet victims. The new generation is growing up with computers and the most important thing is that all monetary transactions are moving to the Internet. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get Original Essay So, it has become very important for us to be aware of the various cyber crimes committed with the help of computers. Cybercrime is defined as “illicit activity carried out using the computer system and the Internet” punishable by law. With the increasing penetration of the Internet, cybercrimes have also increased in recent years. Between 2011 and 2015, the number of cybercrimes recorded in the country increased fivefold. In Maharashtra and Uttar Pradesh alone, 1/3 of these crimes occurred. Cybercrime in India is registered under three criteria, the IT Act, the Indian Penal Code (IPC) and other state level legislations (SLL). With the increasing penetration of mobile telephony and internet in the country, cyber crimes have also increased commensurately. Between 2011 and 2015, more than 32,000 cyber crimes were reported across the country. More than 24,000 cases have been registered under the IT Act and the remaining under various sections of the IPC and other state-level legislations. Any criminal activity that uses a computer as a tool, target or means to perpetuate crimes falls under the category of cyber crimes. The first cybercrime was recorded in 1820 in France. Cybercrime has been a problem since the late 1970s. The first spam email dates back to 1978, and the first virus was installed on Apple computer in 1982. Around 2000 complaints related to cybercrime were received in 2006, and the main reasons for those complaints were financial fraud, viruses, and hackers. There has also been a steady increase in the number of children exposed to unwanted pornography, Internet harassment and bullying. Computer crime, also called computer crime, is the use of a computer as a tool for ulterior illegal purposes, such as committing fraud, child pornography, identity theft, invasion of privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government. Cybercrime mainly consists of unauthorized access to computer systems, alteration of data, destruction of data, theft of intellectual property. Most cybercrime involves an attack on the information of individuals, companies, or governments. Although the attacks do not take place against a physical body, they do take place on the personal or corporate virtual body, which is the set of information attributes that define people and institutions on the Internet. Cybercrime also includes non-pecuniary crimes such as creating and distributing viruses on other computers or publishing confidential company information on the Internet. Types of Cyber Crime When a crime is committed on the Internet it is called a cyber crime. There are many types of cyber crimes and the most common ones are: Hacking: This is a type of cyber crime where a person's computer is hacked so that their personal or sensitive information can be accessed. In India, hacking is classified as a crimeand it is punishable. This is different from ethical hacking, which many organizations use to test their Internet security protection. In hacking, the criminal uses a variety of software to access a person's computer, and the person may not realize that their computer is being accessed from a remote location. Theft This crime occurs when a person violates copyrights and downloads music, videos, films and games. There are also peer-sharing websites that encourage software piracy, and many of these websites are now being targeted by the government. Cyber Stalking This is a kind of online harassment where the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk them. Identity Theft This has become a major problem for people who use the Internet for cash transactions and banking services. In this cybercrime, the criminal accesses a person's bank account, credit card, Social Security, debit card, and other sensitive information to obtain money or purchase items online in the victim's name. It can lead to serious financial losses for the victim and even ruin the victim's credit history. Malicious softwareThis is Internet-based software or programs used to disrupt a network. The software is used to access a computer system to steal sensitive information or data or cause damage to the software on the system. Child Solicitation and Abuse This is also a type of cybercrime where criminals solicit minors via chat rooms for the purpose of child pornography. The government has spent a lot of time monitoring chat rooms frequented by children with the hope of reducing and preventing child abuse and grooming. Spam and PhishingSpamming and phishing are two very common forms of computer crimes. There's not much you can do to control them. Spam is basically unwanted emails and messages. Phishing is a method in which cybercriminals offer a bait so that you can capture them and provide the information they want. The bait can take the form of a commercial proposal, the announcement of a lottery you have never signed up for and anything that promises you money for nothing or a small favor. Social engineering is a method by which cybercriminals contact you directly using emails or telephones, especially the latter. They try to gain your trust, and once they succeed, they get the information they need. This information can be about you, your money, your company where you work, or anything that could be of interest to cyber criminals. Characteristics of Cybercrime Physical presence required No territorial boundaries Wider outcome Low risk – high rewards Anonymity and openness Lack of awareness among victims Victims refrain from reporting cases No violence is involved Lack of tangible evidence Lack of technical expertise high. Tasks of the cyber expert Identification of the peculiarities of cyber evidence Understanding of cyber evidence Discovery of cyber evidence Preservation of cyber evidence Search, seizure and collection of cyber evidence Protection of cyber evidence Electronic surveillance General awareness Do not delete malicious communications (emails, chat logs , post). These can help provide vital information about the person's identity.l Remember that all other Internet users are strangers. You don't know who you're chatting with.l Be very careful about how you share your personal information online.l Dobeware of all emails and SMS from any stranger regarding lottery prizes, UK jobs and huge riches.l Make sure your WIFI network is secure and use a strong password. Never share your passwords with anyone. Change your password frequently using a combination of letters, numbers and special characters.l Don't forget to log out of your email or any other account.l Never reveal your personal information to strangers during online chats.l Never make transactions online in unsecured sites.l Never follow links to banking websites from another website or email, type it manually into the address bar.l Never open spam emails as they contain viruses or spyware. Enable spam filters in your inboxes.l Never post sensitive information on social networks and dating sites.l Don't answer calls asking for credit card details. Tips for Better Security Use strong passwords. Choose passwords that are difficult or impossible to guess. Provide different passwords for all other accounts. Make a regular backup of critical data. The backup must be done at least once a day. At least once a month you should check your backup media.l Use antivirus software and update it regularly.l Use a firewall. Firewalls are generally software products. They are essential for those who keep their computers online via popular broadband and cable modem connections. Don't keep computers online when not in use. Turn them off or physically disconnect them from the Internet. Cybercrime Prevention Children should not provide their identifying information such as name, home address, school name, phone number in the chat room. They should also be warned not to give their photographs to anyone, and not to respond to obscene, threatening or suggestive messages. l Parents should use content filtering software on their computers so that their children are protected from pornography, gambling, drugs and alcohol. The software can also be installed to establish time recordings, i.e. block their use after a certain time. Parents should also visit the sites their children visit. l Store backup volumes so that data is not lost in the event of virus contamination. l Always use the latest and most updated antivirus software to protect yourself from virus attacks. l Never send your credit card number to a site that is not secure. l Don't panic if you find something harmful. If you feel immediate physical danger, contact your local police. Also, avoid getting into heated arguments online when chatting and discussing with other users. l Be cautious about meeting the person introduced online. If you choose to meet, do it in a public place with a friend. Try to keep a record of all your communications as evidence. Organizations should implement an access control system using firewalls, which only allow authorized communications between the internal and external network. l Using a password is more common for network system security. Almost all systems are programmed to require a username and password to access the computer system. The password should be changed after a regular interval of time and should be alphanumeric and should be difficult to judge. l System managers should identify flaws, bugs and weak points in the network before intruders do. The literature review is the information found in the selected area of study. This literature review, 2000..
tags