Cyber Crime

N kavya

Cybercrime is any criminal activity that involves a computer, networked device, or network. cybercrimes are carried out to generate profit for the cybercriminals, some cybercrimes are carried out against computers or devices directly to damage or disable them. Others use computers or networks to spread malware, illegal information, images, or other materials. Some cybercrimes do both — i.e., target computers to infect them with a computer virus, which is then spread to other machines and, sometimes, entire networks. A primary effect of cybercrime is financial. Cybercrime can include many types of profit-driven criminal activity, including ransomware attacks, email and internet fraud, identity fraud, and attempts to steal financial accounts, credit cards, or other payment card information. Cybercriminals may target an individual’s private information or corporate data for theft and resale. As many workers settle into remote work routines due to the pandemic, cybercrimes are expected to grow in frequency in 2021, making it especially important to back up the data.

The U.S. Department of Justice (DDJ) divides cybercrime into three categories :
1. Crimes in which the computing device is the target
2. Crimes in which the computer is used as a weapon
3. Crimes in which the computer is used as an accessory to a crime

Cybercriminal activity may be carried out by individuals or groups with relatively little technical skill, or by highly organized global criminal groups that may include skilled developers and others with relevant expertise. Cybercriminals often choose to operate in countries with weak or non-existent cybercrime laws to further reduce the chances of detection and prosecution.

Types of Cybercrime -:

1. Cyberextortion: A crime involving an attack or threat of an attack coupled with a demand for money to stop the attack.
2. Crypto-jacking: An attack that uses scripts to mine cryptocurrencies within browsers without the user’s consent.
3. Identity Theft: An attack that occurs when an individual accesses a computer to glean a user’s personal information, which they then use to steal that person’s identity or access their valuable accounts, such as banking and credit cards.
4. Credit card Fraud: An attack occurs when hackers infiltrate retailers’ systems to get their customers’ credit card and/or banking information.
5. Cyber espionage: A crime involving a cyber-criminal who hacks into systems or networks to gain access to confidential information held by a government or other organization.
6. Software-Piracy: An attack that involves the unlawful copying, distribution, and use of software programs with the intention of commercial or personal use.
7. Ransomware attacks are similar, but the malware acts by encrypting or shutting down victim systems until a ransom is paid.
8. Phishing: The most common type of cybercrime as reported to the U.S. Internet Crime Complaint Centre was phishing and similar fraud.
9. Website Spoofing & IOT Hacking.

Cybercrime & Its Impact on Society – : On an individual level, a cyber-attack can lead to a variety of consequences, ranging from theft of personal information to extortion of money or loss of valuable data, such as family photos. Society and systems depend on critical infrastructures, such as power plants, hospitals, and financial services companies. The protection of these and other organizations is essential for the maintenance of our society and support of the relations between countries and international organizations.

How to prevent Cyber Crime –:

Backup all data, system, and considerations: This enables data stored earlier to assist businesses in recovering from an unplanned event.


• Enforce concrete security and keep it up to date: Choose a firewall with features that protect against malicious hackers, malware, and viruses. This enables businesses to identify and respond to threats more quickly.


• Never give out personal information to a stranger: They can use the information to commit fraud.


• Check security settings to prevent cybercrime: A cyber firewall checks your network settings to see if anyone has logged into your computer.


• Using antivirus software: Using antivirus software helps to recognize any threat or malware before it infects the computer system. Never use cracked software as it may impose the serious risk of data loss or malware attack.


• When visiting unauthorized websites, keep your information secure: Using phishing websites, information can easily bypass the data.


• Use virtual private networks (VPNs): VPNs enable us to hide our IP addresses.


• Restriction on access to your most valuable data: Make a folder, if possible, so that no one can see confidential documents.

Cyber Crimes

When crime is committed on internet, it is known as cyber crime. There are various types of cyber crime some of them are listed below :-

  1. Hacking :- Gaining data about someone’s private and sensitive information by doing access to their computer system illegally is known as hacking.
  2. Theft :- Theft occurs when a person downloads music, movie, games and software by violating copyright.
  3. Cyber Stalking :- When someone’s receive unwanted abusive online messages and emails is known as cyber stalking.
  4. Malicious Software :- These are internet-based software or programs known as pirated software that are used to disrupts proper functioning of the network.
  5. Defamation :- It is a cyber crime with the intent of lowering the dignity of someone by hacking into their email account and sending mails using vulgar language to unknown person’s account.

CYBER CRIME : CLASSIFICATION AND IMPACTS

INTRODUCTION

Cyber ​​crime can be termed as illegal use of the internet and computers. Computers can be victims of crime or be used as a criminal weapon. This crime has become a regular part of our daily lives. Every day one person or another becomes a victim of cyber crime. The Internet is accessed by many people at the same time for various purposes, and these hackers are making a way out of these opportunities.

TYPES OF CYBER CRIME

1)Identity theft – This involves obtaining personal information about the user by sending unsolicited emails or by using a criminal website to steal sensitive information similar to an authorized website.
2)Identity Theft – This involves obtaining information about credit or debit cards or banking details, some unwanted payments can be easily deducted after hacking.
3)Malware Attack – Malware is a malicious software designed to damage computers or systems. This is done to gain credible information or to commit certain crimes through the system.
4)ATM Fraud – The ATM machine has been completely stolen in this case. Criminals have developed a way to access all the information on the card and pin, continuously succeeding in duplicating the cards and using the same to withdraw money.
5)Cyber ​​Stalking – A criminal is involved in tracking that person through online actions. They can even send malware to damage systems to get specific information. Includes user abuse.
6)Pornography – The act of introducing a sexual activity containing a video, through sexual websites.
7)Download – In this case, the email was received and appears to be from a real source, but it is not the same. It’s broken.
8)Criminal crime – Unauthorized access to confidential information. Many times when government websites are hacked and corrupted files contain important information.

AWARNESS

1)Strong passwords should be used. Password should be complex, you might guess.
2)Use antivirus programs to keep the system free of malware.
3)Continue to update the program.
4)Be aware of and use the presence of intelligence to prevent identity theft.
5)Let your children know online, so that they can report any abuse or abuse when they pass.
6)Keep privacy settings on social media.

CYBER SECURITY

Cyber ​​security protects our system, network, devices and programs from malicious software attacks. Illegal data acquisition can therefore be suspended.

Importance – Information relating to any significant national problem or other data intended for personal use, if shared will create a number of problems. Therefore in the event of a multi-level security test, important data and data can be retained in the leak.

TYPES OF SECURITY THREATS

1)Network Security – Protects the network from malware attacks and thus uses a secure network.
2)Cloud security – Means data protection from cloud resources.
3)Information security – Helps protect data from unauthorized or illegal access.
4)End User Safety – User should be aware of when installing any external devices in the system, opening any emails or links.
5)Application security – helps keep the system and software safe.

CONCLUSION

Cyber ​​crime is spreading its arms day by day. The safest way to avoid becoming a victim of its ill effects is to follow safety precautions. There are various ways in which we can protect our confidential information from being disclosed. We should always focus on awareness as – ‘Prevention is better than cure’, especially if there is no cure.