Introduction:Now, Cybercrime is commonplace and presentsnew challenges in the prevention of crime.
Cybercrime is a illegal activity doneusing coputers and internets.It is a unlawful acts with in a computers either atool or both. 1 In the cyber-crime, computercrime means criminal activity involving a computer.
The computer may be used inthe discount of a crime or it may be the exact point. Net-crime means criminaluse of the Internet. Cyber-crimes are essentially a combination of these twoelements and that are committed against individuals or groups of individualswith a criminal motive to intentionally harm the reputation of the victim orcause physical or mental harm to the victim directly or indirectly using moderntelecommunication networks such as the Internet. 2In the growth ofthe internet, network security has become a major concern in the new era. Cybercrimes have gone out rapidly in the last few years and have major consequences.Cyber criminals are doing every thing from stealing moneyof persons, hide ofidentity,hacking into others computer, stealing intellectual property,spreading viruses and worms to damage computers connected on the internet andcommitting frauds.
3 Types of Cyber Crime:Cybercrime is defined as crimes committed on the internet using computer as atool or innocents are the target. There are various forms of cyber crime like as:1.Hacking.2. Online Scams3. Malware4. Email Bombing5. Virus Dissemination6.
Logic Bombs7. Theft8. Social Media Hack & Spamming9.
Electronic Money Laundering10. Sales & Investment Fraud11. Eavesdropping & Surveillance12.
Software Piracy13. Data Diddling14. Salami Slicing Attack15. Phishing Scams16.
Cyber Stalking17. Cyber Bullying18. Identity Theft19.
Child Soliciting & Abuse20. Ransomware.4 Hacking:Today, hacking or Cracking is a primecyber crime committed . Hacker makes use of the weaknesses and loop holes inoperating systems to destroy data information from victim’s computer. Normally,Cracking is done through the use of a backdoor program installed on yourmachine.
Many crackers also try to gain access to resources through the use ofpassword cracking softwares. Hackers can also monitor what u do on yourcomputer and also can import files on your computer. A hacker could installseveral programs on to your system in spite of your knowledge. This is also such programs could also be used to stealpersonal information such as passwords and credit card information. For thisreason,important data of a company can also be hacked to get the secretinformation of the future plans of the company.Cyber-Theft:Now,Cyber-Theft is the use ofcomputers and communication systems to steal information and dat in electronicformat.
Hackers crack this into thesystems of banks and transfer money into their own bank accounts.As larger amountsof money can be stolen and illegally transferred into their own account.Viruses and worms:Viruses and worms is a great threat tonormal users and companies. Viruses are computer programs that are alsodesigned to damage computers. It is named virus because it spreads from onecomputer to another as like as a biological virus. A virus must be attached to some other program through which it enters the computer.
Aworm or virus usually exploits loopholes in softwares or the operating system.5 Reasons of cyber-crime:Thereare many technical reasons behind these crimes. Some technical reasons behindcyber crimes are as follows:Lack of reporting and standards,Toughto identify,Limited media coverage,Least marginal cost of online activity dueto global reach,A very few rate of Officialinvestigation and criminal prosecution,Capability of computer to store data incomparatively small space,Easy to access,Complexities in operating systems code,Lakeof evidence,Negligence,Loopholes in systems,Confidential information in online3.Such as:1. Capacity to store informationin comparatively small space:-The computer has aunique characteristic of storing information in a very small space.
This allowsfor much easier access of information through either physical or virtual media.2.Easy to access:-Now,The problemsencountered in guarding a computer system from unauthorised access are thatthere is every possibility of unauthorised access not due to human error butdue to the complex technology. In the secretly implanted a logic bomb, keyloggers that can steal access codes, advanced voice recorders; retina imagersetc. 3.Complex-In the computers workon operating systems and these operating systems in turn are composed ofmillions of lines of code.
The human mind is also fallible and it is notpossible that there might not be a lapse at any stage. The cyber criminals takeadvantage of these lacunas and penetrate into the computer system using oftenmore sophisticated means than originally anticipated by the systems engineers. 4. Negligence:- In this crime,Negligenceis very closely connected with human conduct. It is therefore very probablethat while protecting the computer system there might be any negligence, whichin turn provides a cyber criminal to gain access and control over the computersystem.
This negligence is usually a property of under resourced IT securityprovisions and the improvement of security barriers within software packagesand network structures could lead to improved security.5. Loss of evidence:- Loss of evidenceis a very common & obvious problem as all the data is routinely destroyedfrequently.
Further collection of data outside the territorial extent alsoparalyses this system of crime investigation.6 Ways to fight cybercrime by individuals:To fight back the individual should beproactive, not reactive We do not have to remain at the receiving end of crimeforever. The fight against cyber crime starts in our very own home .We shouldnot reply any e-mail from unknown persons, we should learn to report spam mailsto the e-mail servers .We should not upload our personal information on socialnetworking sites or our account details on other such sites. Also the useantivirus soft wares can be a great help to fight against viruses and worms.7 Solutions:An important question arises canthese crimes be prevented.So, A number of techniques and solutions have beenpresented but the problems still exists and are increasing day by day.
Antivirus And Anti spywareSoftware:?ntivirus software consists ofcomputer programs that attempt to identify, thwart and eliminate computerviruses and other malicious software also used. Anti spy wares are used torestrict backdoor program, trojans and other spy wares to be installed and run onthe computer.5 Conclusion: We can not think our daily lifewithout computer as well as internet. The advantages of internet and computercan not be described in one word. But they have also some demerits as likecyber crimes. Its also became a part of our life.
Criminals and victims bothare the part of our society. Now, the rate of various types of cyber crimesincreases rapidly. It must be reduced by keeping proper steps that’s arealready discussed in this paper for keeping safe our personal and private dataand information ,ensure the security of all types of websites and makingour society clean & peaceful.8 Reference: 1http://programsandcourses.anu.edu.au/2016/course/SOCY2160 2 http://riverdelfin.blogspot.hk/2013/09/an-introduction-to-cyber-crime.html 3 http://ezinearticles.com/?Cyber-Crimes-And-Solutions&id=2041674 https://www.silverbug.it/blog/10-types-of-cyber-crimes…-and-another-10-youve-never-heard-of 5 http://ezinearticles.com/?Cyber-Crimes-And-Solutions&id=204167 6 https://www.ukessays.com/essays/information-technology/cybercrime-problems-and-solutions-information-technology-essay.php7http://essay-world.blogspot.com/2008/03/cyber-crime.html 8 http://essay-world.blogspot.com/2008/03/cyber-crime.html