KEMBAR78
Computer Project | PDF | Cybercrime | Security
0% found this document useful (0 votes)
3 views17 pages

Computer Project

The document discusses the rapid growth of the internet in India and its associated opportunities and risks, particularly focusing on cybercrime. It categorizes cybercrimes into three major types: against persons, property, and government, detailing various examples and forms of cybercrime such as cyberstalking and cyberterrorism. Additionally, it provides tips on how to protect oneself from cybercrime, emphasizing the importance of online security measures.

Uploaded by

Rakesh Mad Man
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views17 pages

Computer Project

The document discusses the rapid growth of the internet in India and its associated opportunities and risks, particularly focusing on cybercrime. It categorizes cybercrimes into three major types: against persons, property, and government, detailing various examples and forms of cybercrime such as cyberstalking and cyberterrorism. Additionally, it provides tips on how to protect oneself from cybercrime, emphasizing the importance of online security measures.

Uploaded by

Rakesh Mad Man
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 17

The internet in India is growing rapidly.

It has
given rise to new opportunities in every field we can think
of – be it entertainment, business, sports or education.
There are two sides to a coin. Internet also has its own
disadvantages.
One of the major disadvantages is Cybercrime –
illegal activitiy committed on the internet. The internet,
along with its advantages, has also exposed us to security
risks that come with connecting to a large network.
Computers today are being misused for illegal
activities like e-mail espionage, credit card fraud, spams,
software piracy and so on, which invade our privacy and
offend our senses. Criminal activities in the cyberspace are
on the rise. Here we publish an article by Nandini
Ramprasad in series for the benefit of our netizens. –Ed.
What is this Cyber crime?
We read about it in newspapers very often.
Let's look at the dictionary definition of Cybercrime: "It is a
criminal activity committed on the internet. This is a broad
term that describes everything from electronic cracking to
denial of service attacks that cause electronic commerce sites
to lose money".

Mr. Pavan Duggal, who is the President of


cyberlaws.net and consultant, in a report has clearly defined
the various categories and types of cybercrimes.

Cybercrimes can be basically divided into 3 major categories:

1. Cybercrimes against persons.

2. Cybercrimes against property.

3. Cybercrimes against government.


Cybercrimes committed against persons
include various crimes like transmission of child-
pornography, harassment of any one with the use of a
computer such as e-mail. The trafficking, distribution,
posting, and dissemination of obscene material
including pornography and indecent exposure,
constitutes one of the most important Cybercrimes
known today. The potential harm of such a crime to
humanity can hardly be amplified. This is one
Cybercrime which threatens to undermine the growth of
the younger generation as also leave irreparable scars
and injury on the younger generation, if not controlled.

A minor girl in Ahmedabad was lured to a


private place through cyberchat by a man, who, along
with his friends, attempted to gangrape her. As some
passersby heard her cry, she was rescued.
Another example wherein the damage was not
done to a person but to the masses is the case of the Melissa
virus. The Melissa virus first appeared on the internet in
March of 1999. It spread rapidly throughout computer
systems in the United States and Europe. It is estimated that
the virus caused 80 million dollars in damages to computers
worldwide.

In the United States alone, the virus made its way


through 1.2 million computers in one-fifth of the country's
largest businesses. David Smith pleaded guilty on Dec. 9,
1999 to state and federal charges associated with his
creation of the Melissa virus. There are numerous examples
of such computer viruses few of them being "Melissa" and
"love bug".

Cyberharassment is a distinct Cybercrime. Various


kinds of harassment can and do occur in cyberspace, or
through the use of cyberspace. Harassment can be sexual,
racial, religious, or other. Persons perpetuating such
harassment are also guilty of cybercrimes.
Types of Cybercrime

Assault by Threat : – threatening a person with fear


for their lives or the lives of their families or persons
whose safety they are responsible for (such as
employees or communities) through the use of a
computer network such as email, videos, or phones.

Child Pornography : – the use of computer networks


to create, distribute, or access materials that
sexually exploit underage children.

Cyber Contraband :– transferring illegal items


through the internet (such as encryption
technology) that is banned in some locations.
Cyberlaundering : – electronic transfer of illegally-
obtained monies with the goal of hiding its source and
possibly its destination.

Cyberstalking – express or implied physical threats that


creates fear through the use of computer technology
such as email, phones, text messages, webcams,
websites or videos.

Cyberterrorism – premeditated, usually politically-


motivated violence committed against civilians through
the use of, or with the help of,
computer techology.

Cybertheft – using a computer to steal. This includes


activities related to: breaking and entering, DNS cache
poisoning, embezzlement and unlawful appropriation,
espionage, identity theft, fraud, malicious hacking,
plagiarism, and piracy. Examples include:
How to Protect yourself from Cyber Crime

1. Create difficult to guess passwords for all online


accounts and pin numbers. Vary your passwords so that if
one of your passwords is ever compromised you won't have
to worry about all of your accounts.

2. Purchase a good antivirus software for your


computer. Many programs now come with "total
protection" systems that will safeguard your online
experience and the data stored on your computer.
This will keep your computer from being infected with
viruses, malware or spyware.
3. Be cautious about using photos for your online
profiles. This is even more important if the profile is for
someone under age. Don't post photos that can be harmful
to your reputation.
4. Safe keep all of your personal information
including your full name, address, phone number,
social security number, account numbers, and
passwords. Do not place such personal information on
your multi-media devices such as computers, mp3
players, and cell phones. Shred all paperwork with
such personal information on it.

5. Check your financial statements monthly to


ensure there are no unusual transactions.

6. Never go to see someone you've only met online


unless you are with a group of people and are in a
public place. No matter how well you think you know
someone it is best to have the wisdom of friends and
family around you to help guide you through the
meeting.
Cyberterrorism

4. Cyberterrorism is a phrase used to describe the use


of Internet based attacks in terrorist activities, including
acts of deliberate, large-scale disruption of computer
networks, especially of personal computers attached to
the Internet, by the means of tools such as
computer viruses.Cyberterrorism is a controversial term.
Some authors choose a very narrow definition, relating
to deployments, by known terrorist organizations, of
disruption attacks against information systems for the
primary purpose of creating alarm and panic. By this
narrow definition, it is difficult to identify any instances
of cyberterrorism.

5. Cyberterrorism can also be defined much more


generally as any computer crime targeting
computer networks without necessarily affecting real
world infrastructure, property, or lives.
History

4. Public interest in cyberterrorism began in the late


1980s. As 2000 approached, the fear and
uncertainty about the millennium bug heightened
and interest in potential cyberterrorist attacks also
increased. However, although the millennium bug
was by no means a terrorist attack or plot against
the world or the United States, it did act as a
catalyst in sparking the fears of a possibly large-
scale devastating cyber-attack. Commentators
noted that many of the facts of such incidents
seemed to change, often with exaggerated media
reports.
4. The high profile terrorist attacks in the United States
on September 11, 2001 and the ensuing War on Terror
by the US led to further media coverage of the
potential threats of cyberterrorism in the years
following. Mainstream media coverage often discusses
the possibility of a large attack making use of
computer networks to sabotage critical infrastructures
with the aim of putting human lives in jeopardy or
causing disruption on a national scale either directly or
by disruption of the national economy.
5. Authors such as Winn Schwartau and John Arquilla are
reported to have had considerable financial success
selling books which described what were purported to
be plausible scenarios of mayhem caused by
cyberterrorism. Many critics claim that these books
were unrealistic in their assessments of whether the
attacks described

You might also like