You are on page 1of 9
“One of the main cyber-risks is to think they don’t exist. The other is to try to treat all potential risks. 2SP301 COMMUNITY SERVICE ASSIGNMENT MINI PROJECT -2 GROUP-2 (20BCH005, 20BCH006, 20BCH007, 20BCH008) CYBERCRIME AND ITS POSSIBLE SOLUTIONS Contents 1.) CYBERCRIME> 2.) REASONS FOR CYBERCRIMES > 3.) CYBERCRIME AGAINST INDIVIDUALS > 4.) Cybercrime against organisations > 5.) HOWTO AVOID CYBERCRIME => ..........sscccesseeeerseeees wo DAHMAN 6.) Conclusion> > Cyber crime is the latest and perhaps the most complicated problem in the cyber world, “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime’. Ee TOS ae ceocelae) ~ keyloggi D, Poort NefSael temas calcd aed Beatty hacker UJ AVA OSS > Over the past ten years, crime (traditionally based in the world of physical entity) has been increasingly making its way into the world of information. Crime is evolving; since the days when goods were transported by stagecoach, robbery has changed to keep up, even to our modern-day equivalentcredit and debit cards. Internet credit card number theft has become a well-recognized danger. The most common forms of computer crime reported to Inter-GOV include child pornography, fraud, and e-mail abuse. Even more disturbing are new forms of cyber-terrorism made possible by the large amount of the physical machinery now operated by computers. In this article, after attempting to define computer crime, we examine the types that have been committed in the past, and the new types likely to appear in the future. We also examined the difficulty in detecting and measuring computer crime, methods for attempting to prosecute or prevent such crimes, and the effectiveness of these measures. This article evaluates the concepts of computer crimes, detection and the controls. The paper finally exposed us to dangers it poses to organizations, factors that encourage it, and recommending possible controls and preventive measures against computer crimes. Keywords— Challenge, Cyber Law, Global Cyber Law, International Cyber Criminal Court, World Cyber Cop, World Tribunal. > A generalised definition of cyber crime may be “unlawful acts wherein the computer is either a tool or target or both” The computer may be used as a tool in the following kinds of activity: financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber defamation, cyber stalking, The computer may however be target for unlawful acts in the following cases- unauthorized access to computers / computer systems / computer networks, theft of information contained in the electronic form, e-mail bombing, data diddling, salami attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer system physically damaging the computer system. 2.) REASONS FOR CYBERCRIMES >» > Hart in his work "The Concept of Law’ said that ‘human beings are vulnerable so rule of law is required to protect them’. By applying this to the cyberspace we may say that computers are vulnerable so rule of law is required to protect and safeguard them against cyber crime. The reasons for the vulnerability of computers may be said to be: 1. it yr in comparatively small i= > The computer has a unique characteristic of storing data in a very small space. This allows for much easier access or removal of information through either physical or virtual media. 2.Easy to access:- > The problems encountered in guarding a computer system from unauthorised access are that there is every possibility of unauthorised access not due to human error but due to the complex technology. By secretly implanted a logic bomb, key loggers that can steal access codes, advanced voice recorders; retina imagers etc. that can fool biometric systems and bypass firewalls can be utilised to get past many security systems. ‘omplex- > The computers work on operating systems and these operating systems in turn are composed of millions of lines of code. The human mind is fallible and it is not possible that there might not be a lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate into the computer system using often more sophisticated means than originally anticipated by the systems engineers. > Negligence is very closely connected with human conduct. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber criminal to gain access and control over the computer system. This negligence is usually a property of under resourced IT security provisions and the improvement of security barriers within software packages and network structures could lead to improved security. 5. Loss of evidence:- > Loss of evidence is a very common & obvious problem as all the data is routinely destroyed. Further collection of data outside the territorial extent also paralyses this, system of crime investigation. 3.) CYBERCRIME AGAINST INDIVIDUALS > ‘A major problem of cybercrime against individual can take place towards different types of people such as cybercrime against children, cybercrime against consumers and cybercrime against normal users, It is clear that cybercrime against children is the most significant issue which should be focused on. One of the main areas of cybercrime is child pornography, which is the documented sexual abuse of children, however this excludes pseudo-photographs or computer generated items such as images, drawing, cartoons and painting, Newville (2001) points out that the internet has authorized to child pornography by offering offenders many ways of swapping information without restraint and giving them a chance of learning and improving skis illegally. Thus, under a high activity by predators of finding open contacts with young victims such as teenagers, a rise in the number of children who use the internet and spread child pornography that cause a serious threat to the safety of children, There are several ways that predators used to meet their young victims in public place and one of the common ways is chartrooms. A Suggested Solution of cybercrime against children: One of the solutions that is often offered is that parents should be responsible for th children’s actions on the internet, however, parents are not able to take this responsibility alone because it is difficult and challenging for them to always stay with their children whilst they are surfing the Internet. Thus, this challenge can be tackled by the close cooperation between parents and governments. In terms of the responsibility parents have over their children within their homes, parents are required to be educated enough to recognize the risk of cybercrimes that their children may face while using the internet . This could be rectified by installing protective software on the PC which restricts access to certain websites containing pre-determined key words, for example “sex’. In addition, they should also advise their children to avoid these risks such as talking to the strangers in cyberspace which can lead to dangerous situations Parents should not just rely on using various software andmonitor which websites that their children join. They could restrict their children’s access by only allowing giving them access to pre-screen or pre-approved content on the internet and therefore manage to keep their children safe from any sexually orientated content.. Outside the home responsibility can be taken by states, which have a real effect on safety of children. According to Yar (2006) (cited in Creighton, 2003: 3);" Operation Ore 2003 led to 1,600 arrests in the UK of individuals who had subscribed to a US-based child pornography website: the arrests were made possible by cooperation with US law enforcement authorities who provided credit card details of UK residents who had subscribed to the service’ 4.) Cybercrime against organisations > The second problem of cybercrime is one that is extremely threatening to organisations such as business and political websites, to name but a few. It is quite common that cybercriminals are focused on attacking one particular sector which is commercial websites such as shopping websites and banks. According to a 2001 pilot survey, which 198 businesses responded and proved that 74% have been attacked by cybercriminals who used several tools against them such as a computer varies (Rantala, 2004).Cybercrimes against commercial websites can be accrued in several ways, however, in cyberspace there is one common activity between cybercriminals which is piracy such as downloading music, films and games illegally and stealing information or any substances that are private or not made freely accessible. For instance, the Record Industry Association of America (RIAA) claims that illegally downloaded music costs per annum about $12.5 billion in economic losses. A software piracy which is used by cybercriminals can cause a serious problem in cyberspace, as Cross (2002:39) points out.” the average purse snatcher gets only $20 or $30 per stolen purse, and the average strong-arm robbery (mugging) yields $50 or less. In contrast, pirated software programs often cost from several hundred to several thousand dollars. Thus, economically, one act of software piracy is several times more “serious” than victimization by a petty thief or robber’ A_ Suggested Solution of cybercrime _ against organisation (commercial website): Organisations and companies come under cybercrime attacks in every business activity in cyberspace, therefore, some solutions can be suggested that may help to protect business websites. Companies should develop and secure their websites by providing anti-piracy software which could possibly help to reduce the risk of cybercrime and their activities. In addition, businesses ought to hire some people who are sophisticated and experts in computer security to supervise their content and materials which give a secure environment in cyberspace. Moreover, companies should be advised to join some organisation and international cooperation groups in order to eliminate piracy as well as establish an international law in cyberspace, which punishes anyone who commits action of cybercrime. 5.) HOW TO AVOID CYBER CRIMES > Know How To Recognize Phishing. Your bank won't send you an email telling you that your account has been compromised and asking you to provide sensitive account and personal information like password, PIN ete. it already has. These are obviously phishing attempts. > Recognize that your Smart-phone is really a pocket size computer and is prone to the same types of attacks directed at your laptop and desktop. Take steps to protect it, such as keeping your operating system current and creating a strong password. > Keep your personal information to yourself. For instance, don't put your entire birth date, including the year, on Facebook. Think about the security questions normally posed by your bank and other secure locations: "first school you attended," "name of favourite pet" and the like. > Know the pitfalls of public Wi-Fi. CreditCards.com says, "Avoid public wireless Internet connections unless you have beefed-up security protection.” > Beware of public computers, too. For instance, Kiplinger says, "Don't access your accounts or personal information on public hotel computers, which could have software that logs keystrokes and records your passwords and account numbers.” > Use credit cards, rather than debit cards, when making purchases online. In case of fraud, you'll get much better protection from liability with a _—_ | credit card. > Purchase only from reputable websites (and look for "https" in the Web address). "It is really easy to create a fake online store or to create a store that sells stuff, but its real purpose is to collect credit card information," former identity thief Dan DeFelippi told CreditCards.com. > Check your accounts and your credit reports regularly. Some experts recommend that you check bank account and credit card activity every day. You can pull a free credit report every four months from AnnualCreditReport.com to verify that fraudulent accounts have not been created in your name. > Avoid suspicious E-mails. Don't click on links in suspicious emails, even those that appear to be from friends. Emailed viruses and malware are the most prevalent cyber threat of identity theft. Just think of how many emails you've gotten in the last year that appeared to be from friends whose email accounts were hijacked. 6.) Conclusion> This essay has gone some way in explaining the concept of cybercrime as well as addressing two important problems of cybercrime, which are cybercrime against individual such as child pornography and cybercrime against organisation such as piracy Moreover, there are some suggested solutions to each problem that can be met depending on the difficulty of applying and monitoring them. On the other hand, cybercrime is a growing concern throughout the world, thus, research must continue to take place in order to keep cyberspace as safe as possible and protected from the actions committed by cybercriminals. On the other hand it has been proven that it is the responsibility of the individual to protect his/her own Internet connection. It could therefore be suggested that Governments and local authorities including Police and Education Services should work more closely with the Internet Service Providers to protect minors on the Internet. Despite all the developments in the domain of Child Protection Software, young people will always find a way of avoiding a protective firewall. Therefore education would serve an important role in protecting children Furthermore if the culprits are identified law enforcers could punish and remove the criminals’ access to the nternet. The misuse of computers is a serious issue in the eyes of the law, and under English Law, the Computer Misuse Act (1990) would be central to prosecuting any individual who attempts to use a computer unlawfully. By addressing their weaknesses, as | have mentioned in this essay both businesses and individuals could strengthen their internet security thereby stopping these preventable attacks of Cybercrime

You might also like