Introduction: Eavesdropping & Surveillance 12. Software Piracy 13.

                                     

                        

Introduction:

Now, Cybercrime is
commonplace and presents new challenges in the prevention of crime.Cybercrime
is a illegal activity done using coputers and internets.It is a unlawful acts
with in a computers either a tool or both. 1

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

In the cyber-crime, computer
crime means criminal activity involving a computer. The computer may be used in
the discount of a crime or it may be the exact point. Net-crime means criminal
use of the Internet. Cyber-crimes are essentially a combination of these two
elements and that are committed against individuals or groups of individuals
with a criminal motive to intentionally harm the reputation of the victim or
cause physical or mental harm to the victim directly or indirectly using modern
telecommunication networks such as the Internet. 2

In the growth of
the internet, network security has become a major concern in the new era. Cyber
crimes have gone out rapidly in the last few years and have major consequences.
Cyber criminals are doing every thing from stealing moneyof persons, hide of
identity,hacking into others computer, stealing intellectual property,
spreading viruses and worms to damage computers connected on the internet and
committing frauds.3

 

 

 

 

Types of Cyber Crime:
Cybercrime is defined as crimes committed on the internet using computer as a
tool or innocents are the target. There are various forms of cyber crime like as:

1.
Hacking.

2. Online Scams

3. Malware

4. Email Bombing

5. Virus Dissemination

6. Logic Bombs

7. Theft

8. Social Media Hack & Spamming

9. Electronic Money Laundering

10. Sales & Investment Fraud

11. Eavesdropping & Surveillance

12. Software Piracy

13. Data Diddling

14. Salami Slicing Attack

15. Phishing Scams

16. Cyber Stalking

17. Cyber Bullying

18. Identity Theft

19. Child Soliciting & Abuse

20. Ransomware.4

 

 

 

 

 

 

 

 

 

Hacking:

Today, hacking or Cracking is a prime
cyber crime committed . Hacker makes use of the weaknesses and loop holes in
operating systems to destroy data information from victim’s computer. Normally,
Cracking is done through the use of a backdoor program installed on your
machine. Many crackers also try to gain access to resources through the use of
password cracking softwares. Hackers can also monitor what u do on your
computer and also can import files on your computer. A hacker could install
several programs on to your system in spite of 
your knowledge. This is also such programs could also be used to steal
personal information such as passwords and credit card information. For this
reason,important data of a company can also be hacked to get the secret
information of the future plans of the company.

Cyber-Theft:

Now,Cyber-Theft is the use of
computers and communication systems to steal information and dat in electronic
format. Hackers crack this  into the
systems of banks and transfer money into their own bank accounts.As larger amounts
of money can be stolen and illegally transferred into their own account.

Viruses and worms:

Viruses and worms is a great threat to
normal users and companies. Viruses are computer programs that are also
designed to damage computers. It is named virus because it spreads from one
computer to another as like as a biological 
virus. A virus must be attached to some other program  through which it enters the computer. A
worm  or virus usually exploits loop
holes in softwares or the operating system.5

Reasons of cyber-crime:There
are many technical reasons behind these crimes. Some technical reasons behind
cyber crimes are as follows:Lack of reporting and standards,Tough
to identify,Limited media coverage,Least marginal cost of online activity due
to global  reach,A very few rate of Official
investigation and criminal prosecution,Capability of computer to store data in
comparatively small space,Easy to access,Complexities in operating systems code,Lake
of evidence,Negligence,Loopholes in systems,Confidential information in online3.

Such as:

1. Capacity to store information
in comparatively small space:-

The computer has a
unique characteristic of storing information in a very small space. This allows
for much easier access of information through either physical or virtual media.

2.Easy to access:-

Now,The problems
encountered in guarding a computer system from unauthorised access are that
there is every possibility of unauthorised access not due to human error but
due to the complex technology. In the secretly implanted a logic bomb, key
loggers that can steal access codes, advanced voice recorders; retina imagers
etc.

3.Complex-

In the computers work
on operating systems and these operating systems in turn are composed of
millions of lines of code. The human mind is also fallible and it is not
possible that there might not be a lapse at any stage. The cyber criminals take
advantage of these lacunas and penetrate into the computer system using often
more sophisticated means than originally anticipated by the systems engineers.

 

 

4. Negligence:-

 In this crime,Negligence
is very closely connected with human conduct. It is therefore very probable
that while protecting the computer system there might be any negligence, which
in turn provides a cyber criminal to gain access and control over the computer
system. This negligence is usually a property of under resourced IT security
provisions and the improvement of security barriers within software packages
and network structures could lead to improved security.

5. Loss of evidence:-

 Loss of evidence
is a very common & obvious problem as all the data is routinely destroyed
frequently. Further collection of data outside the territorial extent also
paralyses this system of crime investigation.6

 

 

Ways to fight cyber
crime by individuals:
To fight back the individual should be
proactive, not reactive We do not have to remain at the receiving end of crime
forever. The fight against cyber crime starts in our very own home .We should
not reply any e-mail from unknown persons, we should learn to report spam mails
to the e-mail servers .We should not upload our personal information on social
networking sites or our account details on other such sites. Also the use
antivirus soft wares can be a great help to fight against viruses and worms.7

 

Solutions:

An important question arises can
these crimes be prevented.So, A number of techniques and solutions have been
presented but the problems still exists and are increasing day by day.

Antivirus And Anti spyware
Software:

?ntivirus software consists of
computer programs that attempt to identify, thwart and eliminate computer
viruses and other malicious software also used. Anti spy wares are used to
restrict backdoor program, trojans and other spy wares to be installed and run on
the computer.5

 

Conclusion: We can not think our daily life
without computer as well as internet. The advantages of internet and computer
can not be described in one word. But they have also some demerits as like
cyber crimes. Its also became a part of our life. Criminals and victims both
are the part of our society. Now, the rate of various types of cyber crimes
increases rapidly. It must be reduced by keeping proper steps that’s are
already discussed in this paper for keeping safe our personal and private data
and information ,ensure the security of all types of websites and making
our  society clean & peaceful.8

 

 

Reference:

 1http://programsandcourses.anu.edu.au/2016/course/SOCY2160  

2 http://riverdelfin.blogspot.hk/2013/09/an-introduction-to-cyber-crime.html  

3 http://ezinearticles.com/?Cyber-Crimes-And-Solutions&id=204167

4 https://www.silverbug.it/blog/10-types-of-cyber-crimes…-and-another-10-youve-never-heard-of

 5 http://ezinearticles.com/?Cyber-Crimes-And-Solutions&id=204167

 6 https://www.ukessays.com/essays/information-technology/cybercrime-problems-and-solutions-information-technology-essay.php

7http://essay-world.blogspot.com/2008/03/cyber-crime.html

8 http://essay-world.blogspot.com/2008/03/cyber-crime.html                                                

                                     

                        

Introduction:

Now, Cybercrime is
commonplace and presents new challenges in the prevention of crime.Cybercrime
is a illegal activity done using coputers and internets.It is a unlawful acts
with in a computers either a tool or both. 1

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

In the cyber-crime, computer
crime means criminal activity involving a computer. The computer may be used in
the discount of a crime or it may be the exact point. Net-crime means criminal
use of the Internet. Cyber-crimes are essentially a combination of these two
elements and that are committed against individuals or groups of individuals
with a criminal motive to intentionally harm the reputation of the victim or
cause physical or mental harm to the victim directly or indirectly using modern
telecommunication networks such as the Internet. 2

In the growth of
the internet, network security has become a major concern in the new era. Cyber
crimes have gone out rapidly in the last few years and have major consequences.
Cyber criminals are doing every thing from stealing moneyof persons, hide of
identity,hacking into others computer, stealing intellectual property,
spreading viruses and worms to damage computers connected on the internet and
committing frauds.3

 

 

 

 

Types of Cyber Crime:
Cybercrime is defined as crimes committed on the internet using computer as a
tool or innocents are the target. There are various forms of cyber crime like as:

1.
Hacking.

2. Online Scams

3. Malware

4. Email Bombing

5. Virus Dissemination

6. Logic Bombs

7. Theft

8. Social Media Hack & Spamming

9. Electronic Money Laundering

10. Sales & Investment Fraud

11. Eavesdropping & Surveillance

12. Software Piracy

13. Data Diddling

14. Salami Slicing Attack

15. Phishing Scams

16. Cyber Stalking

17. Cyber Bullying

18. Identity Theft

19. Child Soliciting & Abuse

20. Ransomware.4

 

 

 

 

 

 

 

 

 

Hacking:

Today, hacking or Cracking is a prime
cyber crime committed . Hacker makes use of the weaknesses and loop holes in
operating systems to destroy data information from victim’s computer. Normally,
Cracking is done through the use of a backdoor program installed on your
machine. Many crackers also try to gain access to resources through the use of
password cracking softwares. Hackers can also monitor what u do on your
computer and also can import files on your computer. A hacker could install
several programs on to your system in spite of 
your knowledge. This is also such programs could also be used to steal
personal information such as passwords and credit card information. For this
reason,important data of a company can also be hacked to get the secret
information of the future plans of the company.

Cyber-Theft:

Now,Cyber-Theft is the use of
computers and communication systems to steal information and dat in electronic
format. Hackers crack this  into the
systems of banks and transfer money into their own bank accounts.As larger amounts
of money can be stolen and illegally transferred into their own account.

Viruses and worms:

Viruses and worms is a great threat to
normal users and companies. Viruses are computer programs that are also
designed to damage computers. It is named virus because it spreads from one
computer to another as like as a biological 
virus. A virus must be attached to some other program  through which it enters the computer. A
worm  or virus usually exploits loop
holes in softwares or the operating system.5

Reasons of cyber-crime:There
are many technical reasons behind these crimes. Some technical reasons behind
cyber crimes are as follows:Lack of reporting and standards,Tough
to identify,Limited media coverage,Least marginal cost of online activity due
to global  reach,A very few rate of Official
investigation and criminal prosecution,Capability of computer to store data in
comparatively small space,Easy to access,Complexities in operating systems code,Lake
of evidence,Negligence,Loopholes in systems,Confidential information in online3.

Such as:

1. Capacity to store information
in comparatively small space:-

The computer has a
unique characteristic of storing information in a very small space. This allows
for much easier access of information through either physical or virtual media.

2.Easy to access:-

Now,The problems
encountered in guarding a computer system from unauthorised access are that
there is every possibility of unauthorised access not due to human error but
due to the complex technology. In the secretly implanted a logic bomb, key
loggers that can steal access codes, advanced voice recorders; retina imagers
etc.

3.Complex-

In the computers work
on operating systems and these operating systems in turn are composed of
millions of lines of code. The human mind is also fallible and it is not
possible that there might not be a lapse at any stage. The cyber criminals take
advantage of these lacunas and penetrate into the computer system using often
more sophisticated means than originally anticipated by the systems engineers.

 

 

4. Negligence:-

 In this crime,Negligence
is very closely connected with human conduct. It is therefore very probable
that while protecting the computer system there might be any negligence, which
in turn provides a cyber criminal to gain access and control over the computer
system. This negligence is usually a property of under resourced IT security
provisions and the improvement of security barriers within software packages
and network structures could lead to improved security.

5. Loss of evidence:-

 Loss of evidence
is a very common & obvious problem as all the data is routinely destroyed
frequently. Further collection of data outside the territorial extent also
paralyses this system of crime investigation.6

 

 

Ways to fight cyber
crime by individuals:
To fight back the individual should be
proactive, not reactive We do not have to remain at the receiving end of crime
forever. The fight against cyber crime starts in our very own home .We should
not reply any e-mail from unknown persons, we should learn to report spam mails
to the e-mail servers .We should not upload our personal information on social
networking sites or our account details on other such sites. Also the use
antivirus soft wares can be a great help to fight against viruses and worms.7

 

Solutions:

An important question arises can
these crimes be prevented.So, A number of techniques and solutions have been
presented but the problems still exists and are increasing day by day.

Antivirus And Anti spyware
Software:

?ntivirus software consists of
computer programs that attempt to identify, thwart and eliminate computer
viruses and other malicious software also used. Anti spy wares are used to
restrict backdoor program, trojans and other spy wares to be installed and run on
the computer.5

 

Conclusion: We can not think our daily life
without computer as well as internet. The advantages of internet and computer
can not be described in one word. But they have also some demerits as like
cyber crimes. Its also became a part of our life. Criminals and victims both
are the part of our society. Now, the rate of various types of cyber crimes
increases rapidly. It must be reduced by keeping proper steps that’s are
already discussed in this paper for keeping safe our personal and private data
and information ,ensure the security of all types of websites and making
our  society clean & peaceful.8

 

 

Reference:

 1http://programsandcourses.anu.edu.au/2016/course/SOCY2160  

2 http://riverdelfin.blogspot.hk/2013/09/an-introduction-to-cyber-crime.html  

3 http://ezinearticles.com/?Cyber-Crimes-And-Solutions&id=204167

4 https://www.silverbug.it/blog/10-types-of-cyber-crimes…-and-another-10-youve-never-heard-of

 5 http://ezinearticles.com/?Cyber-Crimes-And-Solutions&id=204167

 6 https://www.ukessays.com/essays/information-technology/cybercrime-problems-and-solutions-information-technology-essay.php

7http://essay-world.blogspot.com/2008/03/cyber-crime.html

8 http://essay-world.blogspot.com/2008/03/cyber-crime.html                                                

x

Hi!
I'm Mary!

Would you like to get a custom essay? How about receiving a customized one?

Check it out