“One of the main cyber-risks is to think they don’t exist. The other is to try to treat all potential risks.
2SP301
COMMUNITY SERVICE ASSIGNMENT
MINI PROJECT -2
GROUP-2
(20BCH005, 20BCH006, 20BCH007, 20BCH008)
CYBERCRIME AND ITS POSSIBLE
SOLUTIONS
Contents
1.) CYBERCRIME>
2.) REASONS FOR CYBERCRIMES >
3.) CYBERCRIME AGAINST INDIVIDUALS >
4.) Cybercrime against organisations >
5.) HOWTO AVOID CYBERCRIME => ..........sscccesseeeerseeees
wo DAHMAN
6.) Conclusion>> Cyber crime is the latest and perhaps the most complicated problem in the cyber
world,
“Any criminal activity that uses a computer either as
an instrumentality, target or a means for perpetuating further crimes comes
within the ambit of cyber crime’.
Ee
TOS ae ceocelae)
~ keyloggi
D,
Poort
NefSael temas calcd
aed
Beatty
hacker UJ AVA OSS
> Over the past ten years, crime (traditionally based in the
world of physical entity) has been increasingly making its way
into the world of information. Crime is evolving; since the days
when goods were transported by stagecoach, robbery haschanged to keep
up, even to our
modern-day
equivalentcredit
and debit cards.
Internet credit
card number theft
has become a
well-recognized danger. The most common forms of
computer crime reported to Inter-GOV include child
pornography, fraud, and e-mail abuse. Even more disturbing
are new forms of cyber-terrorism made possible by the large
amount of the physical machinery now operated by
computers. In this article, after attempting to define
computer crime, we examine the types that have been
committed in the past, and the new types likely to appear in
the future. We also examined the difficulty in detecting and
measuring computer crime, methods for attempting to
prosecute or prevent such crimes, and the effectiveness of
these measures. This article evaluates the concepts of
computer crimes, detection and the controls. The paper
finally exposed us to dangers it poses to organizations, factors
that encourage it, and recommending possible controls and
preventive measures against computer crimes.
Keywords— Challenge, Cyber Law, Global Cyber Law,
International Cyber Criminal Court, World Cyber Cop, World
Tribunal.
> A generalised definition of cyber crime may be “unlawful acts wherein the
computer is either a tool or target or both” The computer may be used as a tool
in the following kinds of activity: financial crimes, sale of illegal articles,
pornography, online gambling, intellectual property crime, e-mail spoofing,
forgery, cyber defamation, cyber stalking, The computer may however be target
for unlawful acts in the following cases- unauthorized access to computers /
computer systems / computer networks, theft of information contained in the
electronic form, e-mail bombing, data diddling, salami attacks, logic bombs,Trojan attacks, internet time thefts, web jacking, theft of computer system
physically damaging the computer system.
2.) REASONS FOR CYBERCRIMES >»
> Hart in his work "The Concept of Law’ said that ‘human beings are vulnerable so
rule of law is required to protect them’. By applying this to the cyberspace we may say
that computers are vulnerable so rule of law is required to protect and safeguard them
against cyber crime. The reasons for the vulnerability of computers may be said to be:
1. it yr in comparatively small i=
> The computer has a unique characteristic of storing data in a very small space. This
allows for much easier access or removal of information through either physical or
virtual media.
2.Easy to access:-
> The problems encountered in guarding a computer system from unauthorised
access are that there is every possibility of unauthorised access not due to human error
but due to the complex technology. By secretly implanted a logic bomb, key loggers
that can steal access codes, advanced voice recorders; retina imagers etc. that can fool
biometric systems and bypass firewalls can be utilised to get past many security
systems.
‘omplex-
> The computers work on operating systems and these operating systems in turn are
composed of millions of lines of code. The human mind is fallible and it is not possible
that there might not be a lapse at any stage. The cyber criminals take advantage of
these lacunas and penetrate into the computer system using often more sophisticated
means than originally anticipated by the systems engineers.
> Negligence is very closely connected with human conduct. It is therefore very
probable that while protecting the computer system there might be any negligence,
which in turn provides a cyber criminal to gain access and control over the computer
system. This negligence is usually a property of under resourced IT security provisions
and the improvement of security barriers within software packages and network
structures could lead to improved security.
5. Loss of evidence:-> Loss of evidence is a very common & obvious problem as all the data is routinely
destroyed. Further collection of data outside the territorial extent also paralyses this,
system of crime investigation.
3.) CYBERCRIME
AGAINST
INDIVIDUALS >
‘A major problem of cybercrime against individual
can take place towards different types of people
such as cybercrime against children, cybercrime
against consumers and cybercrime against normal
users, It is clear that cybercrime against children is
the most significant issue which should be focused on. One of the main areas of
cybercrime is child pornography, which is the documented sexual abuse of children,
however this excludes pseudo-photographs or computer generated items such as
images, drawing, cartoons and painting,
Newville (2001) points out that the internet has authorized to child pornography by
offering offenders many ways of swapping information without restraint and giving
them a chance of learning and improving skis illegally. Thus, under a high activity by
predators of finding open contacts with young victims such as teenagers, a rise in the
number of children who use the internet and spread child pornography that cause a
serious threat to the safety of children, There are several ways that predators used to
meet their young victims in public place and one of the common ways is chartrooms.
A Suggested Solution of cybercrime against children:
One of the solutions that is often offered is that parents should be responsible for th
children’s actions on the internet, however, parents are not able to take this
responsibility alone because it is difficult and challenging for them to always stay with
their children whilst they are surfing the Internet. Thus, this challenge can be tackled by
the close cooperation between parents and governments. In terms of the responsibility
parents have over their children within their homes, parents are required to be
educated enough to recognize the risk of cybercrimes that their children may face
while using the internet . This could be rectified by installing protective software on the
PC which restricts access to certain websites containing pre-determined key words, for
example “sex’. In addition, they should also advise their children to avoid these risks
such as talking to the strangers in cyberspace which can lead to dangerous situations
Parents should not just rely on using various software andmonitor which websites that
their children join. They could restrict their children’s access by only allowing giving
them access to pre-screen or pre-approved content on the internet and thereforemanage to keep their children safe from any sexually orientated content.. Outside the
home responsibility can be taken by states, which have a real effect on safety of
children. According to Yar (2006) (cited in Creighton, 2003: 3);" Operation Ore 2003
led to 1,600 arrests in the UK of individuals who had subscribed to a US-based child
pornography website: the arrests were made possible by cooperation with US law
enforcement authorities who provided credit card details of UK residents who had
subscribed to the service’
4.) Cybercrime against organisations
>
The second problem of cybercrime is one that is extremely threatening to organisations
such as business and political websites, to name but a few. It is quite common that
cybercriminals are focused on attacking one particular sector which is commercial
websites such as shopping websites and banks. According to a 2001 pilot survey,
which 198 businesses responded and proved that 74% have been attacked by
cybercriminals who used several tools against them such as a computer varies
(Rantala, 2004).Cybercrimes against commercial websites can be accrued in several
ways, however, in cyberspace there is one common activity between cybercriminals
which is piracy such as downloading music, films and games illegally and stealing
information or any substances that are private or not made freely accessible. For
instance, the Record Industry Association of America (RIAA) claims that illegally
downloaded music costs per annum about $12.5 billion in economic losses. A software
piracy which is used by cybercriminals can cause a serious problem in cyberspace, as
Cross (2002:39) points out.” the average purse snatcher gets only $20 or $30 per
stolen purse, and the average strong-arm robbery (mugging) yields $50 or less. In
contrast, pirated software programs often cost from several hundred to several
thousand dollars. Thus, economically, one act of software piracy is several times more
“serious” than victimization by a petty thief or robber’A_ Suggested Solution of cybercrime _ against
organisation (commercial website):
Organisations and companies come under cybercrime attacks in every business
activity in cyberspace, therefore, some solutions can be suggested that may help to
protect business websites. Companies should develop and secure their websites by
providing anti-piracy software which could possibly help to reduce the risk of
cybercrime and their activities. In addition, businesses ought to hire some people who
are sophisticated and experts in computer security to supervise their content and
materials which give a secure environment in cyberspace. Moreover, companies
should be advised to join some organisation and international cooperation groups in
order to eliminate piracy as well as establish an international law in cyberspace, which
punishes anyone who commits action of cybercrime.
5.) HOW TO AVOID CYBER CRIMES
> Know How To Recognize Phishing. Your bank won't send you an email
telling you that your account has been compromised and asking you to
provide sensitive account and personal information like password, PIN
ete. it already has. These are obviously phishing attempts.
> Recognize that your Smart-phone is really a pocket size computer and is
prone to the same types of attacks directed at your laptop and desktop.
Take steps to protect it, such as keeping your operating system current and
creating a strong password.
> Keep your personal information to yourself. For instance, don't put your
entire birth date, including the year, on Facebook. Think about the securityquestions normally posed by your bank and other secure locations: "first
school you attended," "name of favourite pet" and the like.
> Know the pitfalls of public Wi-Fi. CreditCards.com says, "Avoid public
wireless Internet connections unless you have beefed-up security
protection.”
> Beware of public computers, too. For instance, Kiplinger says, "Don't
access your accounts or personal information on public hotel computers,
which could have software that logs keystrokes and records your
passwords and account numbers.”
> Use credit cards, rather than debit cards, when making purchases online.
In case of fraud, you'll get much better protection from liability with a
_—_
|
credit card.
> Purchase only from reputable websites (and look for "https" in the Web
address). "It is really easy to create a fake online store or to create a store
that sells stuff, but its real purpose is to collect credit card information,"
former identity thief Dan DeFelippi told CreditCards.com.
> Check your accounts and your credit reports regularly. Some experts
recommend that you check bank account and credit card activity every
day. You can pull a free credit report every four months from
AnnualCreditReport.com to verify that fraudulent accounts have not been
created in your name.
> Avoid suspicious E-mails. Don't click on links in suspicious emails, even
those that appear to be from friends. Emailed viruses and malware are the
most prevalent cyber threat of identity theft. Just think of how manyemails you've gotten in the last year that appeared to be from friends
whose email accounts were hijacked.
6.) Conclusion>
This essay has gone some way in explaining the concept of cybercrime as well as
addressing two important problems of cybercrime, which are cybercrime against
individual such as child pornography and cybercrime against organisation such as
piracy Moreover, there are some suggested solutions to each problem that can be met
depending on the difficulty of applying and monitoring them. On the other hand,
cybercrime is a growing concern throughout the world, thus, research must continue to
take place in order to keep cyberspace as safe as possible and protected from the
actions committed by cybercriminals. On the other hand it has been proven that it is
the responsibility of the individual to protect his/her own Internet connection. It could
therefore be suggested that Governments and local authorities including Police and
Education Services should work more closely with the Internet Service Providers to
protect minors on the Internet. Despite all the developments in the domain of Child
Protection Software, young people will always find a way of avoiding a protective
firewall. Therefore education would serve an important role in protecting children
Furthermore if the culprits are identified law enforcers could punish and remove the
criminals’ access to the nternet. The misuse of computers is a serious issue in the eyes
of the law, and under English Law, the Computer Misuse Act (1990) would be central to
prosecuting any individual who attempts to use a computer unlawfully.
By addressing their weaknesses, as | have mentioned in this essay both businesses and
individuals could strengthen their internet security thereby stopping these preventable
attacks of Cybercrime