You are on page 1of 4

SOCIETAL IMPACTS

PART II

Page 1 of 4
Cyber Crime: It is defined as a crime in which a computer is the object. Any criminal act that is
facilitated by the use of electronic gadgets such as computer, smartphone, laptop etc. through the
internet is referred as cybercrime . Cyber Crime may be referred to as computer crime.

Cyber Crimes can generally be divided into 2 categories.

i) Crimes that target computer networks or devices: These types of crimes include
viruses and denial of Service attacks.
ii) Crimes that use Computer Networks to advance other criminal activities. These Types
of crimes include cyberstalking, phishing and fraud or identity theft.

Phishing: It is the practice of attempting to acquire sensitive information from individuals over
the internet by means of deception. Information typically targeted by phishing schemes include
passwords, usernames, bank account information and social security numbers.

Protective measures against Phishing:

 Keep your operating system updated


 Use a reputable anti virus program
 Never open or download a file from an unsolicited email.
 Enable 2 factor authentication whenever available.

Illegal Downloads: Illegal downloading refers to obtaining files for which you don’t have right
to use or download from the Internet. It is downloading a paid digital item without making any
payment and using an illegal way to download it.

Examples of Illegal downloads:

 Downloading a movie which is not available for download


 Downloading a copy of the licensed software by passing the legal measures

Scams: Any fraudulent business practice that extracts money from an unsuspecting ignorant
person is called a scam. Scams traditionally resided in confidence tricks where an individual
would misrepresent themselves as someone with skill or authority ie a doctor, lawyer, investor.
Scans committed over internet are called online scams.

Child Pornography: It is defined as any visual or written representation (including images,


movies or texts) that depicts or advocate any sexual activity of any one under the age of 18.

Page 2 of 4
INFORMATION TECHNOLOGY ACT 2000 & INDIAN PENAL CODE 1860
PROVIDES PROTECTION FROM CHILD PRONOGRAPHY.

Punishments against Child Pornography:

 1st conviction with 2 to 5 years of imprisonment and a fine of Rs 1 lakh


 2nd or subsequent conviction with an imprisonment of upto 7 to 10 years and also a fine
which may extend to 10 lakhs
INFORMATION TECHNOLOGY ACT, 2000
The Information Technology act,2000 also known as ITA 2000 or the IT act is an act of the Indian
Parliament notified on 17th October 2000.It is the primary law in India dealing with cybercrime and
electronic commerce.IT Act 2000’s prime purpose was to provide a legal recognition to
electronic commerce and to facilitate filling of electronic records with the government. The
laws apply to the whole of India. Persons of other nationalities can also be indicted under the law if
the crime involves a computer or network located in India.
Cyber Fraud/Internet Fraud: It refers to any scheme that uses one or more components of the
internet such as chat rooms, email, message boards or websites to present fraudulent solicitations to
prospective victims to conduct fraudulent transactions.
Types of Cyber Frauds:
Credit/Debit Card Fraud: This involves the use of credit/debit card to obtain money or acquire
properties without appropriate authorization.
Non-delivery Of Goods/Service Fraud: This refers to a scam in which people are encouraged to
pay for goods or service through a web portal and then nothing is delivered to the buyer.
Spoofing: It is a type of fraud in which a fraudster masquerades as another person by using the other
person’s identity to transact business and obtain vital information such as bank account number,
credit card numbers and associated passwords.

Identity Theft: This entails the use of another person’s personal information without appropriate
consent for the purpose of fraudulent practices. Online Identity theft refers to an act of stealing
someone else’s personal information such as name, login details etc. and then posing as person
online. It is the theft of personal information in order to commit fraud or crimes.
Eg. Someone uses another person’s credit card number, Aadhaar number etc.
Online Identity theft is carried out through
1) Phishing via your email account
2) Staling your online purchase information

Page 3 of 4
Auction Fraud: In Auction Fraud people are encouraged to participate in online auction and when
money has been paid for specific items the fraudster would send either a lower standard item or a
counterfeit.
Hacking: Hacking is an attempt to exploit a computer system or a private network inside a
computer. Simply put, it is the unauthorized access to or control over computer network security
systems for some illicit purpose.
Classification Of Hackers
Hackers are mainly classified into three. They are
i) White Hat Hackers :White Hat hackers are also known as Ethical Hackers. They never
intent to harm a system, rather they try to find out weaknesses in a computer or a network
system as a part of penetration testing and vulnerability assessments. This is not illegal.

ii) Black Hat Hackers : Black Hat hackers, also known as crackers, are those who hack in order
to gain unauthorized access to a system and harm its operations or steal sensitive information.

Crackers are illegal.

iii) Grey Hat Hackers: Grey hat hackers are a blend of both black hat and white hat hackers.
They act without malicious intent but for their fun, they exploit a security weakness in a
computer system or network without the owner’s permission or knowledge.

Cyberbullying: Cyberbullying is bullying that takes place over digital devices like cell phones,
computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social
media, forums, or gaming where people can view, participate in, or share content. Cyberbullying
includes sending, posting, or sharing negative, harmful, false, or mean content about someone else.

The most common places where cyberbullying occurs are:

 Social Media, such as Facebook, Instagram, Snapchat, and Twitter


 SMS (Short Message Service) also known as Text Message sent through devices

 Instant Message (via devices, email provider services, apps, and social media messaging
features)

 Email

Page 4 of 4

You might also like