You are on page 1of 2

Cyber Crime  Firewalls and Gateways: These can keep data

safe and ensure confidentiality of files


 11, 592 cyber crime cases were registered in 2015,  Anti Virus Software: By using security software
according to National Crime Records Bureau like QuickHeal or Avast, netizens can secure their
 While UP led in the incidence of cyber crimes, files and guard against worms, trojans, hackers
Maharashtra came a close second in 2015, and unwanted intrusions.
according to NCRB  Secure Wi-Fi Connection: Secure internet
 Cyber crime in India rose by 300% between 2011 wireless connections help in detecting criminal
and 2014 activities very fast. You can check the IP address
 According to CERT-in, 27, 482 cases of cyber to see if someone else is accessing your email
crime were recorded between January and June account, for example.
2017.  Encryption: Encryption guards passwords,
 Cases of cyber crime range from DOS attacks to sensitive data and confidential information from
virus, malicious code, defacements, scanning, exposure and abuse.
phishing probing to site intrusions, according to  Security Audit: Cyber criminals can be put to task
CERTin by conducting a security audit and seeing where
 Cyber experts have indicated placing critical you vulnerabilities lie.
infrastructure to predict and prevent cyber crimes  Cyber Forensics: These can help in detecting
were important. crime; every cyber criminal leaves a digital imprint
 India has seen 1.71 lakh cyber-crimes over three of some sort which can be used to catch the
years from 2014-2017, according to CERTin. culprit.
 Cybercrime affects individual systems and firms Apart from the usual precautions, there are several
which need to be tackled with specialised teams legal safeguards against cyber crimes.
 Analysis of data showed that network scanning Information Technology Act, 2000, for example was
and probing was the key to sell sensitive data. one of the first legislations which sought to make
Indian cyberspace a safe place.
Types of Cyber Crimes Indian Contract Act, Sales Goods Act 1930 are
some of the measures to prevent illegal online
 Hacking auctions.
 Child Pornography The POCSO act is in place to punish those who
 Cyber Stalking abuse or molest children online. National cyber
 Denial of Service/DOS Attacks security policy 2013 is also in place to guard
 Malware: Virus, Trojan, Worm, Hoax, Spyware citizens against cyber crimes.
 Data Theft
 Ransomware Some of the projects that are in place to guard
 Data interception against crimes include
 Data security network sabotage - National Critical Information Infrastructure
 Network interference Protection Centre,
 Cyber Defamation - National Cyber Coordination Centre,
 Corporate Cyber Slander/Smear - Tri Service Cyber Command for Armed Forces
 Digital Forgery of India.
 Online Gambling - Cyber Attacks Crisis Management Plan of India
 Online sale/auction that are illegal and National Technical Research Organisation
 E-spamming
 E-mail bombing
 Cyber warfare
 Cyber terrorism
 Digital/Mobile Wallet Hacking: Financial Frauds
 Phishing

Tools to Ward of Cyber Crimes

 Digital Signatures: This protects documents from


being forged online and secures the bank account
etc.
 Secure passwords: These guard files from
hackers and unwanted intruders
Some GD Topics on Cyber Crime, that you
should be prepared to face:

1. Is India Prepared for Cyber Attacks?


2. Are Ransomware a Threat to the Economy?
3. Do We Need to Regulate Cyberspace?
4. Should Child Pornography Crime Be Punishable
by Death?
5. Is Cyber Stalking A Criminal Offence or is
Googling Someone Okay?
6. Can Malware Damage Corporate India?
7. Does Aadhaar Promote Data Theft?
8. Should Internet remain Anonymous?
9. Does Internet Anonymity Encourage Cyber-
crimes?
10. Do Social Networks Breed Libel and Slander?
11. Can Corporate Cyber Smear Dent a Brand?
12. Cyber Crime: How Can We Deal with the
Increasing Incidences?
13. Cyber warfare: A Growing Threat to National
Security?
14. Can Income Inequalities Lead to Growing Cyber
Extortions?
15. False Flagging and Phishing: Are Cyber Law a
Sufficient Deterrent?
16. The Changing Face of Cyber Terrorism
17. Are Online Cyber Sites and Forums Breeding
Cyber Crimes?
18. Is Internet the Media of the People or a
Breeding Ground for Cybercrime?
19. Does Internet Anonymity Encourage People to
Misbehave?

You might also like