Professional Documents
Culture Documents
Accountants of India
Meaning
History
Types of Cybercrime
Increasing trends in Cybercrime
Need for Security
Security Measures
Government’s protocol for Cyber security
Meaning
Cybercrime means any
unlawful act where computer
or communication device or
computer network is used
to commit or facilitate the
commission of a crime.
Cybercrime is criminal activity that either targets or uses a
computer, a computer network or a networked device.
History and Evolution of Cybercrime
While cyber crime existed before this, the
major wave of cyber crime came with the
proliferation of email during the late 80’s.
It allowed for a host of scams and/or
malware to be delivered to your inbox.
The next wave in the cyber crime history
timeline came in the 90’s with the
advancement of web browsers.
Viruses were emerging during this time
and they were delivered through Internet
connections whenever questionable
websites were visited.
Spoofing:
Spoofing means illegal intrusion, posing as a genuine
user. It refers to thing that appears to have been
originated from one source when it was actually sent
from another source.
Credit Card Fraud:
If electronic transaction are not secured the credit
card number can be stolen by the hackers who can
misuse this card by impersonating the credit card
owner.
Cyber Terrorism:
Targeted attacks on military installations, power
plants, air traffic control, telecommunication network
are the most likely targets. Others like police,
medical, fire and rescue systems etc can also be the
target.
Defamation:
Defamation can be understood as the intentional
infringement of another person’s right to his good name.
Defamation can be understood as the tarnishing the image,
respect or dignity of any person in front of right thinking
members of the society.
Cyber Stalking:
Cyberstalking can be defined as the repeated acts of
harrassment or threatening behaviour of the cybercrimimal
towards the victim by using Internet Services. Cyber-
stalking refers to the the use of the internet, e-mail, or other
electronic communications device to stalk another person.
Spamming:
Spam is flooding the Internet with many copies of the
same message, in an attempt to force the message on
people who would not otherwise choose to receive it.
Most spam is commercial advertising.
Data Diddling:
Data diddling involves changing data prior or during
input into a computer. Information is c hanged from
the way it should be entered by a person typing. It
also includes automatic changing the financial
information for some time before processing.
The above stated crimes are not the only types of
cybercrime instead there are a lot different kinds of
Cybercrime. But they are some one the most
common types of Cybercrime that occur on our
daily basis.
Increasing Trends in Cybercrime
Analysis of Chart:
The above figure clearly shows that upto 2008 the rate of crime was low and
steady for all and number of cases registered in Mumbai and Maharashtra were
low , but after 2008 the rate of cybercrime has increased.
With respect to Mumbai, there is no continuous rise, but abruptly there are falls
in 2011 and 2013.This can be attributed to the amendment in the IT act in 2008 to
make it more flexible.
It is also noticeable that after 2014 there is a drop in the rate of increase of
cybercrime in India.
Need for Security
The need of Cyber security comes down to the desire to keep
information, data, and devices private and safe.
Companies need Cyber security to keep their data, finances
and intellectual property safe.
With Cyber security, companies do not have to worry about
the unauthorized users accessing their network or data.
By implementing security, businesses and individuals can
protect themselves against the full range of cyber security
threats.
Cyber security is very important because of some security threats and
cyber-attacks. It is important because not only it helps to secure
information but also our system from virus attack.
Security Measures
Cyber Security is the
application of
technologies,
processes and controls
to protect systems,
networks, programs, devices, and data from Cyber
attacks.
The following processes and tools can be used as
security measures:
1) Use strong Passwords:
Strong passwords are vital to good online security. Make your
password difficult to guess by using
a combination of capital and lower-case letters, numbers and
symbol,
making it between eight and 12 characters long,
avoiding the use of personal data,
changing it regularly,
Never using it for multiple accounts
Using two factor authentication
Create a password policy for your business to help staff follow
security best practice.
2) Control Access:
Make sure that individuals can only access data and
services foe which they are authorised.
For example you can:
Control physical access to premise and computer
network
Restrict access to unauthorised users
Limit access to data or services through
application controls
Restrict what can be copied from the system and
saved to storage devices
Limit sending and receiving of certain types of
email attachments.
3) Put up a Firewall:
Firewall are effectively gatekeepers between your
comnputer and the internet, and one of the major
barriers to prevent the spread of cyber threats such
as viruses and malware.