Anda di halaman 1dari 4

CYBER CRIME ND SECURITY

SANDHIYA.K, SRUTHI.S

sandhiya052k@gmail.com , sruthikumar0106@gmail.com

PSGR KRISHNAMMAL COLLEGE FOR WOMEN

INTRODUCTION: hopes that the unsuspecting computer user


will enter several bits of personal
Cybercrime is any criminal activity that information such as their banking
involves a computer, networked device or passwords, home address or even social
a network. While most cybercrimes are security number. To avoid phishing scams,
carried out in order to generate profit for we recommend using a phishing filter
the cybercriminals, some cybercrimes are feature on your web browser so that it can
carried out against computers or devices actively scan websites that you visit to
directly to damage or disable them, while check if they have been identified as a
others use computers or networks to spread phishing website.
malware, illegal information, images or
other materials. Some cybercrimes do both 2. Identity Theft scams
-- i.e., target computers to infect them with
viruses, which are then spread to other Cyber crooks who may have gained access
machines and, sometimes, entire networks. to your credit card or banking account
information may use that information to
A primary impact from cybercrime is make purchases in your name. Identity
financial, and cybercrime can include theft has been a major issue even before
many different types of profit-driven the conception of the Internet but as you
criminal activity, including ransomware may already know, the virtual world has
attacks, email and internet fraud and made it much easier for criminals to utilize
identity fraud, as well as attempts to steal and steal your identity. One of the easiest
financial account, credit card or other and lest expensive things to do to protect
payment card information. Cybercriminals your identity is to closely monitor your
may target private personal information, as accounts. If you notice suspicious activity,
well as corporate data for theft and resale. you should report it to the proper
Top 5 Popular Cybercrimes to Effortlessly authorities immediately. Be proactive and
Protect Your Computer and Data against do not waste time in these situations.
its Impact Identity theft scams are very prevalent
online and may come in the form of a
1. Phishing scams spam email, website or even an online
Phishing is a practice of a cybercriminal or pop-up survey. Phishing is a major
hacker attempting to obtain sensitive or contributor to identity theft also.
personal information from a computer
3. Online Harassment
user. This process is usually accomplished
through phishing websites which are Harassment online is usually related to
designed to mimic a legitimate website in your social lifestyle and if you choose to
use a popular social network such as activities. Many of these specific crimes
Facebook or Twitter. Online harassment are punishable under the law. If you ever
can consist of threats sent through email, suspect someone invading your privacy,
instant message or through a social you can simply contact the police and file
network message/post. Usually, it is a report. Local authorities can handle these
simple to report these threats to the social situations most times without seeking a
network you're being harassed on. specific online law enforcement
Harassment can also be found to result in organization.
cyberbullying kids which can have dire
consequences as you may have witnessed In any of the above cases, you should
recently in the media where a 13-year-old always have the proper computer security
kid from Dardenne Prairie, Missouri, applications installed and updated on your
named Megan Meier committed suicide computer which may include a trustworthy
from being bullied online. Our suggestion anti-spyware or anti-virus program.
for handling harassment online is to Having security software installed and
immediately report any activity out of the running on your system will ensure that
ordinary before it gets out of hand even if you are protected from known threats that
you may know the person on the other end. can lead to any of the above situations and
Often online impostors who harass you help protect you against cybercrimes.
online do it to find your 'breaking point'
but you should never let it get that far.
CYBER LAW:
4. Cyberstalking
Cyber law is the part of the overall legal
Cyberstalkers will go to great lengths to system that deals with the Internet,
try to monitor a victims online activity. cyberspace, and their respective legal
This may include infecting a person's issues. Cyber law covers a fairly broad
computer with malware that is able to log area, encompassing several subtopics
computer activity. Cyberstalkers are also including freedom of expression, access to
known to continually harass their potential and usage of the Internet, and online
victims. Cyberstalking cases should also privacy. Generically, cyber law has been
be reported to authorities, just like online referred to as the Law of the Internet.
harassment cases. Cyberstalkers may
contact a victim's colleagues, friends and ADVANTAGES OF CYBER LAWS:
other online contacts in an effort to slander
The IT Act 2000 attempts to change
them or extract personal information from
outdated laws and provides ways to deal
them.
with cyber crimes. We need such laws so
5. Invasion of privacy that people can perform purchase
transactions over the Net through credit
The invasion of privacy is basically the act cards without fear of misuse. The Act
of someone attempting to intrude on a offers the much-needed legal framework
person's personal life. This includes so that information is not denied legal
hacking into a person's computer, reading effect, validity or enforceability, solely on
their emails or monitoring online
the ground that it is in the form of Government in electronic form by
electronic records. means of such electronic form as
may be prescribed by the
In view of the growth in transactions and appropriate Government.
communications carried out through
 The IT Act also addresses the
electronic records, the Act seeks to
important issues of security, which
empower government departments to
are so critical to the success of
accept filing, creating and retention of
electronic transactions. The Act has
official documents in the digital format.
given a legal definition to the
The Act has also proposed a legal
concept of secure digital signatures
framework for the authentication and
that would be required to have been
origin of electronic records /
passed through a system of a
communications through digital signature.
security procedure, as stipulated by
 From the perspective of e- the Government at a later date.
commerce in India, the IT Act  Under the IT Act, 2000, it shall
2000 and its provisions contain now be possible for corporates to
many positive aspects. Firstly, the have a statutory remedy in case if
implications of these provisions for anyone breaks into their computer
the e-businesses would be that systems or network and causes
email would now be a valid and  damages or copies data. The
legal form of communication in our remedy provided by the Act is in
country that can be duly produced the form of monetary damages, not
and approved in a court of law. exceeding Rs. 1 crore.
 Companies shall now be able to
CYBER SECURITY:
carry out electronic commerce
using the legal infrastructure Computer security, cybersecurity or
provided by the Act. information technology security (IT
 Digital signatures have been given security) is the protection of computer
legal validity and sanction in the systems from theft or damage to their
Act. hardware, software or electronic data, as
 The Act throws open the doors for well as from disruption or misdirection of
the entry of corporate companies in the services they provide.
the business of being Certifying
The field is growing in importance due to
Authorities for issuing Digital
increasing reliance on computer systems,
Signatures Certificates.
the Internet and wireless networks such as
 The Act now allows Government
Bluetooth and Wi-Fi, and due to the
to issue notification on the web
growth of "smart" devices, including
thus heralding e-governance.
smartphones, televisions and the various
 The Act enables the companies to
tiny devices that constitute the Internet of
file any form, application or any
things. Due to its complexity, both in
other document with any office,
terms of politics and technology, it is also
authority, body or agency owned or
one of the major challenges of the
controlled by the appropriate
contemporary world.

Anda mungkin juga menyukai