Cyber Crimes

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Notes

Program Name- Master of Business Administration (MBA)

Course Name- Legal Aspects of Business Sem- I

Unit Number- 4 Unit Name- Information Technology Act, 2000

Topic Name –Cyber crime

Introduction:

Cybercrime is not an old sort of crime to the world. It is defined as any criminal activity which
takes place on or over the medium of computers or internet or other technology recognized by
the Information Technology Act. Cybercrime is the most prevalent crime playing a devastating
role in Modern India. Not only the criminals are causing enormous losses to the society and the
government but are also able to conceal their identity to a great extent. There are number of
illegal activities which are committed over the internet by technically skilled criminals. Taking a
wider interpretation it can be said that, Cybercrime includes any illegal activity where computer
or internet is either a tool or target or both.

Content:

Cyber crime

Cybercrime, also called computer crime, the use of a computer as an instrument to further illegal
ends, such as committing fraud, trafficking in child pornography and intellectual property,
stealing identities, or violating privacy

Cybercrime, especially through the Internet, has grown in importance as the computer has
become central to commerce, entertainment, and government.

Most cybercrime is an attack on information about individuals, corporations, or governments.

Although the attacks do not take place on a physical body, they do take place on the personal or
corporate virtual body, which is the set of informational attributes that define people and
institutions on the Internet.
Types of cybercrime

Identity theft and invasion of privacy

Internet fraud

ATM fraud

File sharing and privacy

Counterfeiting and forgery

Child pornography

Hacking

Computer Viruses

Spam and email hacking

Defining cybercrime

New technologies create new criminal opportunities but few new types of crime. What
distinguishes cybercrime from traditional criminal activity? Obviously, one difference is the use
of the digital computer, but technology alone is insufficient for any distinction that might exist
between different realms of criminal activity. Criminals do not need a computer to commit fraud,
traffic in child pornography and intellectual property, steal an identity, or violate someone’s
privacy. All those activities existed before the “cyber” prefix became ubiquitous. Cybercrime,
especially involving the Internet, represents an extension of existing criminal behaviour
alongside some novel illegal activities.

Most cybercrime is an attack on information about individuals, corporations, or governments.


Although the attacks do not take place on a physical body, they do take place on the personal or
corporate virtual body, which is the set of informational attributes that define people and
institutions on the Internet. In other words, in the digital age our virtual identities are essential
elements of everyday life: we are a bundle of numbers and identifiers in multiple
computer databases owned by governments and corporations. Cybercrime highlights the
centrality of networked computers in our lives, as well as the fragility of such seemingly solid
facts as individual identity.

An important aspect of cybercrime is its nonlocal character: actions can occur


in jurisdictions separated by vast distances. This poses severe problems for law enforcement
since previously local or even national crimes now require international cooperation. For
example, if a person accesses child pornography located on a computer in a country that does not
ban child pornography, is that individual committing a crime in a nation where such materials are
illegal? Where exactly does cybercrime take place? Cyberspace is simply a richer version of the
space where a telephone conversation takes place, somewhere between the two people having the
conversation. As a planet-spanning network, the Internet offers criminals multiple hiding places
in the real world as well as in the network itself. However, just as individuals walking on the
ground leave marks that a skilled tracker can follow, cybercriminals leave clues as to their
identity and location, despite their best efforts to cover their tracks. In order to follow such clues
across national boundaries, though, international cybercrime treaties must be ratified.

How to protect yourself against cybercrime

So, now you understand the threat cybercrime represents, what are the best ways to protect your
computer and your personal data? Here are our top tips:

Keep software and operating system updated

Keeping your software and operating system up to date ensures that you benefit from the latest
security patches to protect your computer.

Use anti-virus software and keep it updated

Using anti-virus or a comprehensive internet security solution like Kaspersky Total Security is a
smart way to protect your system from attacks.

Anti-virus software allows you to scan, detect and remove threats before they become a problem.
Having this protection in place helps to protect your computer and your data from cybercrime,
giving you piece of mind.

If you use anti-virus software, make sure you keep it updated to get the best level of protection.

Use strong passwords

Be sure to use strong passwords that people will not guess and do not record them anywhere. Or
use a reputable password manager to generate strong passwords randomly to make this easier.

Never open attachments in spam emails

A classic way that computers get infected by malware attacks and other forms of cybercrime is
via email attachments in spam emails. Never open an attachment from a sender you do not know.

Do not click on links in spam emails or untrusted websites

Another way people become victims of cybercrime is by clicking on links in spam emails or
other messages, or unfamiliar websites. Avoid doing this to stay safe online.

Do not give out personal information unless secure

Never give out personal data over the phone or via email unless you are completely sure the line
or email is secure. Make certain that you are speaking to the person you think you are.

Contact companies directly about suspicious requests


If you get asked for data from a company who has called you, hang up. Call them back using the
number on their official website to ensure you are speaking to them and not a cybercriminal.

Summary:

Cybercrime, also called computer crime, the use of a computer as an instrument to further illegal
ends, such as committing fraud, trafficking in child pornography
and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through
the Internet, has grown in importance as the computer has become central to commerce,
entertainment, and government.

Because of the early and widespread adoption of computers and the Internet in the United States,
most of the earliest victims and villains of cybercrime were Americans. By the 21st century,
though, hardly a hamlet remained anywhere in the world that had not been touched by
cybercrime of one sort or another.

Self-Assessment Questions:

1. What are cybercrimes?

2. What are the types of Cybercrimes?

3. Which of the following is defined as an attempt to steal, spy, damage or destroy computer
systems, networks, or their associated information?
a) Cyber Attack

b) Computer Security

C) Digital Hacking

d) Cryptography

4. Which of the following is not a cybercrime?

a) Denial of Service
b) Man in the Middle
c) Malware
d) AES (Advanced Encryption Standard)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy