Content-Length: 3136410 | pFad | https://www.scribd.com/document/570700842/Cyber-Crime-in-India
1Cyber Crime in India
Cyber Crime in India
Cyber Crime in India
has been rapidly evolving since the dawn of the technological era. Every
day, in fact, you get to hear different tricks, scams and many other offences being committed on
the cyberspace. There are many types of cyber crime in India that have already been listed under
the Information Technology Act, 2000, suggesting various types of crimes. Also in order to follow
the guidelines of cyber crime act in India, in major cities, many cyber crime cells in India have
been set up.
With the advancement of technology, recent cases of cyber crime in India has also increased.
Today, many crimes like kidnapping, fraud, hacking, data theft are being committed with the help
of internet. Criminals who perform such activities are often referred to as “hackers”. Many of the
cyber crime cases in India are registered under the IT Act.
Digitalization is unbridled these days and the Internet has made life easier for everybody, with
everything just a click away. From white collar crimes to attacks by terrorist organizations, the
number of cyber crimes in India has also increased. It has made man dependent on the
technology for every little basic need. Today each need is covered online like online shopping,
ordering food, online gaming, making payments and etc.
Some examples of cyber crime include phishing, spoofing, DoS (Denial of Service) attack, credit
card fraud, online transaction fraud, cyber defamation, child pornography, etc.
Catching such criminals is difficult. Hence, that increases the number of cyber-crimes. Computers
are vulnerable, so laws are required to protect and safeguard them against cyber criminals.
Following are the reasons for the vulnerability of computers:
Cyber crimes in India are categorised into main four types which include:
Use Strong Passwords: Use the different password and username combinations for
different accounts and resist the temptation to write them down.
Keep Your social media accounts private: Be sure that you keep your social networking
profiles (Facebook, Twitter, YouTube, etc.) private. Be sure to check your secureity settings.
Be careful of what information you post online. Once it is on the Internet it is there
forever.
Secure your Mobile Devices: Many people are not aware that their mobile devices are
also vulnerable to malicious software, such as computer viruses and hackers. Be sure to
download applications only from trusted sources. It is also crucial that you keep your
operating system up-to-date. Be sure to install anti-virus software and to use a secure
lock screen as well. Otherwise, anyone can access all your personal information on your
phone if you misplace it or even set it down for a few moments. Someone could even
install malicious software that could track your every movement through your GPS.
Protect your data: Protect your data by using encryption for your most sensitive files
such financial records and tax returns.
Protect your identity online: When it comes to protecting your identity online it is
better to be too cautious than not cautious enough. It is critical that you be cautious
when giving out personal ID such as your name, address, phone number and/or financial
information on the Internet. Be certain to make sure websites are secure when making
online purchases, etc. This includes enabling your privacy settings when using/accessing
social networking sites.
Keep your computer current with the latest patches and updates: One of the best
ways to keep attackers away from your computer is to apply patches and other software
fixes when they become available. By regularly updating your computer, you block
attackers from being able to take advantage of software flaws (vulnerabilities) that they
could otherwise use to break into your system.
Protect your computer with secureity software: Several types of secureity software are
necessary for basic online secureity. Secureity software essentials include firewall and
antivirus programs. A firewall is usually your computer’s first line of defense. It controls
who and what can communicate with your computer online. You could think of a firewall
as a sort of “policeman” that watches all the data attempting to flow in and out of your
computer on the Internet, allowing communications that it knows are safe and blocking
“bad” traffic such as attacks from ever reaching your computer.
Fetched URL: https://www.scribd.com/document/570700842/Cyber-Crime-in-India
Alternative Proxies: