Cybercrime is a criminal activity that either targets or uses a computer, a computer-based network, or a device. This crime is committed by cybercriminals or hackers who want to make money. Cybercrime is carried out by individuals or organizations. Some cybercriminals are organized, they use advanced techniques and highly technically skilled whereas the others are novice hackers. Sometimes cybercrime is used for political and personal motives.
Classification of cybercrimes:
· Crime against an individual – Crime committed against an individual by use of an individual’s credit card details, confidential data, and sending of spam emails. This crime is mainly done for making money.
· Crime against an organization – This is done against a firm, company, or organization to get unauthorized access to the data. This is done either to reveal the important data and employee details of the company or for money-making.
· Crime against the government – This is the crime against the nation, by getting access to the national data and records. This crime is of main concern as it concerns the safety of the people of the nation.
Impacts of cybercrime:
Cybercrime has ruined the lives of many people. The people who suffered loss are still trying to recover from it and some of them have opted to commit suicide. The loss of money and confidential data makes the person helpless and left out in a painful situation.
In companies, the loss is made by stealing the data of the company or destroying the system by malware so that it may not work till the terms and conditions of the criminal get fulfilled. The strategies and important data of the companies will be leaked out.
Different types of cybercrime:
1. Phishing – This involves obtaining the personal information of the user by sending spam emails or using a phishing website that resembles the same as authorized websites.
2. Identity Theft – This involves getting the information credit or debit cards or bank details, further unwanted money can be easily deducted after the information is hacked.
3. Malware Attacks – Malware is hostile software that is designed to damage the computer or systems. This is done to access meaningful information or for doing some crime by using that system.
4. ATM Frauds – The ATM is hacked in this crime. The criminals have developed a way to access both the data on the card along with the pin, further, they are successful in
5. duplicate the cards and using the same to withdraw money.
6. Cyber Stalking – The criminal is involved in following the person through online measures. They can even send malware to damage the systems to get the exact information. It involves harassment of the user.
7. Spoofing – In this, an email is received and appears to be from some authentic source, but it is not the same. It is corrupted.
8. Piracy – It is unauthorized access to the information which is confidential. Many of the times the government websites are hacked and files are pirated containing important data.
A national conference on national crime investigation was held in New Delhi at the headquarters of CBI (Central Bureau of Investigation) on 4 and 5 September 2019. The main motive of the conference was to create a common platform for investigators, forensic teams, and other officials involved to discuss various methods and ways to tackle cyber-related crimes.
Cybercrime Awareness:
Different security measures should be followed to be safe from the dreadful act of cybercrime.
· Strong passwords should be used. The password must be a complex one, could not be possible to guess.
· Use antivirus programs to keep the system free of malware.
· Continuously update the system.
· Be vigilant and use the presence of mind to avoid identity thefts.
· Make your children aware of the internet, so that they can state any misuse or harassment if they are going through.
· Maintain privacy settings over social media.
Types of Cyber Security:
· Network Security – Protects the network from being attacked by malware and thus using a secure network.
· Cloud security – Meant for safeguarding the data in the cloud resources.
· Information security – Helps in protecting the data from unauthorized or illegal access.
· End-user security – The user should be conscious of while inserting any external devices in the system, opening any mail or links.
· Application security – Helps in keeping the system and software free of any threat.
Conclusion:
Cybercrime is increasing every day and the most appropriate way of being safe from becoming the victim of its ill effects is following security measures. There are many ways by which we can protect our confidential information from being leaked. We should always focus on awareness as “Prevention is better than cure”, especially when the cure is not available.
5 replies on “The Chronicles of Cybercrime”
Great writing
Great info
Very impactful. Well written article.
Fascinating read!
Great article for teenagers as they know the perks of internet