HIRE WRITER

Cyber Crime and Hackers Attack

This is FREE sample
This text is free, available online and used for guidance and inspiration. Need a 100% unique paper? Order a custom essay.
  • Any subject
  • Within the deadline
  • Without paying in advance
Get custom essay

Abstract

Cyber crime encloses criminal acts that involve computer and networks. Cyber crime are effected by the way of illegel access to others database, data interference, system interference, misuse of devices, forgery and electronic scams.

Introduction

Cyber crime or we can say that computer oriented crime is the crime which involves a computer and a network. Cyber crime is defined as the offences that are committed against the individual o group of individuals with a criminal motive to intentionally harm the reputation of the victims and also cause physical and mental harm or loss to the victim directly or indirectly using modern networks such as internet and mobile phones. Cyber crime may terrorize a person or a nation’s security and financial health.

Cyber crime or we can say that computer oriented crime is the crime which involves a computer and a network. Cyber crime is defined as the offences that are committed against the individual o group of individuals with a criminal motive to intentionally harm the:

  • Hackers

Hacker is a term applied to a ‘Computer use who intends to gain unauthorized access to a computer

  • Crackers

A ‘cracker’ is a hacker with criminal contents .

  • Hacktivism

Hacktivism is an act of promoting a political agenda by hacking, especially by disabling websites and the person who do this is known as hacktivist.

Types of Cyber Crime

Cyber crime is of two types violent or potentially violent and non violent.

Crime under violent category are:

  • Cyber terrorism – cyber terrorism is criminal who uses computer technology and internet, especially to cause fear and disruption.
  • Assault by threat – assault is an act of the person which creates fear, apprehension in the mind of another person.
  • Child pornography – to take the sexual picture of person under 18 and share that picture or blackmailing them for their profit.
  • Cyber stalking – cyber stalking is an act of following someone by hacking and steaks all the information and can make your pictures viral.

Crimes come under non violent category:

  • Cyber theft – cyber theft is using someone’s information without their permission.
  • Cyber fraud – it involve the hiding of information or providing incorrect information for the purpose of tricking victims out of money and property
  • Cyber trespass – in this the criminal has access to your data but he does not change and modify the data.
  • Destructive cyber crime – in this criminal destroys all your data and send viruses and worms to your computer.

Computer Viruses

Computer virus connects itself with a program and when the program executes then virus gets enabled and transfer to the another computer . virus damages the files in system and also the hardware and software. Virus cannot affect the files until the executable is opened and it cannot spread without human actions.

Worms

A worm same as virus by its design and it is the subclass of the virus and gets spread by computer to computer. A worm has the ability to replicates itself and send its copies to another computer by itself. And worm does not require human action to spread.

Trojan Horses

A Trojan Horses is a computer program that contains hidden regular programs. It harm our system when gets installed or executed by us. When Trojan gets installed the result may vary and file gets changed and it can also delete the files.

Cyber Laws in India

The information technology act came in 2000, on 17th October. The purpose of this Act is to provide legel recognition to electronic commerce and to facilitate fling of electronic records with the government. This act consisted of 94 sections. Its aim is to provide legal framework to all electronic records. This act came to amend the Indian Penal Code, The Indian Evidence Act 1872, The Banker’s Book Evidence Act 1891, and Reserve Bank of India Act 1934. IT Amendment Act-2008 has been passed by the parliament on 23rd December 2008. It has be notified on October 27, 2009. This is the new version of IT Act 2000. It provide additional focus on information security. Several new sections are added on crimes including cyber terrorism and data protection.

Importance of cyber laws

we live in a digital world so all the companies depend on their computer networks and keep their valuable data in electronic form. All the government forms like income tax returns, company laws forms now filled in electronic form and consumers also increase the use of credit cards and all. Most of the are using e-mails, cell phones, messages for communication.

Advantages of Cyber Laws

This helps people to perform their transaction without any fear through internet. This helps companies and organizations to run their business online without the fear and facing losses due to cyber crimes. This law helps to protect the personal information and provide privacy. This law makes the use of e-commerce easy. This law made the shopping a lot easier because people prefer shopping online nowadays and it is safe now due to cyber laws. This law helps in avoid hacking of personal data and information.

Prevention from cyber crime

  • Use strong and complicated passwords so that no one can access your data .
  • Use anti-virus on your systems and malware software’s also be very effectively used for protecting data.
  • Update your operating system time to time.
  • Secure your mobile devices by unknown persons and be aware that your device is knowing by hackers.
  • Protect your data by using encryption for your most sensitive files such as financial records and also make back-ups for all your important files and data.
  • Protect your E-Identity from hackers when giving out personal; information’s such as names, address and phone numbers on the internet.
  • Always think before u are going to click on any link, if you are in doubt verify the source.
  • Never ever reply to the mails that ask to verify your personal data .
  • Check your profiles on social networking sites are set on private setting and be careful about what you post online.
  • Always prevent your computers from spyware attacks by installing anti-spyware

Disadvantages of Cyber Crimes

  • Cause fear of losing privacy.
  • It result in loss of data and corruption of data.
  • It results in huge loss to a company or an individual.
  • Damage computers and software’s and deleting files by hacking or spreading viruses.
  • This effects the electronic devices and destroy the important information’s and documents .

Conclusion

Though all people use internet now a days so their important data’s is on risk due to cyber crimes . Hackers are always ready to harm the devices and information of the people and make them feel insecure in today’s era all business takes place online and due to cyber crimes. Companies faces so many loses , mental and financial problems . but cyber laws provides people a satisfaction to use the internet without any worry. Many people run their business online nowadays. If they face any problem then cyber law gives them permission to fight for their rights.

Cite this paper

Cyber Crime and Hackers Attack. (2020, Dec 07). Retrieved from https://samploon.com/cyber-crime-and-hackers-attack/

FAQ

FAQ

What are 3 types of attacks by cyber criminals?
The three types of attacks by cyber criminals are malware attacks, phishing attacks, and denial-of-service attacks. Malware attacks involve the installation of malicious software on a victim's computer, while phishing attacks trick users into divulging sensitive information. Denial-of-service attacks involve overwhelming a website or network with traffic to make it unavailable to users.
What is a hacker attack?
A hacker attack is a type of cyberattack in which a hacker seeks to gain unauthorized access to a computer system or network.
What is cyber attack and cyber crime?
Cyber attacks are malicious attempts to access or damage computer networks and systems. Cyber crime is any illegal activity that involves the use of computers or the internet.
What type of crime is a cyber attack?
In predictive analysis, cyber security analysts use data mining and statistical analysis to identify trends and anticipate future events. This allows organizations to take proactive measures to protect their systems and data.
We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Hi!
Peter is on the line!

Don't settle for a cookie-cutter essay. Receive a tailored piece that meets your specific needs and requirements.

Check it out