Table of Contents
Abstract
Cyber crime encloses criminal acts that involve computer and networks. Cyber crime are effected by the way of illegel access to others database, data interference, system interference, misuse of devices, forgery and electronic scams.
Introduction
Cyber crime or we can say that computer oriented crime is the crime which involves a computer and a network. Cyber crime is defined as the offences that are committed against the individual o group of individuals with a criminal motive to intentionally harm the reputation of the victims and also cause physical and mental harm or loss to the victim directly or indirectly using modern networks such as internet and mobile phones. Cyber crime may terrorize a person or a nation’s security and financial health.
Cyber crime or we can say that computer oriented crime is the crime which involves a computer and a network. Cyber crime is defined as the offences that are committed against the individual o group of individuals with a criminal motive to intentionally harm the:
- Hackers
Hacker is a term applied to a ‘Computer use who intends to gain unauthorized access to a computer
- Crackers
A ‘cracker’ is a hacker with criminal contents .
- Hacktivism
Hacktivism is an act of promoting a political agenda by hacking, especially by disabling websites and the person who do this is known as hacktivist.
Types of Cyber Crime
Cyber crime is of two types violent or potentially violent and non violent.
Crime under violent category are:
- Cyber terrorism – cyber terrorism is criminal who uses computer technology and internet, especially to cause fear and disruption.
- Assault by threat – assault is an act of the person which creates fear, apprehension in the mind of another person.
- Child pornography – to take the sexual picture of person under 18 and share that picture or blackmailing them for their profit.
- Cyber stalking – cyber stalking is an act of following someone by hacking and steaks all the information and can make your pictures viral.
Crimes come under non violent category:
- Cyber theft – cyber theft is using someone’s information without their permission.
- Cyber fraud – it involve the hiding of information or providing incorrect information for the purpose of tricking victims out of money and property
- Cyber trespass – in this the criminal has access to your data but he does not change and modify the data.
- Destructive cyber crime – in this criminal destroys all your data and send viruses and worms to your computer.
Computer Viruses
Computer virus connects itself with a program and when the program executes then virus gets enabled and transfer to the another computer . virus damages the files in system and also the hardware and software. Virus cannot affect the files until the executable is opened and it cannot spread without human actions.
Worms
A worm same as virus by its design and it is the subclass of the virus and gets spread by computer to computer. A worm has the ability to replicates itself and send its copies to another computer by itself. And worm does not require human action to spread.
Trojan Horses
A Trojan Horses is a computer program that contains hidden regular programs. It harm our system when gets installed or executed by us. When Trojan gets installed the result may vary and file gets changed and it can also delete the files.
Cyber Laws in India
The information technology act came in 2000, on 17th October. The purpose of this Act is to provide legel recognition to electronic commerce and to facilitate fling of electronic records with the government. This act consisted of 94 sections. Its aim is to provide legal framework to all electronic records. This act came to amend the Indian Penal Code, The Indian Evidence Act 1872, The Banker’s Book Evidence Act 1891, and Reserve Bank of India Act 1934. IT Amendment Act-2008 has been passed by the parliament on 23rd December 2008. It has be notified on October 27, 2009. This is the new version of IT Act 2000. It provide additional focus on information security. Several new sections are added on crimes including cyber terrorism and data protection.
Importance of cyber laws
we live in a digital world so all the companies depend on their computer networks and keep their valuable data in electronic form. All the government forms like income tax returns, company laws forms now filled in electronic form and consumers also increase the use of credit cards and all. Most of the are using e-mails, cell phones, messages for communication.
Advantages of Cyber Laws
This helps people to perform their transaction without any fear through internet. This helps companies and organizations to run their business online without the fear and facing losses due to cyber crimes. This law helps to protect the personal information and provide privacy. This law makes the use of e-commerce easy. This law made the shopping a lot easier because people prefer shopping online nowadays and it is safe now due to cyber laws. This law helps in avoid hacking of personal data and information.
Prevention from cyber crime
- Use strong and complicated passwords so that no one can access your data .
- Use anti-virus on your systems and malware software’s also be very effectively used for protecting data.
- Update your operating system time to time.
- Secure your mobile devices by unknown persons and be aware that your device is knowing by hackers.
- Protect your data by using encryption for your most sensitive files such as financial records and also make back-ups for all your important files and data.
- Protect your E-Identity from hackers when giving out personal; information’s such as names, address and phone numbers on the internet.
- Always think before u are going to click on any link, if you are in doubt verify the source.
- Never ever reply to the mails that ask to verify your personal data .
- Check your profiles on social networking sites are set on private setting and be careful about what you post online.
- Always prevent your computers from spyware attacks by installing anti-spyware
Disadvantages of Cyber Crimes
- Cause fear of losing privacy.
- It result in loss of data and corruption of data.
- It results in huge loss to a company or an individual.
- Damage computers and software’s and deleting files by hacking or spreading viruses.
- This effects the electronic devices and destroy the important information’s and documents .
Conclusion
Though all people use internet now a days so their important data’s is on risk due to cyber crimes . Hackers are always ready to harm the devices and information of the people and make them feel insecure in today’s era all business takes place online and due to cyber crimes. Companies faces so many loses , mental and financial problems . but cyber laws provides people a satisfaction to use the internet without any worry. Many people run their business online nowadays. If they face any problem then cyber law gives them permission to fight for their rights.