Anda di halaman 1dari 11

ROBOTIC MONSTROSITY; GENESIS

FURTHERMORE ,OUT-TURN AND PANACEA


INTRODUCTION
 Computer crimes are reckoned to be a stumbling
block.
 Recent development of internet has lead to increase
in computer crimes
 The crimes are more heinous than conventional
crimes.
 Crime is committed in electronic medium
 Identity of criminal is always hidden.
 Blue whale has lead to huge hue and cry.
 They are daggering the lives of innocent teenagers.
 They are dark underbelly of the cyberworld.
 Cyber crimes can be committed anywhere in world.
HISTORY AND EVOLUTION
 The first recorded cyber crime took place in 1820.
 In India, Japan, China the era of modern computer began with analytical
engine of Charles Babbage.
 The first spam email came in 1976.
 The first virus was installed in 1982 on a Apple Computer when a high school
student Rich Skrenta developed the EIK CLONER.
 Cases like Captain Zap invasion of white house switch boards to hack into
classified military files.
 Computer Fraud and Abuse Act,1986 and Economic Espionage Act,1996 paved
way for safeguarding against cyber threats.
STATISTICS RELATED TO CYBER CRIMES
 The fact that nearly 120 million population living in India and almost everyone has access to
internet nearly 69% of information thereat is carried on in India.
 65% million active internet users , up by 28% from 51 million in 2010.
 346 million mobile users have subscribed to data packages and over 40 million have access to
social media sites.
 India is the no. 1 country in the world for generating spam.
 86%adults have been victim of cyber crime and 17% of them have experienced them on their
mobile phones.
 Recent journal entry India stands 11th in ranking for cyber crimes in the world which is 3% of
world’s global cyber crime.
CHARACTERISTICS OF CYBER CRIMES
 Silent in nature.
 Global in Character.
 Non existence of physical evidence.
 Creates high impact
 No crime scene
WHAT IS CYBER CRIME?
 A generalized definition of cyber crime is “unlawful acts wherein the
computer is either a tool or target or both”.9
 According to Pavan Duggal, “Cyber crime refers to all the activities done
with criminal intent in cyberspace or using the medium of internet. These
could either be the criminal activities in the conventional sense or activities
newly endowed with the growth of the new medium . Any activity which
basically offends human sensibilities , can be included in the ambit of
cybercrimes.
 Any criminal activity that uses a computer either as an instrumentality ,
target or means for perpetuating further crimes comes within the ambit of
cyber crime
CLASSIFICATION OF CYBER CRIMES
They are classified on various basis they are as follows-
 INDIVIDUAL: This type of cyber crime can be in the articulation of cyber stalking, distributing pornography,
trafficking and “grooming”. Today, law enforcement agencies are taking this bracket of cyber crime very intently
and are joining forces internationally to outreach and arrest the perpetrators.
 PROPERTY: Just like in the real world where a criminal can steal and rob, even in the cyber world criminals
recourse to stealing and robbing. In this case, they can steal a person’s bank details and ; misuse the credit card to
make numerous purchases online run a scam to get innocent people to part with their hard earned money; use
malicious software to procure access to an organization’s website or disrupt the systems of the organization. The
malicious software can also damage software and hardware, just like vandals damage property in the offline
realm.
 GOVERNMENT: Although not as common as the other two categories, crimes against a government are referred
to as cyber terrorism. If successful, this category can lead to mayhem and justify trepidation amongst the civilian
population. In this connection, criminals hack government websites, military websites or involve in circulation of
propaganda has been discerned that most cyber criminals have a loose network wherein they collaborate and
cooperate with one another. Unlike the actual world, these criminals do not fight one another for ascendancy or to
maintain their reign. Instead they work together to improve their skills by providing help and support to their
members. Hence, the accustomed methods of fighting crime cannot be used against cyber criminals. While law
enforcement agencies are trying to keep tempo with cyber criminals, it is proving to be a Herculean task. This is
substantially because the methods used by cyber criminals and technology keeps changing too briskly for law
enforcement agencies to be effectual.
TYPES OF CYBER CRIMES
 Unauthorized access- The unauthorized access to computer systems
or networks means any person who secures or attempts to secure
access to a protected system.
 E-mail Bombing- It refers to sending a large amount of emails to
victims resulting in victim’s email id crashing.
 Data diddling- It means altering the raw data just before the
computer processes it and then changing it back after the processing
is done with.
 Data Leakage- It pertains to illegally copying the master file
information of the computer for ransom or blackmailing or any other
deceitful purpose.
 Virus Attack- Virus is a program that attaches itself to a computer or a
file then circulates itself to other files. It affects the data on computer
by altering or deleting it
TYPES
 Super Zapping- It is a logic through which an intruder is able to penetrate into the system areas and can
change the programmes .The intruder can create an extra system administrator level password for himself
without the knowledge of the real administrator.
 Cyber Squatting- It is the practice by which a person or legal entity books up the trade mark, business name
of another entity a his domain name. It is for the purpose of holding on to it and thereafter selling the
domain name to any other person for a fortune. They book names of important brands in hope of earning
quick millions.
 Software Piracy- Once a computer operator obtains a copy of the software he can easily duplicate it without
notifying the author and sell it for profit. It violates the copyright laws.
 Password Sniffers- They are programs that monitor and record the name and password of network users as
they log in jeopardizing security at the site. Whoever installs the sniffer can impersonate an authorized user
and log into access restricted documents.
 Hacking: This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive
information can be accessed. In the United States, hacking is classified as a felony and punishable as such.
This is different from ethical hacking, which many organizations use to check their Internet security
protection. In hacking, the criminal uses a variety of software to enter a person’s computer and the person
may not be aware that his computer is being accessed from a remote location.
SUGGESTIONS
LEGAL RESPONSE- Cybercrime has become source of concern for the governments across the world. The absence of any established
international law on cyber crime has further complicated the issue. The solution to the problems stemming from inadequate laws is that
countries need to reach a consensus as to which computer related activity should be criminalized and then to commit to taking
appropriate domestic actions14. We have seen that to control cybercrimes very few nations have come forward to implement legal
provisions for their effectiveness . An immediate need of a universal legal framework to combat the issue of cyber crime and to give
effect to such a hypothesis it would be comprehensive to have international convention for taking cognizance.

OPERATIONAL RESPONSE- This area is dealt with police and lawmakers. Law enforcement machinery should involve themselves
professionals and experts in the field The basic requirements for this to be successful are-
 Requirement of cyber courts.
 Adoption of full proof computer procedures in organizations
 Trained investigating officers, prosecutors and judges.
 Close co-ordination among all departments of state on computer crime investigations
 Establish a public education program on prevention of computer crimes.

TECHNICAL RESPONSE- Apart from legal and operational response one needs technological mechanism to control
cyber crimes These points would prove effective-
 Maintain the most current anti-virus software programme and install updates for the system.
 Regularly maintain the cyber security updates and patches
 Keep backup copies for data , files and information on removable media.
 Use a firewall to make unauthorized entry into computer system more difficult
Thank You

Made by JUHI BHUTANI

Anda mungkin juga menyukai