PC's

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Cyber crime

1.Introduction
Today an increasing number of companies are connecting to the Internet to support sales activities or to
provide their employees and customers with faster information and services. The virtual world has taken
over the real one, E-business and E-commerce, which are the new mantras and electronic transactions and
dominate the overall business paradigm. In this rapidly evolving e-world that depends on free flowing
information, security is the major problem to be considered.

Security on Internet is challenging. Security on an Internet is important because information has


significant value. Implementing security involves assessing the possible threats to one’s network, servers
and information. The goal is then to attempt to minimize the threat as much as possible. This developing
world of information technology has a negative side effect. It has opened the door to antisocial and
criminal behavior

SUK-MCA Page 1
Cyber crime

2.Objectives
The objective of the Cybercrime Centre will be to coordinate various efforts pertaining to
cybercrime prevention and regulation. It aims to provide assistance to law-enforcement agencies and
contribute to the fight against cybercrime. It will also aim to act as a centre for the emerging cybercrime
jurisprudence that is evolving. The Cybercrime Centre will also engage in providing training and capacity
building amongst the various stakeholders. It is expected that the Cybercrime Centre will be the focal point
efforts against cybercrime. It will also aim to primarily provide more distinct approaches on how to deal
with emerging cybercrimes. It would also aim to support various law enforcement agencies in India at the
Central and State level in building legal capacity for detection, investigation, and prosecution of
cybercrimes as also for cooperation with various international players.
The Cybercrime Centre will aim to develop the evolving jurisprudence on cybercrimes and also will aim to
look at all kinds of cybercrimes which are targeted against persons, property or nations.The objective of
cybersecurity is to prevent or mitigate harm to—or destruction of—computer networks, applications,
devices, and data. For cybersecurity strategy to succeed, it must continually evolve to keep pace with the
shifting strategies and technologies used by hackers.Cyber crime protects the data and integrity of
computing assets belonging to or connecting to an organization's network. Its purpose is to defend those
assets against all threat actors throughout the entire life cycle of a cyber attack.

SUK-MCA Page 2
Cyber crime

3.Literature Survey

Cyber crime which is considered as the illegal activity committed on the Internet is now a big threat
to the nation. Now a day’s number of internet users is increasing rapidly. As the use of Internet is
increasing by which any information can be accessed easily from anywhere, so various illegal activities
basing upon the internet are also increasing. A report McAfee estimates that the annual damage to the
global economy is at $445 billion; however, a Microsoft report shows that such survey-based estimates are
"hopelessly flawed" and exaggerate the true losses by orders of magnitude. Approximately $1.5 billion was
lost in 2012 to online credit and debit card fraud in the US. In 2016, a study by Juniper Research estimated
that the costs of cybercrime could be as high as 2.1 trillion by 2019. The majority of cyber crimes are
centered on forgery, fraud and phishing. India is the third most targeted country for phishing attack after
the US and the UK.

Social networks as well as e-commerce sites are major targets. India is said to be no.1 country in the
world for generating spam. The cyber crime has various categories where technology acts as instrument
and target . There are number of cyber crimes those categories into the type where technology acts as
instrument. These are as such: Money laundering, mass marketing fraud, child exploitation, cyber bullying,
intellectual property infringement, internet based drug trafficking. Some of the crimes where technology
acts as target are hacking for criminal purposes, malware threats, and distributed denial services.

SUK-MCA Page 3
Cyber crime

4.Methodology
4.1Basic Concept

Cyber crime is defined as Offences that are committed against individuals or groups of
individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or
mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such
as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS). Such crimes
may threaten a nation's security and financial health. Issues surrounding these types of crimes have become
high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child
grooming. There are also problems of privacy when confidential information is intercepted or disclosed,
lawfully or otherwise.

Internationally, both governmental and non-state actors engage in cybercrimes, including


espionage, financial theft, and other cross-border crimes. Activity crossing international borders and
involving the interests of at least one nation state is sometimes referred to as cyber warfare.

SUK-MCA Page 4
Cyber crime

4.2How it works

Cybercrime that targets computers often involves viruses and other types of
malware. Cybercriminals may infect computers with viruses and malware to damage devices or stop them
working. They may also use malware to delete or steal data. Then, use them to spread malware to other
machines or throughout a network.

Types of cybercrime
 Phishing: using fake email messages to get personal information from internet users;
 Misusing personal information (identity theft);
 Hacking: shutting down or misusing websites or computer networks;
 Spreading hate and inciting terrorism;
 Distributing child pornography;
 Grooming: making sexual advances to minors.

SUK-MCA Page 5
Cyber crime

4.3Disadvantages:

1) Firewalls can be difficult to configure correctly.

2) Incorrectly configured firewalls may block users from performing certain actions on the Internet, until
the firewall configured correctly.

3) Makes the system slower than before.

4) Need to keep updating the new software in order to keep security up to date.

5) Could be costly for average user.

5. Conclusion

The future of cyber crime will in one sense be like the present: hard to define and potentially unbounded as
digital technologies interact with human beings across virtually all aspects of politics, society, the
economy, and beyond. We built this project on the proposition that both the “cyber” and the “security”
components of the concept “cybersecurity” will be in rapid motion during the back half of the 2010s. That
motion is more likely to accelerate than to decelerate, but its direction varies widely among our scenarios.
That is no artifact of our research process; it is the central point of the work. We hypothesize that, at some
point in the not-so-distant future (if it is not already true at present), cybersecurity will be recognized
widely as the “master problem” of the internet era. That puts it at the top of any list of problems that
societies face, more similar to a nearly existential challenge like climate change than to an operational
concern that technology companies have to manage. That recognition also will bring major changes to how
human beings and digital machines interact.

SUK-MCA Page 6
Cyber crime

References

[1]. US Data Vault (n.d). “ Types of cyber


attacks- and how to prevent them. Available
from www.usdatavault.com. Extracted

[2]. Technopeia (n.d). “ What does Cyber Attack


Mean?”. Available from
www.technopedia.com.

[3] Josh Fruhlinger, (2018). “What is a cyber


attack? Recent Examples showing disturbing
trends”. Available from
www.csoonline.com.

SUK-MCA Page 7
Cyber crime

[4] The windows club (n.d). “ Cyber attacksdefinition,


types, prevention”. Available
from www.thewindowsclub.com.

[5] Pooja Aggarwal , Neha, Piyush Arora ,


Poonam , “REVIEW ON CYBER CRIME
AND SECURITY”, IJREAS, Vol. 02, Issue

SUK-MCA Page 8

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy