By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email
No need to pay just yet!
About this sample
About this sample
Words: 2343 |
Pages: 5|
12 min read
Published: May 17, 2022
Words: 2343|Pages: 5|12 min read
Published: May 17, 2022
As we are all aware that in todays world most of things, whether it be online education or online transactions, are done using internet. This internet technology has also been used by few people for carring out criminal activities. Criminals that indulge in cyber crimes used their knowledge to gain benefits quickly. They used their expertise to steal, deceive and exploit people as they find it easy to earn money without having to do an honest day’s work. Though, various measures have been provided including cyber law, for avoiding cyber crimes, there is no warranty that following these measures will prevent one from being victim of cyber crime. To discuss the notion of cyber crime, this essay analyzes the meaning, types, and ways to avoid cyber crime.
Cyber crime evolved since 1990 when computers and networks came in to being. The types of attacks gradually grew from “Morris code worm” in 1997 to “Torjan” in 2004 and to “Ransom ware “ attack in 2013.
When computers and networks came into being in the 1990s, hacking was done basically to get more information about the systems. Initially, these hacking attempts were brushed off as mere nuisance as they did not pose a long-term threat. However, with malicious software becoming ubiquitous during the same period, hacking started making networks and systems slow. As hackers became more skillful, they started using their knowledge and expertise to gain benefit by exploiting and victimizing others. Wherever the rate of return on investment is high and the risk is low, you are bound to find people willing to take advantage of the situation. This is exactly what happens in cyber crime. Accessing sensitive information and data and using it means a rich harvest of returns. Catching such criminals is also very difficult. Hence, this has led to a rise in cyber crime across the world. Today, criminals that indulge in cyber crimes are not driven by ego or expertise. Instead, they want to use their knowledge to gain benefits quickly. They are using their expertise to steal, deceive and exploit people as they find it easy to earn money without having to do an honest day’s work.
The World Wide Web sounds like a vast phenomenon but surprisingly one of its qualities is bringing the world closer making it a smaller place to live in for its users. However, it has also managed to create another problem for people who spend long hours browsing the Cyber World – which is cyber crimes. When any crime is committed over the Internet it is referred to as a cyber crime. Cyber crimes have become a real threat today and are quite different from old-school crimes, such as robbing, mugging or stealing. Unlike these crimes, cyber crimes can be committed single handedly and does not require the physical presence of the criminals. The crimes can be committed from a remote location and the criminals need not worry about the law enforcement agencies in the country where they are committing crimes.
People all over the world use the Internet to commit a host of crimes, some of which the public doesn't even know are capable of being done electronically. The most common Internet crimes are as follows:
In the 1980s, computer viruses were generally passed from one user to another user via floppy disks. Hence, users in the 1980s did not need anti-virus software if they both (1) only purchased software from reputable sources and (2) never copied programs from floppy disks provided by their friends and colleagues.
Three developments in the 1990s made anti-virus software essential for all computer users:
Since everyone uses e-mail and nearly everyone will download executable software from the Internet, everyone should have a good anti-virus program running on their machine.
As a virus, worm, or other malicious program can be transmitted via an attachment to e-mail, one should rigorously follow three rules:
It is good practice to erect a 'firewall' between parts of a computer system that an external user can access (e.g., via modem or Internet or voice mail) and parts that are supposedly accessible only by a local user. Many hackers run programs that randomly search the Internet and probe ports on computers that are connected to the Internet. If the hacker finds a port that is 'open', the hacker might be able to access that computer and view/alter/delete files on that computer. Worse, hackers may also hijack the victim's computer and use it to launch their illegal attacks on other computers.
For casual on-line activities, you can establish a free e-mail account at Yahoo, HotMail, or some other provider, and use an alias for that account. If someone harasses or stalks you, then you simply close that account and chose another alias. In other words, you adopt a disposable identity for your life in cyberspace.
Never give out your real name, address, city, telephone number, or other identifying information to a stranger in a chat room, computer bulletin board, or other public place.
The only connection between phishing and computers is that modern phishing uses e-mail and a bogus website to get a gullible person to disclose personal financial information to criminals. That having been said, it is worthwhile to alert people to the existence of phishing. People first encounter phishing when they receive a fraudulent e-mail that typically purports to be from a bank, credit card company, or other financial institution. The e-mail might mention something about your account is suspended until you 'verify', 'update', or 'validate' some information. The e-mail invites you to click on a link in the e-mail. The link typically takes you to a webserver located in a foreign country and operated by criminals, who display webpages with the logo and trademarks of a bank, credit card company, or government agency, which makes the webpage appear legitimate. The bogus webpage asks you to supply your account numbers, passwords, and other personal information (e.g., Social Security number, date of birth, mother's maiden name) that can be used to fraudulently access your financial accounts and perpetrate identity theft crimes.
If a computer virus or an invading hacker deletes your files, or either one corrupts your files, the easiest way to restore your computer may be to reformat the hard drive(s) and then copy files from a recent backup. Backups also offer protection from more common (and less exotic) threats such as accidental deletion of a file by an authorized user or failure of a hard disk drive.
Cyber Law took birth in order to take control over the crimes committed through the internet or the cyberspace or through the uses of computer resources.
According to Wikipedia “The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an act of the Indian Parliament (no 21 of 2000), it was notified on 17th October 2000. It is the most important law in India that deals with the digital crimes or cyber crimes and electronic commerce. It is based on the United Nations Model Law on Electronic Commerce 1996 (UNCITRAL Model) recommended by the General Assembly of United Nations by a resolution dated 30 January 1997”.
To conclude the essay, cyber crime has become great threat to mankind. Protection against cybercrime is a vital part for social, cultural and security aspect of a country. The Government of India has enacted IT Act, 2000 to deal with cybercrimes. Any part of the world cyber crime could be originated passing national boundaries over the internet creating both technical and legal complexities of investigating and prosecuting these crimes. The international harmonizing efforts, coordination and co-operation among various nations are required to take action towards the cyber crimes. There is no warranty that following these suggestions will prevent one from being a victim of computer crime, but at least one can make it a little harder for a criminal, and maybe the criminal will find an easier target.
Browse our vast selection of original essay samples, each expertly formatted and styled