CYBER CRIME

 CYBER CRIME

CYBERCRIME, also called Computer Crime, the use of a COMPUTER as an instrument to further illegal ends, such as committing FRAUD, trafficking in child pornography and intellectual property, STEALING IDENTITIES, or violating privacy. CYBERCRIME, especially through the INTERNET, has grown in importance as the computer has become central to commerce, entertainment, and government.

Because of the early and widespread adoption of computers and the INTERNET in the United States, most of the earliest victims and villains of CYBERCRIMES were Americans. By the 21st century, though, hardly a hamlet remained anywhere in the world that had not been touched by CYBERCRIMES of one sort or another.



Top 5 Popular Cybercrimes to Effortlessly Protect Your Computer and Data Against its Impact
  1. Phishing scams. Phishing is a practice of a cybercriminal or hacker attempting to obtain sensitive or personal information from a computer user. 
  2. Identity Theft scams
  3. Online Harassment. 
  4. Cyberstalking. 
  5. Invasion of privacy.

CYBERCRIMES ranges across a spectrum of activities. At one end are crimes that involve fundamental breaches of personal or corporate privacy, such as assaults on the integrity of information held in digital depositories and the use of illegally obtained digital information to BLACKMAILS a firm or individual. Also at this end of the spectrum is the growing crime of IDENTITY THEFT. Midway along the spectrum lie transaction-based crimes such as FRAUD, trafficking in child PORNOGRAPHY, digital PIRACY, MONEY TRAFFICING, and COUNTERFEIGHTING. These are specific crimes with specific victims, but the criminal hides in the relative anonymity provided by the INTERNET. Another part of this type of crime involves individuals within corporations or government bureaucracies deliberately altering data for either profit or political objectives. At the other end of the spectrum are those crimes that involve attempts to disrupt the actual workings of the Internet. These range from SPAM, HACKING, and DENIAL OF SERVICE ATTACK against specific sites to acts of cyberterrorism—that is, the use of the Internet to cause public disturbances and even death. Cyberterrorism focuses upon the use of the Internet by nonstate actors to affect a nation’s economic and technological infrastructure. Since the September 11 attacks of 2001, public awareness of the threat of cyberterrorism has grown dramatically.

                               CYBER CRIME IN INDIA

  • Biometric data, unlike passwords, can never be changed, so if hackers successfully impersonate a fingerprint then they can cause serious havoc.
  • The Defence Cyber Agency will have more than 1,000 experts who will be distributed into a number of formations of the Army, Navy and IAF.
  • Cyber crime investigations require the law enforcement to be nimble on their feet as well as technologically proficient but that is often not the case.
  • The regulations will be country neutral and will aim at boosting local manufacturing, said the official, who did not wish to be identified.
  • A breach, or a compromise of the digital perimeter of a company, is one of those things most firms think happen to others.
  • Researchers claim to have discovered a weakness in a Wi-Fi security protocol called WPA2 that leaves password-protected Wi-Fi connections open to cyber-attacks and manipulation.
  • Hackers will exert huge influence over our lives as we move towards an even more connected world. Civil society and governments need to invest in understanding them.
SOME VIDEOS MAY HELP IN UNDERSTANDING MORE ABOUT CYBERCRIME









THANK YOU









Comments

Popular posts from this blog

COMMON HAZARDS AT WORK PLACE

AMERICA'S GOT TALENT

FELICIT'S BLOG