{"id":1539,"date":"2021-03-03T18:00:00","date_gmt":"2021-03-03T12:30:00","guid":{"rendered":"https:\/\/new.iimun.in\/blog\/?p=1539"},"modified":"2021-03-02T13:17:40","modified_gmt":"2021-03-02T07:47:40","slug":"the-chronicles-of-cybercrime","status":"publish","type":"post","link":"https:\/\/iimun.in\/blog\/international\/the-chronicles-of-cybercrime\/","title":{"rendered":"The Chronicles of Cybercrime"},"content":{"rendered":"\n<p>Cybercrime is a criminal activity that either targets or uses a computer, a computer-based network, or a device. This crime is committed by cybercriminals or hackers who want to make money. Cybercrime is carried out by individuals or organizations. Some cybercriminals are organized, they use advanced techniques and highly technically skilled whereas the others are novice hackers. Sometimes cybercrime is used for political and personal motives.<\/p>\n\n\n\n<p>Classification of cybercrimes:<\/p>\n\n\n\n<p>\u00b7 &nbsp; &nbsp; &nbsp; &nbsp; Crime against an individual &#8211; Crime committed against an individual by use of an individual\u2019s credit card details, confidential data, and sending of spam emails. This crime is mainly done for making money.<\/p>\n\n\n\n<p>\u00b7 &nbsp; &nbsp; &nbsp; &nbsp; Crime against an organization \u2013 This is done against a firm, company, or organization to get unauthorized access to the data. This is done either to reveal the important data and employee details of the company or for money-making.<\/p>\n\n\n\n<p>\u00b7 &nbsp; &nbsp; &nbsp; &nbsp; Crime against the government \u2013 This is the crime against the nation, by getting access to the national data and records. This crime is of main concern as it concerns the safety of the people of the nation.<\/p>\n\n\n\n<p>Impacts of cybercrime:<\/p>\n\n\n\n<p>Cybercrime has ruined the lives of many people. The people who suffered loss are still trying to recover from it and some of them have opted to commit suicide. The loss of money and confidential data makes the person helpless and left out in a painful situation.<\/p>\n\n\n\n<p>In companies, the loss is made by stealing the data of the company or destroying the system by malware so that it may not work till the terms and conditions of the criminal get fulfilled. The strategies and important data of the companies will be leaked out.<\/p>\n\n\n\n<p>Different types of cybercrime:<\/p>\n\n\n\n<p>1. &nbsp; Phishing \u2013 This involves obtaining the personal information of the user by sending spam emails or using a phishing website that resembles the same as authorized websites.<\/p>\n\n\n\n<p>2. &nbsp; Identity Theft \u2013 This involves getting the information credit or debit cards or bank details, further unwanted money can be easily deducted after the information is hacked.<\/p>\n\n\n\n<p>3. &nbsp; Malware Attacks \u2013 Malware is hostile software that is designed to damage the computer or systems. This is done to access meaningful information or for doing some crime by using that system.<\/p>\n\n\n\n<p>4. &nbsp; ATM Frauds \u2013 The ATM is hacked in this crime. The criminals have developed a way to access both the data on the card along with the pin, further, they are successful in<\/p>\n\n\n\n<p>5. &nbsp; duplicate the cards and using the same to withdraw money.<\/p>\n\n\n\n<p>6. &nbsp; Cyber Stalking \u2013 The criminal is involved in following the person through online measures. They can even send malware to damage the systems to get the exact information. It involves harassment of the user.<\/p>\n\n\n\n<p>7. &nbsp; Spoofing \u2013 In this, an email is received and appears to be from some authentic source, but it is not the same. It is corrupted.<\/p>\n\n\n\n<p>8. &nbsp; Piracy \u2013 It is unauthorized access to the information which is confidential. Many of the times the government websites are hacked and files are pirated containing important data.<\/p>\n\n\n\n<p>A national conference on national crime investigation was held in New Delhi at the headquarters of CBI (Central Bureau of Investigation) on 4 and 5 September 2019. The main motive of the conference was to create a common platform for investigators, forensic teams, and other officials involved to discuss various methods and ways to tackle cyber-related crimes.<\/p>\n\n\n\n<p>Cybercrime Awareness:<\/p>\n\n\n\n<p>Different security measures should be followed to be safe from the dreadful act of cybercrime.<\/p>\n\n\n\n<p>\u00b7 &nbsp; &nbsp; &nbsp; &nbsp; Strong passwords should be used. The password must be a complex one, could not be possible to guess.<\/p>\n\n\n\n<p>\u00b7 &nbsp; &nbsp; &nbsp; &nbsp; Use antivirus programs to keep the system free of malware.<\/p>\n\n\n\n<p>\u00b7 &nbsp; &nbsp; &nbsp; &nbsp; Continuously update the system.<\/p>\n\n\n\n<p>\u00b7 &nbsp; &nbsp; &nbsp; &nbsp; Be vigilant and use the presence of mind to avoid identity thefts.<\/p>\n\n\n\n<p>\u00b7 &nbsp; &nbsp; &nbsp; &nbsp; Make your children aware of the internet, so that they can state any misuse or harassment if they are going through.<\/p>\n\n\n\n<p>\u00b7 &nbsp; &nbsp; &nbsp; &nbsp; Maintain privacy settings over social media.<\/p>\n\n\n\n<p>Types of Cyber Security:<\/p>\n\n\n\n<p>\u00b7 &nbsp; &nbsp; &nbsp; &nbsp; Network Security \u2013 Protects the network from being attacked by malware and thus using a secure network.<\/p>\n\n\n\n<p>\u00b7 &nbsp; &nbsp; &nbsp; &nbsp; Cloud security \u2013 Meant for safeguarding the data in the cloud resources.<\/p>\n\n\n\n<p>\u00b7 &nbsp; &nbsp; &nbsp; &nbsp; Information security \u2013 Helps in protecting the data from unauthorized or illegal access.<\/p>\n\n\n\n<p>\u00b7 &nbsp; &nbsp; &nbsp; &nbsp; End-user security \u2013 The user should be conscious of while inserting any external devices in the system, opening any mail or links.<\/p>\n\n\n\n<p>\u00b7 &nbsp; &nbsp; &nbsp; &nbsp; Application security \u2013 Helps in keeping the system and software free of any threat.<\/p>\n\n\n\n<p>Conclusion:<\/p>\n\n\n\n<p>Cybercrime is increasing every day and the most appropriate way of being safe from becoming the victim of its ill effects is following security measures. There are many ways by which we can protect our confidential information from being leaked. We should always focus on awareness as \u201cPrevention is better than cure\u201d, especially when the cure is not available.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercrime is a criminal activity that either targets or uses a computer, a computer-based network, or a device. This crime is committed by cybercriminals or hackers who want to make money. Cybercrime is carried out by individuals or organizations. Some cybercriminals are organized, they use advanced techniques and highly technically skilled whereas the others are [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":1540,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5,9],"tags":[29,124,223],"coauthors":[],"class_list":["post-1539","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-international","category-technology","tag-artificial-intelligence","tag-international-peace-and-security","tag-technology"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/iimun.in\/blog\/wp-content\/uploads\/2021\/03\/traditionalcybercrime-thumbnail.jpg?fit=800%2C450&ssl=1","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/iimun.in\/blog\/wp-json\/wp\/v2\/posts\/1539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iimun.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iimun.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iimun.in\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/iimun.in\/blog\/wp-json\/wp\/v2\/comments?post=1539"}],"version-history":[{"count":1,"href":"https:\/\/iimun.in\/blog\/wp-json\/wp\/v2\/posts\/1539\/revisions"}],"predecessor-version":[{"id":1541,"href":"https:\/\/iimun.in\/blog\/wp-json\/wp\/v2\/posts\/1539\/revisions\/1541"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iimun.in\/blog\/wp-json\/wp\/v2\/media\/1540"}],"wp:attachment":[{"href":"https:\/\/iimun.in\/blog\/wp-json\/wp\/v2\/media?parent=1539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iimun.in\/blog\/wp-json\/wp\/v2\/categories?post=1539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iimun.in\/blog\/wp-json\/wp\/v2\/tags?post=1539"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/iimun.in\/blog\/wp-json\/wp\/v2\/coauthors?post=1539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}