You are on page 1of 16

TOPIC: CYBER CRIME – A MODERN THREAT

SUBMITTED BY: SUBMITTED TO:

SHIVAM DR. RUCHI THAKUR

1020202126

1st SEMESTER ASSISTANT PROFESSOR

B.A. LL.B. (5 year integrated course) OF ENGLISH

HIMACHAL PRADESH NATIONAL LAW UNIVERSITY

SEMESTER ASSIGNMENT- I

1 | CYBER CRIME
TABLE OF CONTENTS

ACKNOWLEDGEMENT……………………………………………………....3

OBJECTIVES…………………………………………………………………....4

INTRODUCTION……………………………………………………………...5-6

CLASSIFICATION OF CYBER CRIME…………………………………....7-9

ASPECTS OF CYBER CRIME…………..…………………………..……......10

AFFECTS OF CYBER CRIME…………………………………………….....11

CAUSE OF CYBER CRIME…………………………………………………..12

PREVENTION AND RECOMMENDATION OF CYBER CRIME….….13-14

CONCLUSION…………………………………………………………………..15

BIBLIOGRAPHY…………………………………………………………..…...16

2 | CYBER CRIME
SEMESTER ASSIGNMENT- I

ACKNOWLEDGEMENT

This research was supported by the Himachal Pradesh National Law


University, Shimla. I would thank my colleagues/classmates, who
provided insight and expertise that greatly assisted the research,
although they may not agree with all of the interpretations/conclusions
of this paper.

I would thank Dr. Ruchi Thakur, Assistant Professor of English for


assistance with the related themes & for comments that greatly improved
the manuscript.

I would like to show my gratitude to my parents for sharing their pearls


of wisdom with me during the course of this research work.

SEMESTER ASSIGNMENT- I
3 | CYBER CRIME
OBJECTIVES

This work seeks to define the concept of cyber-crime, identify reasons


for cyber-crime, how it can be eradicated, look at those involved and the
reasons for their involvement, we would look to improve cyber law
system in India, Creating awareness about cyber crime among the
people.

4 | CYBER CRIME
SEMESTER ASSIGNMENT- I

INTRODUCTION
Cyber crime is perhaps the most widely recognized trendy expressions nowadays, the cases and
the occurrences of cybercrime sound crazy in some cases cyber criminals show all their brutality
by the cyber crimes they perpetrate, before we proceed to realize what is a cyber crime, we will
know the importance of a crime.

"Cybercrime" consolidates the expression "crime" with the root "cyber" from "cybernetic", from
the Greek, "kubernan", which intends to lead or govern. The "cyber" climate incorporates all
types of digital activities, whether or not they are led through organizations and without fringes.
This broadens the past term "computer crime" to incorporate crimes carried out utilizing the
Internet, every digital crime, and crimes including broadcast communications organizations. This
later phrasing covers a wide assortment of features, prompting various methodologies,
contingent upon the prevailing society of the specialists, causing it to show up either decreased
or extended, in various measurements, managing arising issues that additionally mirror its
variety.

Crime, in whatever structures it is, directly or indirectly, consistently influences the society. In
this day and age, there is enormous expansion in the utilization of Internet in each field of the
society and because of this expansion in use of Internet, various new crimes have advanced.
Such crimes where utilization of computers combined with the utilization of Internet is included
are comprehensively named as Cyber Crimes.

Nowadays' computer and internet become necessary and helpful for our daily life. Today the
internet is the extraordinary arbiter of our lives. In present days individuals can get information,
store information and offer information through the internet. Back 20's years after the fact there
was approx.100000 individuals utilizes internet however now around 3,405,518,376 individuals
are surf the net far and wide. The becoming quickest world of internet is known as cyber world.
Today cyber world are quickest moving and high technology world. Asian countries are most
employments of internet in the world. In Asia district India has rank top two internet clients

5 | CYBER CRIME
country, so India is the quickest developing country. Today internet turns into the foundation of
social and monetary world. Clients can get to the internet whenever from anyplace however
through the internet numerous illicit works may done. Today E-mail and website is the most
productive method of data correspondence.

Cyber crimes are technology based crimes and the computer or internet itself can be utilized as a
weapon or intends to do such crimes openly. They are coordinated and white collar crimes like
cyber frauds, hacking, data theft, phishing, wholesale fraud and so on Cyber crimes are carried
out with the assistance of technology and cyber criminals have profound understanding of
technology. Truth be told, cyber criminals are technocrats who understand the complexities of
information technology. Cybercrimes don't think about any limits or regional hindrances.

History of cybercrime:

The originally recorded cyber crime occurred in the year 1820.in 1820, Joseph Marie Jacquard, a
textile producer in France, created the loom. This device permitted the redundancy of a
progression of steps in the weaving of extraordinary textures. This brought about a dread among
Jacquard's workers that their customary business and vocation were being compromised. They
submitted demonstrations of treachery to deter Jacquard from additional utilization of the new
technology. This is the main record of cyber crime

6 | CYBER CRIME
SEMESTER ASSIGNMENT- I

CLASSIFICATION OF CYBER CRIME


Types of Cyber Crimes:

Hacking:

In this classification, a person's computer is broken into so his personal or sensitive information
can be accessed. In the United States, hacking is classified as a wrongdoing and punishable in
that capacity. This is not quite the same as moral hacking, which numerous associations use to
check their Internet security protection. In hacking, the criminal uses an assortment of software
to enter a person's computer and the person may not know that his computer is being gotten to
from a far off area. Numerous saltines likewise attempt to access assets using password breaking
delicate products. Programmers can likewise screen what clients do on their computer and can
likewise import documents on their computer. A programmer could introduce a few projects on
to their framework without their insight. Such projects could likewise be utilized to take personal
information, for example, passwords and Visa information.

Theft:

This kind of cybercrime happens when a person disregards copyrights and downloads music,
motion pictures, games and software. There are even companion sharing websites which
energize software piracy and a significant number of these websites are presently being focused
by the FBI. These days, the equity framework is tending to this cybercrime and there are laws
that deflect individuals from unlawful downloading.

Cyber Stalking:

This is a kind of online badgering wherein the casualty is endangered to a blast of online
messages and emails. Ordinarily, these stalkers know their casualties and as opposed to falling
back on disconnected stalking, they utilize the Internet to follow. In any case, in the event that

7 | CYBER CRIME
they notice that cyber stalking isn't having the ideal impact, they start disconnected stalking
alongside cyber stalking to make the casualties' lives more down and out.

Identity Theft:

This is a significant issue with individuals utilizing the Internet for money exchanges and
banking administrations. In this cybercrime, a criminal gets to data about a person's financial
balance, Mastercards, Social Security, check card, complete name and other sensitive
information to deplete off cash or to purchase things online in the casualty's name. The identity
criminal can utilize person's information to falsely apply for credit, record burdens, or get clinical
administrations. It can bring about major monetary misfortunes for the person in question and
even ruin the casualty's record.

Malicious Software:

This software, additionally called computer infection is Internet-based software or projects that
are utilized to upset an organization. The software is utilized to access a framework to assemble
sensitive information or data or making harm software present in the framework.

Child soliciting and Abuse:

This is likewise a sort of cybercrime in which criminals request minors through talk spaces with
the end goal of youngster sexual entertainment. The FBI has been investing a great deal of
energy checking talk rooms visited by youngsters to lessen and forestall kid misuse and
requesting.

Infection scattering:

Malicious software that appends itself to other software. (infection, worms, Trojan Horse, web
jacking, email bombarding and so forth)

Computer vandalism:

8 | CYBER CRIME
It is a kind of cybercrime that Damages or pulverizes data instead of taking. It communicates
infection.

Cyber illegal intimidation:

It is a utilization of Internet based attacks in fear based oppressor activities. Technology shrewd
psychological oppressors are utilizing 512-digit encryption, which is difficult to unscramble.

Software piracy:

It is a theft of software through the illicit replicating of veritable projects. Dissemination of


items planned to pass for the first. In the event that a person with a solitary client permit stacks
the software onto a companion's machine, or if an organization stacks a software bundle onto
every representative's machine without purchasing a site permit, at that point both the single
client and the organization have broken the details of the software permit understanding and are
hence liable of software piracy. Software piracy includes the unapproved use, duplication,
dispersion, or offer of industrially accessible software. Software piracy is frequently named as
delicate lifting, forging, Internet piracy, hard-circle stacking, OEM unbundling, and unapproved
leasing.

Denial of administration attacks:

This crime is perpetrated by the crook, who floods the data transfer capacity of the casualty's
organization or fills his email box with spam mail denying him of the administrations he is
qualified for access.

9 | CYBER CRIME
SEMESTER ASSIGNMENT- I

ASPECTS OF CYBER CRIME


Technological Aspect of Cybercrime: From a technological measurement, different specialists
call attention to the requirement for a complete term, for example, "electronic crime" or "e-
crime", because of the combination of ICT, including mobile technology, communication,
memory, observation frameworks, and different advancements, including nanotechnology and
robotics, which should be considered starting now and into the foreseeable future. These
electronic media will be focused on progressively more frequently and will likewise be utilized
to hide, carry out, or uphold crimes and offenses. Just the positive activities for which at least
one methods were utilized to submit one of the components of the offense can be incorporated.

Anthropological Aspect of Cybercrime: From an anthropological aspect, cybercrime starts


from different populaces and shows socio-instructive, financial, and techno-philosophical
variables and their demeanors, including pathological articulations like enslavement. The
maladjustment of the training framework may add to the advancement of new types of
cybercrime or deviant practices and conduct with different degrees of seriousness, including
cheating and reputational harm, which can be identified with disappointments and the
redefinition of material and resident qualities, conflicting with what is normal when drawing
closer and having a grown-up existence. Troublesome financial conditions likewise incorporate
the Internet as a spot for communicating psychological issues with financial roots, including
theft, youngster sexual entertainment, and calls for uprisings, savagery, and scorn. Concerning
techno-philosophical variables, one should consider destinations and networks focused on
purposeful publicity, destabilization, and individual and mass psychological manipulation
utilizing strategies that include the digital preparing of pictures, recordings, and sound.
10 | CYBER CRIME
Strategic Aspect of Cybercrime: From a strategic aspect, cybercrime is viewed as an offense to
cyber-security, specifically attacks to digital networks to hold onto control, incapacitating them,
or in any event, destroying infrastructures that are crucial to governments and areas of essential
significance

SEMESTER ASSIGNMENT- I

HOW DO CYBER CRIME AFFECTS US?


Cybercrimes are broadly categorized into three groups through which we get affected, for
example, crime against

1. Individual

2. Property

3. Government

1. Individual:

This kind of cybercrime can be as cyber stalking, dispersing pornography, trafficking and
"grooming". In current circumstance, law enforcement organizations are thinking about such
cybercrime intense and are uniting worldwide to reach and capture the committers.

2.Property:

Same as in reality where a criminal can steal and pickpocket, even in the cyber world,
wrongdoers resort to stealing and robbing. For this situation, they can steal a person's bank
subtleties and channel off cash; abuse the Visa to make successive purchases online; run a trick
to get gullible individuals to leave behind their well deserved cash; utilize malicious software to
access an association's website or disturb the frameworks of the association. The malicious
software can likewise harm software and equipment, much the same as miscreants harm property
in the disconnected world.

11 | CYBER CRIME
3.Government:

Crimes against a government are indicated to as cyber illegal intimidation. On the off chance that
criminals are effective, it can cause devastation and frenzy among the resident. In this class,
criminals hack government websites, military websites or circulate publicity. The committers can
be fear monger outfits or unfriendly governments of different nations.

SEMESTER ASSIGNMENT- I

CAUSE FOR CYBER CRIME


Cyber crimes can be committed for recognition. This is essentially committed by youngsters who
need to be noticed and feel among the group of the enormous and troublemakers in the society.
They don't mean to hurt anyone specifically; they fall into the category of the Idealists; who
simply need to be in spotlight.

Another reason of cyber-crime is to make money. This gathering is greed induced and is
professional criminals, who meddle with data on the net or system especially, e-commerce, e-
banking data information with the sole point of perpetrating extortion and cheating money off
unsuspecting customers.

Thirdly, cyber-crime can be committed to battle a cause one thinks he believes in; to cause threat
and regularly damages that affect the recipients adversely. This is the most dangerous of the
multitude of causes of cyber-crime. Those involve believe that they are battling a noble
motivation thus wouldn't fret who or what they destroy in their quest to get their objectives
achieved. These are the cyber-terrorists.

12 | CYBER CRIME
SEMESTER ASSIGNMENT- I

PREVENTION AND RECOMMENDATION


Computer users can embrace different techniques to prevent cybercrime.

- Computer users should use a firewall to protect their computer from hackers. Most security
software comes with a firewall. Turn on the firewall that comes with their router also.

- Computer users are recommended to purchase and introduce against infection software, for
example, McAfee or Norton Anti-Virus. AVG offers free enemy of infection protection in the
event that they would prefer not to purchase software.

- It is advised by cyber experts that users should shop just at secure websites. Search for a Truste
or VeriSign seal when checking out. They ought to never give their credit card information to a
website that looks suspicious or to strangers.

- Users should develop solid passwords on their records that are hard to guess. Include the two
letters and numerals in their passwords. They should ceaselessly update passwords and login
details. By changing login details, in any event once or twice per month, there are less chances of
being a target of cybercrime.

- It is advised to look children and how they surf on Internet. Introduce parental control software
to restrict where they can surf

13 | CYBER CRIME
- Make sure that social networking profiles, for example, Facebook, Twitter, YouTube, MSN are
set to private. . Once it is on the Internet, it is extremely hard to remove.

- Secure mobile devices. By enacting the underlying security features, they can evade any access
to personal details. Never ever save passwords, numbers and own address on any mobile.

- Protect Data to keep away from criminals to hack. Use encryption for most sensitive files, for
example, government forms or monetary records, make regular back-ups of immensely
important data, and store it in a different area.

- Users should be alert while utilizing public Wi-Fi Hotspots. While these access focuses are
convenient, they are a long way from secure. Try not to lead monetary or corporate transactions
on these networks.

- Protect e-identity. Users should be careful when giving out personal information, for example,
name, address, phone number or monetary information on the Internet. Make sure that websites
are secure.

- Avoid being scammed: It is suggested that users should assess and think before they click on a
connection or file of obscure origin. Try not to open any emails in inbox. Check the source of the
message. In the event that there is an uncertainty, verify the source. Never reply to emails that
request that they verify information or affirm their user ID or password.

14 | CYBER CRIME
SEMESTER ASSIGNMENT- I

CONCLUSION
In technically driven society, people use different devices to make life simple. Globalization
results in connecting people all around the globe. The increasing access to and ceaseless use of
technology has profoundly impacted the manner by which people communicate and lead their
daily lives. The internet connects people and companies from opposite sides of the world quick,
easily, and relatively economically. Nevertheless, the internet and computer can pose some
threats which can have disparaging effect on civilisations. Cybercrime is a risk against different
organizations and people whose computers are connected to the internet and especially mobile
technology.

Fast developing of telecommunication and worldwide computer network has created the reasons,
which permit to carry out cyber crimes in the highly technologies field. Step by step cyber crime
is increasing in India and world . The 'Internet' has given numerous blessings to humanity
however they come with unexpected entanglements. It has become a place to do all sort of
activities which are prohibited by law. It is increasingly being used for pornography, gambling,
trafficking in human organs and prohibited medications, hacking, encroaching copyright,
terrorism, disregarding individual privacy, money laundering, fraud and software piracy etc.
Cyber crime isn't just a matter of concern for India yet it is additionally a worldwide problem and
therefore the world everywhere needs to come forward to stop cyber crime.
15 | CYBER CRIME
To sum things up, Cybercrime is evolving as a serious threat. A cyber-assault is an assault
originated from a computer against a website, computer system or individual computer that
compromises the confidentiality, integrity or accessibility of the computer or information stored
on it. It is main and the most complicated problem in the cyber area. Worldwide governments,
police departments and intelligence units have begun to react against cybercrime. Numerous
efforts are being taken at international level to check cross border cyber threats. Indian police has
started special cyber cells the nation over and have started educating the peoples so they gain
knowledge and protect themselves from such crime.

SEMESTER ASSIGNMENT- I

BIBLIOGRAPHY

1. https://www.jagranjosh.com/general-knowledge
2. https://www.civilserviceindia.com/current-affairs/articles
3. https://www.paperdue.com/essay/cybercrime-modern-scam-a-summary-of-the-116942
4. https://www.essaysauce.com/criminology-essays/cybercrime-2/

16 | CYBER CRIME

You might also like