Cyber Crime

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

INTRODUCTION

IN THIS 21ST CENTURY EVERYONE'S LIFE IS ROAMING AROUND


INTERNET THROUGH DIFFERENT SOCIAL MEDIA PLATFORMS SUCH
AS FACEBOOK, WHATSAPP, NET-BANKING, TWITTER AND MANY
MORE, AND PEOPLE WITH CRIMINAL MINDS GETS A GREEN FLAG,
WHICH IS CYBER CRIME.
CYBERCRIME IS A CRIME THAT IS DONE WITH the assistance of PC and
organization. We can consider this is an unlawful demonstration wherein the PC
can client as apparatus or target or both. It hurts individual's monetary and security
wellbeing.
Warren Buffet depicts Cybercrime as "number one issue with humankind" and
"stances genuine dangers to mankind".
The main cybercrime occurred in 1820. The main email spam occurred in 1976.
A report distributed by Cybersecurity adventures estimate that harms endured
because of cybercrime would bring up to $6 trillion every year by 2021 and $10.5
trillion yearly by 2025.
PC wrongdoing fundamentally includes unapproved admittance to PC
frameworks information modification, information annihilation, burglary of
protected innovation. Cybercrime with regards to public safety might incorporate
hacking, customary undercover work, or data fighting and related exercises.
Cybercrime in India
• The most extreme cybercrimes zeroed in on Forgery, Fraud and Phishing
•India is the third-most designated country for Phishing assaults after the US and
the UK,
• India positioned one on the planet for creating spam,
• The significant focuses of cybercrime are social organizations and web-
based business locales,
• During June of last year more than 42 lakh Indian PCs tainted with botnet
malware
 As per the Data given by Indian Computer Emergency Response Team
(CERT-In) approx.26,100 sites were hacked during 2020.

Causes of cybercrime
o Easy to Access: The trouble behind shielding a PC from unapproved access
is that there is high likelihood of break because of compound innovation.
Programmers can take code, retina pictures, voice recorders and so on that can
simple nitwit biometric frameworks and sidestep firewalls can be used to get
numerous security frameworks.
o Capacity to store information in similarly little space: Computer can store
information at tiny space. This makes simple for individuals to take information
from other gadget and use them for their own benefit.
o Complex: The PCs chips away at working framework and these OS are
modified with a huge number of codes. So, individuals can do botches at different
stage. The digital crooks exploit these mix-ups.
o Negligence: There might be a possibility that ensuring the PC framework
individuals might make any carelessness which gives a criminal to access and
command over the PC framework.
o Loss of Evidence: The data identified with the wrongdoing can simple to
annihilated. Along these lines, loss of proof has become exceptionally normal and
clear issue which harm the framework behind the examination of digital
wrongdoing.

Types
Cybercrime can be widely portrayed as an illegal activity where electronic devices
such as computers, cell phones, and networks are affected. It is for both individuals
and businesses/organizations. The perpetrators of these crimes are attacking
businesses primarily for the sake of financial gain, vandalism or disruption. People
are also targeted by high-level fraud by compromising their cell phones or
computers. The following are some of the types of cybercrime that criminals use to
commit atrocities:
1) Phishing - This is a type of cybercrime where user data is compromised by
hacking into a mobile phone or computer. May include debit/credit card number
and other sign-in credentials. It has been found that the attacker presents itself as a
loyal business to the user. User is tricked by opening mail, text message, etc. Or
opening any anonymous connection that could lead to the installation of powerful
malware viruses. It can capture the user's digital device system and enable
attackers to access logical and valuable information that the user can use for
financial gain.
2) Identity Theft - In this type of cybercrime, personal information is compromised
such as name, contact or identification number, credit/debit card number.
Important information is available and obtained by the attackers without human
consent. So that cyber criminals can use someone else's identity to gain financial
benefits. A person whose identity has been compromised may suffer serious
consequences such as loss of a set amount. Other personal information may include
birthdate, driver's license number, PINs, fingerprints, digital signatures, etc. It can
also be used by attackers to obtain that person's financial resources.
3) Hacking - Hacking is a term widely used to describe the activity of
compromising on electronic devices such as mobile phones, computers and
networks. It is done primarily on account or system without the permission of the
authorities and therefore, illegal or data theft is committed by cyber attackers.
Nowadays, hackers do not need to have high coding skills or need a degree in
computer science to change programs, etc. They work with a variety of newly
developed methods of simplicity and simplicity to carry out those processes.
Attackers trick its users into opening anonymous links in order to obtain sensitive
information from the public.
4) Spreading hatred and promoting terrorism- It is a type of cybercrime where
cyber criminals use the internet to commit violent and horrific acts that lead to loss
of life, threats, property damage, etc. It can be due to political gain or ideological
factors. Some hackers may spread hatred and terrorism by hacking into
unauthorized networks and servers. With the disruption of networks or computer
servers, these attackers use a variety of tools such as viruses, cybercrime, and other
malicious software. Experienced cyber criminals or cyberterrorists can lead to
serious harm not only to private sector programs but also to public sector
programs. Their motives can be political, intellectual or personal to create harm
online.
5) Cyberstalking- In this type of cybercrime, criminals use the internet to harass a
person, a group. It can also hurt the organization. The main purpose of
cyberstalking is to control or influence any person for personal or financial gain.
The methods of committing these crimes can be in various ways such as false
accusations, degradation, identity theft, threats, destruction of property, etc. Any
stalker can be anonymous, stranger from social media, or someone the victim
knows.

Cyber Crime Prevention


As everyone’s life revolves around internet, we all must take some basic
precautions. There are some ways in which we can protect ourselves from being a
victim of cybercrime.

 Keep Strong passwords – Use passwords that no one can guess and try not
to save them written or recorded anywhere. Do not use any personal
information as your password. Use different symbols and numbers to keep
your password strong.

 Use security software to protect your computer – For online security,


various security software is necessary. This involves firewall which is the
front-line security of a computer and antivirus programs which keeps an eye
on all online activities like web browsing and emails.

 Set privacy on your social media accounts – Keep your private and
personal information safe. The cyber criminals can get your any information
from your social media accounts and use that for various purposes. So, the
less you provide your personal information, the better it is.

 Beware of spam emails - Do not open the links attached with unknown
emails. Do not open any URL you receive through message or email which
is asking for your personal or financial information. Almost every email
provider enables spam filters, so it would be better if you check occasionally
that this filter is working.

 Keep your mobile devices secured – Your mobile devices can also be
exposed to malicious software, hackers and various computer viruses. So it
is recommended to download any application from reliable sources only.
You should keep anti-virus installed in your device and also put a lock
screen password, so that no one can access your personal information.

 Keep your wireless network secured – Wireless networks are likely to give
way to cybercrimes if you do not keep them secured. Avoid using unsecured
public wireless networks criminal minded people can hack all personal
information including your credit card numbers, WhatsApp conversation and
also the passwords. And also, do not make corporate or financial
transactions using public wireless network.

Cyber security Laws in India


Information Technology Act 2000
 Indian Cyber laws are represented by Information Technology act in 2000.
 The ITA is ordered by the Parliament of India, protecting the e-
administration, e-banking, and web-based business areas.
 The IT Act directing the entire Indian enactment to oversee cybercrimes.
 Section 43: Applicable to individuals who harm the PC frameworks without
authorization from proprietor. The proprietor can guarantee pay for the harm in
such cases.
 Section 66: Applicable on the off chance that an individual is found to
deceptively or falsely submitting any demonstration alluded to in segment 43.
The detainment term in such examples can mount as long as three years or a
fine of up to Rs.5lakh.
 Section 66B: Incorporates the disciplines for falsely getting taken
specialized gadgets or PCs, which affirms a likely three years' detainment. This
term can likewise be bested by Rs.1 lakh fine, contingent on the seriousness.
 Section 66C: This part Scrutinizes the personality robberies identified with
sham computerized marks, hacking passwords, or other unmistakable
distinguishing proof provisions. Whenever demonstrated liable, detainment of
three years may likewise be sponsored by Rs.1 lakh fine.
 Section 66D: This part was embedded on-request, zeroing in on rebuffing
miscreants doing pantomime utilizing PC assets.
Indian Penal Code (IPC), 1980

Digital misrepresentation and wholesale fraud are remembered for the Indian
Penal Code (IPC), 1980 and the Information Technology Act, 2000.

• falsification (Article 464) - Implementation of non-anecdotal name of the


individual, intending to accept that the record was made by a genuine
individual, or the name of a perished individual, with the goal that accept that
the report was made by an individual in his life, may have been fashioned.

not really set in stone falsification of misrepresentation, (Section 468) - Anyone


who submits extortion, proposing to utilize this deceitful electronic archive or
record will be responsible to detainment for any term of as long as seven years,
and will be dependent upon a fine.

• False records, (Section 465) - Anyone who submits extortion will be at risk to
detainment for any term of as long as two years, or a fine, or both.

• Presenting a fashioned letter as bona fide, (segment 471) - Anyone who


falsely or deceptively utilizes any message that the person knows or has
motivation to accept is a falsification, will be rebuffed similarly concerning
manufacturing a report.
• Defamation, (area 469) - Anyone who submits misrepresentation, aiming that
this draft report would harm the standing of any party, or realizing that it could
be utilized for that reason, will be obligated to detainment for any term that
might reach out for as long as three years, and will be fined.

References –
• https://us.norton.com/internetsecurity-how-to-how-to-recognize-and-
protect-yourself-from-cybercrime.html
• https://en.wikipedia.org/wiki/Cybercrime
• https://www.kaspersky.co.in/resource-center/threats/what-is-cybercrime
• https://www.redpoints.com/blog/cybercrime/
• https://www.computerweekly.com/news/252493515/Top-10-cyber-crime-
stories-of-2020
• https://www.jigsawacademy.com/major-causes-of-cyber-crimes-you-must-
be-aware-of/
• https://www.telegraphindia.com/odisha/first-case-of-cyber-
crime/cid/1413198
• https://www.britannica.com/topic/cybercrime
• https://www.appknox.com/blog/cybersecurity-laws-in-india
• https://www.legalserviceindia.com/legal/article-1019-importance-of-cyber-
law-in-india.html

You might also like