Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Understanding Cyber Crime: Types, Prevention and the Indian Scenario
1.
2. CONTENTS
1) INRODUCTION
2) HISTORY OF CYBER CRIME
3) TYPES OF CYBER CRIME
4) CYBER CRIMES IN INDIA
5) HOW TO PREVENT CYBER CRIME
6) CONCLUSION
3. INTRODUCTION
WHAT IS CYBER CRIME?
CYBER CRIME REFERS TO ANY ILLEGAL
ACTION THAT INVOLVES A NETWORK OR
COMPUTER. IN ANY SENSE, THE NETWORK
OR COMPUTER MAY HAVE BEEN USED TO
COMMIT A CRIME OR MAY BE THE TARGET
OF A CRIME. CYBER CRIMES ARE ANY
CRIMES THAT INVOLVE A COMPUTER AND
A NETWORK. CYBERCRIME MAY
THREATEN A PERSON OR NATION’S
SECURITY AND FINANCIAL HEALTH.
4. HISTORY
CYBERCRIME FIRST STARTED WITH
HACKERS TRYING TO BREAK INTO
COMPUTER NETWORKS. SOME DID IT JUST
FOR THE THRILL OF ACCESSING HIGH-
LEVEL SECURITY NETWORKS, BUT
OTHERS SOUGHT TO GAIN SENSITIVE,
CLASSIFIED MATERIAL. EVENTUALLY,
CRIMINALS STARTED TO INFECT
COMPUTER SYSTEMS WITH COMPUTER
VIRUSES, WHICH LED TO BREAKDOWNS
ON PERSONALAND BUSINESS
COMPUTERS.
6. HACKING
HACKING IS THE ACT OF GAINING ACCESS
WITHOUT LEGAL AUTHORIZATION TO A
COMPUTER OR COMPUTER NETWORK. THE
PERSON ENGAGED IN HACKING ACTIVITIES IS
KNOWN AS HACKER. HACKERS ARE USUALLY
SKILLED COMPUTER PROGRAMMERS WITH
KNOWLEDGE OF COMPUTER SECURITY.
7. SPAMMING IS THE USE OF
ELECTRONIC MESSAGING
SYSTEMS TO SEND AN
UNSOLICITED MESSAGE
(SPAM). A PERSON WHO
CREATES ELECTRONIC SPAM
IS CALLED SPAMMER.
PHISHING IS A METHOD
WHERE CYBER CRIMINALS
BAIT YOU INTO DISCLOSING
THE INFORMATION THEY
WANT
SPAMING & PHISHING
8. CYBERSTALKING
CYBERSTALKING REFERS TO THE CRIME OF USING
THE INTERNET, EMAIL OR OTHER SOCIAL MEDIA
PLATFORM TO STALK, HARASS OR THREATEN
ANOTHER PERSON. CYBERSTALKING MOST OFTEN
INVOLVES SENDING HARRASING EMAILS, INSTANT
OR TEXT MESSAGES, OR SOCIAL MEDIA POSTS, OR
CREATING WEBSITES FOR THE SOLE PURPOSE OF
TORMENTING THE VICTIM
$%&”@!$%&”@!$%&”@! LOSER!
STUPID!
9. SOFTWARE PIRACY
SOFTWARE PIRACY IS THE
ILLEGAL COPYING, DISTRIBUTION,
OR USE OF SOFTWARE. SOFTWARE
PIRACY IS THE STEALING OF
LEGALLY PROTECTED SOFTWARE.
UNDER COPYRIGHT LAW,
SOFTWARE PIRACYB OCCURS
WHEN COPYRIGHT PROTECTED
SOFTWARE IS COPIED,
DISTRIBUTED, MODIFIED OR SOLD.
ACCORDING TO THE BUSINESS
SOFTEWARE ALLIANCE(BSA),
ABOUT 36% OF ALL SOFTWARE IN
CURRENT USE IS STOLEN.
10. BVIRUS DISSEMINATION
Virus Dissemination is a
process of a Malicious
software that attaches itself
to other software. Virus,
worms, Trojan Horse, Time
bomb, Logic Bomb, Rabbit
and Bacterium are examples
of malicious software that
destroys the system of the
victim.
11. IDENTITY THEFT
IDENTITY THEFT IS THE CRIME OF
OBTAINING THE PERSONAL OR
FINANCIAL INFORMATION OF
ANOTHER PERSON FOR THE SOLE
PURPOSE OF ASSUMING THAT
PERSON’S NAME OR IDENTIY TO
MAKE TRANSACTIONS OR
PURCHASES. IDENTITY THEFT
OCCURS WHEN SOMEONE USES
ANOTHER’S PERSONALLY
IDENTIFYING INFORMATION, LIKE
THEIR NAME, NUMBER, CRDIT
CARD NUMBER, WITHOUT THEIR
PERMISSION.
12. CYBER CRIMES IN INDIA
CYBER CRIME IN INDIA HAS BEEN EVOLVING
RAPIDLY. THE INFORMATION ACT, 2000 PASSED
BY THE PARLIAMENT OF INDIA IN MAY 2000, HAD
AIMED TO CURB CYBER CRIMES AND TO
PROVIDE LEGAL FRAMEWORK FOR E-
COMMERCE TRANSACTIONS. IN 2001 INDIAAND
USA HAD SET UP AN INDIA-USA CYVER
SECURITY FORUM AS PART OF A COUNTER-
TERRORISM DIALOGUE. CYBERCRIME CASES IN
INDIA, REGISTERED UNDER THE IT ACT,
INCREASED AT A RATE OF 300% BETWEEN 2011 &
2014. IN 2015, THERE WERE 11,592 CASES OF
CYBER CRIME REGISTERED IN INDIA.
13. HOW TO PREVENT CYBER CRIME
AWARENESS IS THE FIRST STEP IN PROTECTING
YOURSELF, YOUR FAMILY AND YOUR BUSINESS.
NEVER GIVE YOUR FULL NAME OR ADDRESS TO
STRANGERS.
NEVER ENTER YOUR CRDIT CARD NUMBER TO
ANY SITE THAT IS NOT SECURE.
MANAGE YOUR SOCIAL MEDIA SETTINGS TO
KEEP MOST OF YOUR PERSONAL AND PRIVATE
INFO LOCKED DOWN
SECURE YOUR HOME NETWORK WITH STRONG
ENCRYPTION PASSWORD AS WELL AS A VPN
14. REVIEW FINANCIAL STATEMENTS REGULARLY
DON’T OPEN EMAILS AND ATTACHMENTS
FROM UNKNOWN SOURCES
LEARN MORE ABOUT INTERNET PRIVACY
UNINSTALL UNNECESSARY SOFTWARE
USE HARD-TO-GUESS PASSWORDS.
KEEP YOUR OPERATING SYSTEM UP TO DATE
WITH CRITICAL SECURITY AND UPDATES &
PATHCHES
USE ANTIVIRUS SOFTWARE & FIREWALLS KEEP
THEM UP TO DATE
MAINTAIN BACKUP.
CHECK SECURITY SETTINGS.
15. CONCLUSION
THE KEY TO PROTECTING YOURSELF IS BEING
AWARE.
TECHNOLOGY IS DESTRUCTIVE ONLY IN THE
HANDS OF PEOPLE WHO DO NOT REALIZE THAT
THEY ARE ONE AND THE SAME PROCESS AS
THE UNIVERSE.
AS INTERNET CONTINUES TO DEVELOP THE
POTENTIAL FOR COMPUTER RELATED CRIME
WILL GROW
CYBER CRIME GREATLE AFFECTS INDIVIDUALS,
BUSINESSES, AND NATINAL SECURITY DUE TO
PERVASIVENESS OF THE INTERNET.
CYBERCRIME IS A MAJOR PROBLEM – AND
GROWING .STAY SECURE, STAY SAFE