INTRODUCTION: hopes that the unsuspecting computer user
will enter several bits of personal Cybercrime is any criminal activity that information such as their banking involves a computer, networked device or passwords, home address or even social a network. While most cybercrimes are security number. To avoid phishing scams, carried out in order to generate profit for we recommend using a phishing filter the cybercriminals, some cybercrimes are feature on your web browser so that it can carried out against computers or devices actively scan websites that you visit to directly to damage or disable them, while check if they have been identified as a others use computers or networks to spread phishing website. malware, illegal information, images or other materials. Some cybercrimes do both 2. Identity Theft scams -- i.e., target computers to infect them with viruses, which are then spread to other Cyber crooks who may have gained access machines and, sometimes, entire networks. to your credit card or banking account information may use that information to A primary impact from cybercrime is make purchases in your name. Identity financial, and cybercrime can include theft has been a major issue even before many different types of profit-driven the conception of the Internet but as you criminal activity, including ransomware may already know, the virtual world has attacks, email and internet fraud and made it much easier for criminals to utilize identity fraud, as well as attempts to steal and steal your identity. One of the easiest financial account, credit card or other and lest expensive things to do to protect payment card information. Cybercriminals your identity is to closely monitor your may target private personal information, as accounts. If you notice suspicious activity, well as corporate data for theft and resale. you should report it to the proper Top 5 Popular Cybercrimes to Effortlessly authorities immediately. Be proactive and Protect Your Computer and Data against do not waste time in these situations. its Impact Identity theft scams are very prevalent online and may come in the form of a 1. Phishing scams spam email, website or even an online Phishing is a practice of a cybercriminal or pop-up survey. Phishing is a major hacker attempting to obtain sensitive or contributor to identity theft also. personal information from a computer 3. Online Harassment user. This process is usually accomplished through phishing websites which are Harassment online is usually related to designed to mimic a legitimate website in your social lifestyle and if you choose to use a popular social network such as activities. Many of these specific crimes Facebook or Twitter. Online harassment are punishable under the law. If you ever can consist of threats sent through email, suspect someone invading your privacy, instant message or through a social you can simply contact the police and file network message/post. Usually, it is a report. Local authorities can handle these simple to report these threats to the social situations most times without seeking a network you're being harassed on. specific online law enforcement Harassment can also be found to result in organization. cyberbullying kids which can have dire consequences as you may have witnessed In any of the above cases, you should recently in the media where a 13-year-old always have the proper computer security kid from Dardenne Prairie, Missouri, applications installed and updated on your named Megan Meier committed suicide computer which may include a trustworthy from being bullied online. Our suggestion anti-spyware or anti-virus program. for handling harassment online is to Having security software installed and immediately report any activity out of the running on your system will ensure that ordinary before it gets out of hand even if you are protected from known threats that you may know the person on the other end. can lead to any of the above situations and Often online impostors who harass you help protect you against cybercrimes. online do it to find your 'breaking point' but you should never let it get that far. CYBER LAW: 4. Cyberstalking Cyber law is the part of the overall legal Cyberstalkers will go to great lengths to system that deals with the Internet, try to monitor a victims online activity. cyberspace, and their respective legal This may include infecting a person's issues. Cyber law covers a fairly broad computer with malware that is able to log area, encompassing several subtopics computer activity. Cyberstalkers are also including freedom of expression, access to known to continually harass their potential and usage of the Internet, and online victims. Cyberstalking cases should also privacy. Generically, cyber law has been be reported to authorities, just like online referred to as the Law of the Internet. harassment cases. Cyberstalkers may contact a victim's colleagues, friends and ADVANTAGES OF CYBER LAWS: other online contacts in an effort to slander The IT Act 2000 attempts to change them or extract personal information from outdated laws and provides ways to deal them. with cyber crimes. We need such laws so 5. Invasion of privacy that people can perform purchase transactions over the Net through credit The invasion of privacy is basically the act cards without fear of misuse. The Act of someone attempting to intrude on a offers the much-needed legal framework person's personal life. This includes so that information is not denied legal hacking into a person's computer, reading effect, validity or enforceability, solely on their emails or monitoring online the ground that it is in the form of Government in electronic form by electronic records. means of such electronic form as may be prescribed by the In view of the growth in transactions and appropriate Government. communications carried out through The IT Act also addresses the electronic records, the Act seeks to important issues of security, which empower government departments to are so critical to the success of accept filing, creating and retention of electronic transactions. The Act has official documents in the digital format. given a legal definition to the The Act has also proposed a legal concept of secure digital signatures framework for the authentication and that would be required to have been origin of electronic records / passed through a system of a communications through digital signature. security procedure, as stipulated by From the perspective of e- the Government at a later date. commerce in India, the IT Act Under the IT Act, 2000, it shall 2000 and its provisions contain now be possible for corporates to many positive aspects. Firstly, the have a statutory remedy in case if implications of these provisions for anyone breaks into their computer the e-businesses would be that systems or network and causes email would now be a valid and damages or copies data. The legal form of communication in our remedy provided by the Act is in country that can be duly produced the form of monetary damages, not and approved in a court of law. exceeding Rs. 1 crore. Companies shall now be able to CYBER SECURITY: carry out electronic commerce using the legal infrastructure Computer security, cybersecurity or provided by the Act. information technology security (IT Digital signatures have been given security) is the protection of computer legal validity and sanction in the systems from theft or damage to their Act. hardware, software or electronic data, as The Act throws open the doors for well as from disruption or misdirection of the entry of corporate companies in the services they provide. the business of being Certifying The field is growing in importance due to Authorities for issuing Digital increasing reliance on computer systems, Signatures Certificates. the Internet and wireless networks such as The Act now allows Government Bluetooth and Wi-Fi, and due to the to issue notification on the web growth of "smart" devices, including thus heralding e-governance. smartphones, televisions and the various The Act enables the companies to tiny devices that constitute the Internet of file any form, application or any things. Due to its complexity, both in other document with any office, terms of politics and technology, it is also authority, body or agency owned or one of the major challenges of the controlled by the appropriate contemporary world.