Cyber Crime Firewalls and Gateways: These can keep data
safe and ensure confidentiality of files
11, 592 cyber crime cases were registered in 2015, Anti Virus Software: By using security software according to National Crime Records Bureau like QuickHeal or Avast, netizens can secure their While UP led in the incidence of cyber crimes, files and guard against worms, trojans, hackers Maharashtra came a close second in 2015, and unwanted intrusions. according to NCRB Secure Wi-Fi Connection: Secure internet Cyber crime in India rose by 300% between 2011 wireless connections help in detecting criminal and 2014 activities very fast. You can check the IP address According to CERT-in, 27, 482 cases of cyber to see if someone else is accessing your email crime were recorded between January and June account, for example. 2017. Encryption: Encryption guards passwords, Cases of cyber crime range from DOS attacks to sensitive data and confidential information from virus, malicious code, defacements, scanning, exposure and abuse. phishing probing to site intrusions, according to Security Audit: Cyber criminals can be put to task CERTin by conducting a security audit and seeing where Cyber experts have indicated placing critical you vulnerabilities lie. infrastructure to predict and prevent cyber crimes Cyber Forensics: These can help in detecting were important. crime; every cyber criminal leaves a digital imprint India has seen 1.71 lakh cyber-crimes over three of some sort which can be used to catch the years from 2014-2017, according to CERTin. culprit. Cybercrime affects individual systems and firms Apart from the usual precautions, there are several which need to be tackled with specialised teams legal safeguards against cyber crimes. Analysis of data showed that network scanning Information Technology Act, 2000, for example was and probing was the key to sell sensitive data. one of the first legislations which sought to make Indian cyberspace a safe place. Types of Cyber Crimes Indian Contract Act, Sales Goods Act 1930 are some of the measures to prevent illegal online Hacking auctions. Child Pornography The POCSO act is in place to punish those who Cyber Stalking abuse or molest children online. National cyber Denial of Service/DOS Attacks security policy 2013 is also in place to guard Malware: Virus, Trojan, Worm, Hoax, Spyware citizens against cyber crimes. Data Theft Ransomware Some of the projects that are in place to guard Data interception against crimes include Data security network sabotage - National Critical Information Infrastructure Network interference Protection Centre, Cyber Defamation - National Cyber Coordination Centre, Corporate Cyber Slander/Smear - Tri Service Cyber Command for Armed Forces Digital Forgery of India. Online Gambling - Cyber Attacks Crisis Management Plan of India Online sale/auction that are illegal and National Technical Research Organisation E-spamming E-mail bombing Cyber warfare Cyber terrorism Digital/Mobile Wallet Hacking: Financial Frauds Phishing
Tools to Ward of Cyber Crimes
Digital Signatures: This protects documents from
being forged online and secures the bank account etc. Secure passwords: These guard files from hackers and unwanted intruders Some GD Topics on Cyber Crime, that you should be prepared to face:
1. Is India Prepared for Cyber Attacks?
2. Are Ransomware a Threat to the Economy? 3. Do We Need to Regulate Cyberspace? 4. Should Child Pornography Crime Be Punishable by Death? 5. Is Cyber Stalking A Criminal Offence or is Googling Someone Okay? 6. Can Malware Damage Corporate India? 7. Does Aadhaar Promote Data Theft? 8. Should Internet remain Anonymous? 9. Does Internet Anonymity Encourage Cyber- crimes? 10. Do Social Networks Breed Libel and Slander? 11. Can Corporate Cyber Smear Dent a Brand? 12. Cyber Crime: How Can We Deal with the Increasing Incidences? 13. Cyber warfare: A Growing Threat to National Security? 14. Can Income Inequalities Lead to Growing Cyber Extortions? 15. False Flagging and Phishing: Are Cyber Law a Sufficient Deterrent? 16. The Changing Face of Cyber Terrorism 17. Are Online Cyber Sites and Forums Breeding Cyber Crimes? 18. Is Internet the Media of the People or a Breeding Ground for Cybercrime? 19. Does Internet Anonymity Encourage People to Misbehave?