CYBER CRIMES AND STEPS TO PREVENT AND CONTROL SYNOPSIS OF CYBER CRIMES Information Technology solutions have paved a way to a new world of internet, business networking and e-banking, budding as a solution to reduce costs, change the sophisticated economic affairs to more easier, speedy, efficient, and time saving method of transactions. Internet has emerged as a blessing for the present pace of life but at the same time also resulted in various threats to the consumers and other institutions for which it’s proved to be most beneficial. Various criminals like hackers, crackers have been able to pave their way to interfere with the internet accounts through various techniques like hacking the Domain Name Server (DNS), Internet Provider’s …show more content…
*Computer Viruses: Viruses are used by Hackers to infect the user’s computer and damage data saved on the computer by use of “payload” in viruses which carries damaging code. The contradiction here is that though certain viruses causes temporary interruption by showing messages on the screen of the user but still it’s not punishable under Information Technology Act 2000 as it doesn’t cause tangible damage. But, it must be made punishable as it would fall under the ambit of ‘unauthorised access’ though doesn’t cause any damage. Harmless viruses would also fall under the expression used in the provision “to unsurp the normal operation of the computer, system or network”. This ambiguity needs reconsideration. *Phishing: By using e-mail messages which completely resembles the original mail messages of customers, hackers can ask for verification of certain information, like account numbers or passwords etc. here customer might not have knowledge that the e-mail messages are deceiving and would fail to identify the originality of the messages, this results in huge financial loss when the hackers use that information for fraudulent acts like withdrawing money from customers account without him having knowledge of it *Spoofing: This is carried on by use of deceiving Websites or e-mails. These sources mimic the original websites so well by use of logos, names, graphics and even the
Another threat is Phishing, it is the fraudulent practice of sending emails pretending to be from reputable companies in order to lure individuals to reveal personal information, such as passwords and credit card numbers.
Computer virus is a program that can copy itself and infect a computer without the permission or knowledge of the user. Viruses perform some type of harmful activity such as accessing private information or corrupting
The world has become a global village and therefore many activities like education, business, relationship formation and many other aspects relating to humans are done over internet and with cyber-crime these aspects of human have been threatened and in some cases victims lose a lot of money mainly in the e-commerce field. The effect of cyber bullying has caused many individuals to commit suicide. Loss of private data has been witnessed at the organizational and individual level causing the victims great losses when they cannot recover the data.
This is called phishing when interne users are deceived into divulging their personal information. Malware is when software is downloaded to your computer which collects and transmits personal information. Hacking is illegally accessing computer systems remotely United Nations Office Drugs and Crime). The internet allows people steal and transfer information without meeting or communicating with the person they steal it from. The United States is the leading source of credit card numbers of underground markets. It is estimated that internet identity theft is 1 billion dollars a year.
Malicious code can deny or degrade the availability of computing services; steal, alter, or insert information; and destroy any potential evidence for criminal prosecution. Various types of malicious code exist including viruses, worms, and scripts using active content.
In this era of globalization and cut-throat world of competition, it is virtually impossible to do business without using the internet and web applications. Internet gets used for processing the credit card or debit card sale and even for using to save the data of customers to the merchant’s database for future reference and to send promotional offers to the previous and patron customers. And on the other hand, hackers are trying their best to get the data stored on the merchant’s server by spoofing
Abstract— In this paper you will learn when virus was made and how they are made and how they work. You should also get the understanding of the different types of virus and the implementation of virus.
Computer viruses have been around just about as long as the personal computer has existed. With the advent of the Internet, the ability of viruses to rapidly spread has increased substantially. Despite this increase in capability to infect large numbers of computers across international borders, the definition of a computer virus has not substantially changed over
Virus is a program that infect the computer system which is made by hackers to spy or steal users personal data, which is my cause a significant damage to the computer system.
Computer viruses are minute program which is “embedded inside an application or within a data file which can copy itself into another program“(Adams et al, 2008 ) for the sole determination of meddling with normal computer operations. The consequences may range from corruption and deletion of data; propagation of virus on to network and deployment through attachments through emails in order to further creating havoc to all associated computing devices.
Just like a biological virus, a computer virus is able to infect and ruin lives. This malicious software constitutes more than just simple viruses but also includes other types of software including worms, Trojan horses, and ransomware. Malware has been around since the late 1980’s. Originally, people became hackers to gain notoriety online, but today, it has become more of a business. Cyber attacks originate from all around the world, and it is not just individual people that benefit from it. In two decades, numerous cyber crime syndicates have been created, and states all over the world sponsor hacker groups. Over the past twenty-five years, malware has become less about checking the integrity of computer security and gaining notoriety in the underground cyber society, and it has become more of a chaos creating, money making business that many people and institutions take part in.
The internet is a medium that is becoming progressively important as it makes information available in a quick and easy manner. It has transformed communications and acts as a global network that allows people to communicate and interact without being limited by time, boarders and distance. However, the infrastructure is vulnerable to hackers who use the system to commit cyber crime. To accomplish this, they make use of innovative stealth techniques for their malicious purposes in the internet.
Phishing can be compared with fishing in a lake, instead of trying to capture fish, phishers goal is to steal your personal information. Phishing being one of the easiest forms of cyber-attack for a criminal to carry out which can provide crucial information of the an individual and the information can be anything like passwords, account numbers, credit card details etc.
There are threats to network security that can compromise your computer systems. Viruses are one of the top security threats in the technology industry. A virus is a program or a code that is loaded into your computer system without your knowledge will run against your wishes (Beal, n.d). Viruses can also replicate themselves. All computer viruses are manmade and a virus can make a copy of itself several times and easy to create (Beal, n.d). Mark Vernon wrote that 72% of all companies have received infected e-mails or files last year and for larger companies the percentage was 83% (Vernon, 2004). The top viruses in malignancy are Worms and Trojan Horses (Vernon, 2004). Another threat to network security is malware. Malware (malicious software) is a annoying or harmful type of software that is intended to secretly access a device without a user’s knowledge. There are different types of malware, which include spyware, phishing, viruses, adware, Trojan horses, worms, ransomware, rootkits, and browser hijackers (“What is Malware and how to remove it | Cyber security,” n.d.). Malware gets access to your device through the internet, email, hacked websites, toolbars, music files, free subscriptions, toolbars and anything downloaded from the web (“What is Malware and how to remove it | Cyber security,” n.d.). Spam is also another threat to network security. Spam is a unsolicited message that advertises a service or product. Spammers target email accounts but can also be found on
The article discusses whether a computer virus is useful or unreliable; furthermore it discusses whether is a good computer virus or a bad computer virus of the computer. There are many damage of computer virus however, there are two side of everything Advantages and disadvantages.