Cyber Crimes and Privacy.

Words and expressions that barely existed 10 years prior are presently essential for our regular language, as hoodlums utilize new advancements to submit cyberattacks against governments, organizations and people. These violations know no boundaries, either physical or virtual, cause genuine mischief and posture genuine dangers to casualties around the world.

Cybercrime is advancing at an amazingly high speed, with recent fads continually arising. Cybercriminals are turning out to be more spry, abusing new advances with lightning speed, fitting their assaults utilizing new strategies, and helping out one another in manners we have not seen previously. Complex criminal organizations work across the world, planning multifaceted assaults surprisingly fast. Police should in this manner stay up with new advancements, to comprehend the conceivable outcomes they make for hoodlums and how they can be utilized as apparatuses for battling cybercrime.

There are numerous protection concerns encompassing Cybercrime when classified data is caught or revealed, legally or something else. Globally, both legislative and non-state entertainers take part in cybercrimes, including secret activities, monetary burglary, and other cross-line wrongdoings. Cybercrimes crossing worldwide boundaries and including the activities of no less than one country state are now and then alluded to as cyberwarfare. Warren Buffet portrays Cybercrime as the “number one issue with mankind.Computer extortion is any untrustworthy distortion of reality expected to let another to do or shun accomplishing something which causes misfortune. In this specific circumstance, the misrepresentation will bring about acquiring an advantage by:

Changing in an unapproved way. This requires minimal specialized ability and is a typical type of robbery by workers modifying the information before section or entering bogus information, or by entering unapproved directions or utilizing unapproved measures; Changing, obliterating, stifling, or taking yield, as a rule to hide unapproved exchanges. This is hard to distinguish , Changing or erasing put away information Government authorities and data innovation security experts have archived a huge expansion in Internet issues and worker examines since mid 2001. There is a developing worry among government offices like the Federal Bureau of Investigations (FBI) and the Central Intelligence Agency (CIA) that such interruptions are important for a coordinated exertion by cyberterrorist unfamiliar insight administrations, or different gatherings to plan potential security openings in basic frameworks. A cyberterrorist is somebody who threatens or forces an administration or an association to propel their political or social destinations by dispatching a PC based assault against computers, organizations, or the data put away on them.

Cyberterrorism, as a rule, can be characterized as a demonstration of psychological warfare submitted using the internet or PC assets (Parker 1983). Thusly, a basic publicity piece on the Internet that there will be bomb assaults during special times of year can be viewed as cyberterrorism. There are additionally hacking exercises coordinated towards people, families, coordinated by bunches inside networks, having a tendency to cause dread among individuals, exhibit power, gathering data important for demolishing people groups’ lives, burglaries, extorting, and so on.

CYBERSECURITY – AN OVERVIEW

WHAT IS CYBERSECURITY? 

Cyber Security is defined as the measures taken to safeguard the connected networks and the data related to them from any attack, damage, or unauthorized access. Every organization like educational, medical, or financial organizations store a large number of user data or many confidential data which needs to be protected from outside access. These data if not protected keeps the company’s reputation at stake. The company needs to cover up data just like we hide our personal information in our online life. Healthcare organizations have their patients’ medical reports along with some personal info. Educational institutions will have the students’ and teacher’s personal as well as academic details. Corporate companies save their employee’s private details including their pay structure and banking details. 

Nowadays, we have highly privileged data such as intellectual property, patents, copyrights, etc… which have to be maintained as a secret from other competitive organizations. Losing this kind of information will affect the organization’s future on a large scale. With the advent Internet of Things (IoT), we have a lot more data to be managed and secured as we have widened the storage services through cloud and virtualization. This has given rise to a new stream called Big Data, which covers large volumes of data related to business and technology. 

WHY IT IS NEEDED?

All these details are confidential and need to be covered up from the external world so that no one could take easy advantage of them. Whenever we engage in any websites that have access to our data like name, age, or photos, the information will also be saved in the website’s server which allows the hackers to access the data. When the hackers see something beneficial in you, they use this data to threaten you to get something like ransom in return. Some steal this info to use your identity faking as their own. This may harm an individual or a whole company very badly. This summarizes the need for cybersecurity and the increase in scope for the field.

CIA TRIAD

  • CONFIDENTIALITY – Also known as privacy, this deals with restricting unknown access by using authentication encryption. Various methods used here are data encryption, two-factor authentication, biometrics and Username, ID, and password. 
  • INTEGRITY – This ensures accuracy and consistency even after unauthorized access. It is done by bringing in file permissions, version history, and backups. Checksum uses hashing algorithms to compare the hash value before and after any changes in data. If the data remains the same, the hash value returned is also the same. But even if a minute change is done in the data, the hash value returned will not be the same. By comparing the hash values, we can ensure integrity. 
  • AVAILABILITY – Making the data available only to the authorized users and performing hardware repairs, software updates, and backups on a timely basis. Avoiding attacks by using security software that doesn’t allow malicious attacks.

TYPES OF ATTACKERS

  • AMATEURS – Sometimes called script kiddies, these people are the ones with zero or low knowledge of hacking. They just follow the instructions found on the internet out of curiosity or just try their skills out. Still the results can be highly serious.
  • HACKERS – This group of people tries to get access to computer networks. They are further classified into three.
    • WHITE HAT HACKERS – These people break into computers to find out the flaws and fix them with the prior permission of the organization.
    • BLACK HAT HACKERS – These people break into computers with malicious intent and without permission. They try to take advantage of the company’s weaknesses.
    • GREY HAT HACKERS – These people fall somewhere between white and black hat hackers. They engage in unethical things but not with the intention of harmful attacks like the black hat hackers.
  • ORGANIZED HACKERS  This category includes cybercriminals, hacktivists, terrorists, and state-sponsored attackers.

CONSEQUENCES OF HACKING

The seriousness of the consequences differs with the scenario. But on the whole, the company or the victim is the one who faces the aftermath. For example, the attacker might use phishing techniques to hack your details. There might be some attachments in the mail that seems to be genuine and on clicking that it may look legitimate and ask for your details but actually, it might be a trap of the hackers which may cost you. Another example may be Denial of Service (DoS). We often come across website traffic because a lot of users try to access it. But the overloading may be done by the attackers to shut the website down. Again, this leads to unimaginable consequences. There are many more techniques and examples to cite. 

AWARENESS

Awareness leads to prevention. We can be more cautious when we give our private information like DOB, Banking details, ID proofs on any site. We should also be aware that all our picture uploads and other things are stored in the servers which might cause some problems similar to those we come across in our day-to-day life. It is always suggested to stay intact and stealthy when it comes to our social-media life.