Professional Documents
Culture Documents
It Cia 3B
It Cia 3B
1
INDEX
1 What is Cybercrime 3
3 Impact of Cybercrime 8
Conclusion
6 11
7 References 12
What is Cybercrime?
2
Cybercrime is criminal activity that either targets or uses a computer, a computer network or
a networked device. Most cybercrime is committed by cybercriminals or hackers who want to
make money. However, occasionally cybercrime aims to damage computers or networks for
reasons other than profit. These could be political or personal.
Cybercriminals are often doing both at once. They may target computers with viruses first
and then use them to spread malware to other machines or throughout a network. Some
jurisdictions recognize a third category of cybercrime which is where a computer is used as
an accessory to crime. An example of this is using a computer to store stolen data.
With 4.5 million attacks in July 2020, India was the country with the highest number of
attacks, making it vital to raise awareness about cybercrime. The first incident of cybercrime
was documented in 1973. A computer was used by a teller at a New York bank to pilfer over
two million dollars. The first email spam was sent in 1978.
3
Tool and Techniques
1. Phishing
A popular illustration of a phishing trick occurred during the World Cup in 2018. As
indicated by our report, 2018 Misrepresentation World Cup , the World Cup phishing
trick included messages that were shipped off football fans. These spam messages
attempted to tempt fans with counterfeit free outings to Moscow, where the World
Cup was being facilitated. Individuals who opened and tapped on the connections
contained in these messages had their own information taken.
One more kind of phishing effort is known as spear phishing. These are focused on
phishing efforts which attempt to fool explicit people into risking the security of their
employer.
Dissimilar to mass phishing efforts, which are extremely broad in style, stick phishing
messages are regularly created to seem to be messages from a confided in source. For
instance, they are made to appear as though they have come from the President or the
IT administrator. They may not contain any visual pieces of information that they are
phony.
4
2. Distributed Dos Attacks
Distributed DoS attacks (DDoS) are a type of cybercrime attack that cybercriminals
use to bring down a system or network. Sometimes connected IoT (Internet of
Things) devices are used to launch DDoS attacks.
A famous example of this type of attack is the 2017 DDoS attack on the UK National
Lottery website. This brought the lottery’s website and mobile app offline, preventing
UK citizens from playing. The reason behind the attack remains unknown, however,
it is suspected that the attack was an attempt to blackmail the National Lottery.
3. Malware Attacks
5
Tools used in Cybercrime are mentioned below:
1. Encase
2. Data Dumper
This is a command-line computer forensic tool. It is freely available for the UNIX
Operating system, which can make exact copies of disks suitable for digital
forensic analysis.
3. Kali Linux
4. Ophcrack
This tool is mainly used for cracking the hashes, which are generated by the same
files of windows. It offers a secure GUI system and allows you to runs on multiple
platforms.
5. Md5sum
A tool to check helps you to check data is copied to another storage successfully
or not.
6
7
Impact Of Cybercrime
8
Impact of Cybercrime on businesses
Assume an online business gathers clients' card subtleties when the client makes a
web-based installment. This monster partnership has a large number of clients.
Presently say, something like 70% of their clients make installments utilizing check
cards, Visas, UPIs, advanced wallets, and so on. This implies that the business has
constructed a monstrous web-based client data set. On the off chance that the
organization doesn't go to satisfactory lengths to get and scramble its clients' delicate
monetary data, programmers can make the most of the smallest of weaknesses and
hack into inside frameworks. They can get to clients' card data and track it back to
their financial balances and take cash. This can make monetary misfortune many
individuals, prompting an enormous ruckus in the public eye.
9
Keep your software updated
This is especially important with your operating systems and internet security
software. Cybercriminals frequently use known exploits, or flaws, in your software to
gain access to your system. Patching those exploits and flaws can make it less likely
that you’ll become a cybercrime target.
10
Law and Order Issues
The public and worldwide data sets have data around millions and billions of
individuals for identity purpose. However, the cybercrime rehearses and hacking of
these touchy sites have established the groundwork for some rule of peace and law
circumstances. These days, it is exceptionally simple to get to somebody's data
through long range interpersonal communication locales, however the instances of
ATM defrauding, utilizing counterfeit sim cards and public character cards have made
it truly challenging for policing to primary the harmony.
Culture
The issues of education, uneven distribution of wealth, multi-ethnic and
multigenerational workforce are commonly discussed in society. The information
systems have made it difficult to learn the latest knowledge for all as the this latest
education can be possessed by privileged social class only which is increasing
disparity among society. Therefore, a specific educated class is getting benefit from
the technology in a true sense. Furthermore, the information technology has realized
the generation gap as senior citizens have lack of knowledge about information
systems and new technology.
Relationship Isssues
Unlike past, the development of partnerships are more diverse with long distant teams
working together. The relationship of buyers, sellers and suppliers have become easy,
but it has also created social issues like lack of trust and low moral values. Many
cases have been reported where people have used personal and business information
for their stake or fraud purpose.
11
Conclusion
India was the country with the highest number of cybercrimes in 2020, amounting to
4.5 million. Cybercrime refers to criminal behaviour committed by using a computer
or other electronic device connected to the internet. This blog provides information
about cybercrime, the various risks it poses, and the strategies for prevention from the
same.
Cybercrime is the criminal behaviour of unauthorized access to computer systems.
Cyber security provides a thorough understanding of how cyber-attacks can be
controlled or recovered. Online courses provide advice on how cyber-crimes and
cybercrime hazards can be prevented, protected, and recovered.
The fact that someone can steal the identity of a person, prescribe the wrong
medication, or commit a financial crime with someone’s phone pose a threat to
society that is moving to communications in cyberspace. It might be stated that
cyberattacks in the future may have more massive societal implications as people
continue to increase their dependency on the Internet, technologies, and services
provided online. Society can be the aim of cybercriminals who have their intentions,
and nobody knows how it will affect the development of countries and cities. Still,
everyone should be aware of the upcoming threat.
12
You might think that the only form of cybercrime you have to worry about is hackers
stealing your financial information. But it may not be so simple. There are far more
concerns than just basic financial ones. Cybercrime continues to evolve, with new
threats surfacing every year.
References
https://www.kaspersky.co.in/resource-center/threats/what-is-cybercrime
https://us.norton.com/blog/how-to/how-to-recognize-and-protect-yourself-from-
cybercrime
https://www.sbigeneral.in/blog-details/effect-of-cyber-crime#:~:text=The%20ill
%20effects%20of%20cybercrimes,affect%20society%20in%20numerous
%20ways.&text=Cybercrime%20can%20take%20numerous%20forms,or
%20serious%20threats%20like%20terrorism.
https://studycorgi.com/cybercrime-and-its-impact-on-society/
https://intellipaat.com/blog/what-is-cybercrime/
The information technology has had a greater impact on the human life in all aspects, so it is very
necessary to highlight the issues associated with it. The information systems have created many
ethical, social, political and moral issues related to data privacy, integrity, accessibility, ownership,
accountability or control, cultural values, behaviours and identity, health and safety.
These ethical and social issues about individuals, groups, business, and institutions have a serious
dramatic impact which needs to be catered with long-term strategic approaches, research-based
possible solutions and theoretical support available in all fields.
13