With the advancement of technology, man has become more dependent on the internet to easily almost each and everything ideally sitting at one place. Online shopping, cloud storage, gaming, social networking and online study, almost every possible thing is happening through the medium of the internet. With the intervention of internet in personal and economic life, there is also an increase in the cases of Cyber crimes that are committed in different forms. In the matters of Cyber crimes, the cases are increasing day by day in India. The major thing among the internet users in India is that most of them are not aware of the ways in which Cyber crimes happen, their prevention methods, and action plan in case of any unfortunate incident.
Cyber crime, in general, is a broad term
that is defined as the unlawful acts in which a computer or other allied
computing device (such as mobile) is used as a target or a tool or both
or a place to conduct any criminal activity and every unlawful
electronic method from denial of service attacks to electronic cracking.
Cyber Crimes are generally related to the internet and system based
crimes such as debit/credit card frauds, phishing, industrial espionage,
child pornography, illegal downloading, online scams, Cyber terrorism,
virus viruses, online exploitation, online frauds and so on. Cyber
crimes also cover the traditional methods in which computer or system
networks are used as tool to perform the illicit activity.
Website hacking refers to the act of unauthorized access into a computer, computer system, computing devices or computer network without the permission of the rightful persons. Every possible act committed to breaking into a computer, computing device and/or network refer to hacking. In general, hackers use ready-made or custom-written computer programs to intrude into the target computer, network or other computing devices with a motto of destruction, stealing or gaining access to confidential information. While some hackers intrude the computers for personal monetary gains whereas some hackers do it for stealing confidential data. Some of the main mottos of website hacking are stealing information related to bank accounts and cards, stealing of personal data, and gaining access to confidential information. The Government, ecommerce and other popular websites are general more vulnerable to the hackers.
Pornography refers to the online represented acts which are considered sexual in order to perform sexual excitement. The definition of pornography also includes the production of pornographic websites, pornographic magazines and distribution of pornography over the mobile phones or computer networks.
Child pornography is defined as the visual depictions of sexually explicit materials involving a minor (under 18 years of age). Visual depictions include videos, photographs, digital or computer generated images. The storage of electronic data that can be converted into any form of child pornography is also deemed illegal. Besides, Cyber crimes also include the possession, production, reception, and distribution of image/video related to child pornography.
Cyberstalking refers to the act of harassing a victim by a stalker through the means of e-mail, instant messaging (IM), or messages posted on a discussion group or website. The stalker reckons upon the anonymity offered by the Internet in order stalk their victims in a confidential manner. Cyber Stalking is something different from ordinary spamming because a Cyberstalker targets a specific victim with mostly threatening messages whereas the spammer targets a large group of individuals with annoying messages.
Cyber terrorism is known as the act of premeditated use of computer network for disruptive or terrorist activities including the acts of large-scale disturbance of computer networks (personal, commercial or government systems) with an intention to cause political, social, ideological, religious, or similar damages.
DoS or denial-of-service attack is a method used by attackers to restrict lawful users from accessing the service. This particular type of crime is done by sending multiple request commands to the server or network to authenticate requests to invalid return addresses. Since the server will be unable to find the return address of the hacker while sending the authentication approval, it will come to halt before terminating the connection. As soon as the server terminates the connection, the hacker immediately sends similar types of request commands causing the server to wait again and again for keeping the server busy.
Software piracy is defined as the unlawful use, copying or distribution of the original programs with an intention of personal or commercial use. This type of Cyber crime is often related to trademark violations, patent violations and copyright infringements.
It is defined as the act of falsely claiming an email or website to be of the established legitimate enterprise with an aim to gain private and confidential details of the user for identity theft or monetary benefits. Counterfeiting the original look and functionality, phishing emails or websites often ask for updating personal information, passwords, credit card details or other things which are already presented at the legitimate organization with a sole intention of stealing.
Copyright infringement over the internet describes the act of downloading, hosting or distributing any copyrighted work (such as content, image, design, photo, video or other elements) without the consent or acknowledgment of the lawful copyright owner.
Trademark infringement is the breach of exclusive rights secured by trademark without the consent of the trademark owner. This condition usually occurs when a website's trademark infringe somewhat similar or confusingly similar to a trademark owned by another website in addition to the identical products or services covered under the registration.
Credit/Debit Card Fraud is somewhat similar to identity theft in which the secured information of Credit/Debit Card is stolen and exploited to gain funds from an account without the authorization or consent of the lawful owner. Possible exploitation sources may include card reading devices, hidden cameras, false Personal Identification Number (PIN) pads or access of saved credit/debit card details from personal resources.
It is defined as a criminal act that involves threatening users to reveal personal life of victims with a motto of demanding money or other benefits to avert or stop the acts.
It is an act where Cyber criminals use potentially illegal methods to gain the access to victim's money, accounts, property or other monetary sources by fraudulently posing as a bank. Common methods used are phishing and malware attacks.
A BOTNET attack is referred as the localized attack of a group of interconnected compromised computers or networks over a network to perform malicious activities. Often BOTNET attacks are used for email spamming, Distributed Denial-of-Service (DDoS) attacks and other information theft ways.
Over the Internet, steganography represents the act of hiding message, command or file inside another command, message or file. In this kind of Cyber crime, the attacker takes the consent of victim by manipulating the data in another form for information accessing or other purposes.
This is a specific kind of Denial of Service attack in which a program hinders with another program using the mode of shared synchronization objects in an unwanted or unexpected way to interrupt or suspend online services temporarily or indefinitely.
Cyber criminals know how hard it to mint money is. Keeping this factor in mind, Cyber criminals lure individuals through emails, phones or online advertisements for a promise of job or lottery winning. This always ends up in asking an advance commission, details of accounts or another demands for an assurance of security. But the promise of a job/Lottery is just in real as no one demands a collateral for the promise, it always ends up as a scam.
SQL injection attacks are used to steal sensitive information such as username or password from data-driven applications through the insertion of malicious SQL statements into the data field for execution. It is the responsibility of website owners to set up parameters to warm system administrators for any sort of SQL injection vulnerability.