ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING
Peer Reviewed and Refereed Journal IMPACT FACTOR: 2.104 (INTERNATIONAL JOURNAL) UGC APPROVED NO. 48767, ISSN No. 2456-1037
Vol.03, Issue 03, March 2018 Available Online: www.ajeee.co.in/index.php/AJEEE
1
CYBER CRIME, AWARENESS AND PREVENTION Dr. Sunil Kumar
Assistant Professor, A.N.D. Teachers Training P.G. College, Sitapur, UP.
Shubham Mishra
M.Ed. Stu., A.N.D. Teachers Training P.G. College, Sitapur, UP.
1 INTRODUCTION
In present scenario, information and communication technologies are omnipresent anddigitalization in all areas is expanding and the world of internet today has become a parallel form of life and living. Theusage of Internet is one of the fastest-growing areas of technical infrastructure development.The availability of ICTs is a foundation for development in the creation, availability and use of network-based services.The introduction of ICTs into many aspects of everyday life has led to the development of the modern concept of the information society as it offers great opportunities.
Unhindered access to information can support democracy, as the flow of information is taken out of the control of state authorities, online banking and shopping, the use of mobile data services and voice over Internet protocol telephony are just some examples of how far the integration of ICTs into our daily lives and education system.
E-mails have displaced traditional letters; online web representation is nowadays more important for businesses than printed publicity materials and Internet-based communication and phone services are growing faster than landline communications.
But on the other side, the growth of the information society is accompanied by new and serious threats too, like different forms crime committed or facilitated via the Internet, may be termed as cybercrime.
It can be said that cybercrimes are those crimes which have the involvement of computer and network.
Cybercrime is defined as crimes committed on the internet using the computer as either a tool or a targeted victim. It as an intended act involving the use of computers or other technologies, and the criminal activity must take place in a virtual setting, such as the Internet.According
to Council of Europe “Any criminal offence committed against or with the help of a computer network is identified as cybercrime”. So computer is must for cybercrime.It has some different name such as computer crime‖, ―computer-related crime‖, ―high- tech crime‖, ―Internet crime‖.
1.1 Cybercrimes share three elements:
1. Tools and techniques to perpetrate a crime.
2. Approach or methodology for executing the criminal plan — known as a vector.
3. Crime itself that is the end result of those plans and activities (a cybercrime is the ultimate objective of the criminal’s activities).
2 COMMON TYPES OF CYBERCRIME – Nowa days there are several types of cyber-crime taking place in India as well as in the world. Some common types of cybercrimes and their description are as follows -
1. Phishing - Phishing occurs when the perpetrator sends fictitious emails to individuals with links to fraudulent websites that appear official and thereby cause the victim to release personal information to the perpetrator.
2. Spoofing - Spoofing is use of email to trick an individual into providing personal information t hat is later used for unauthorized purposes.
3. Botnet - A Botnet infection occurs when a hacker transmits instructions to other computers for the purpose of controlling them, and then using them for various purposes such as spam or phishing.
4. Computer Virus - A computer virus is a computer program that piggybacks or attaches itself to application programs or other
ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING
Peer Reviewed and Refereed Journal IMPACT FACTOR: 2.104 (INTERNATIONAL JOURNAL) UGC APPROVED NO. 48767, ISSN No. 2456-1037
Vol.03, Issue 03, March 2018 Available Online: www.ajeee.co.in/index.php/AJEEE
2 executable system software; the virus subsequently activates, sometimes causing severe damage to computer systems or files.
5. Netspionage - Netspionage occurs when perpetrators hack into online systems or individual PCs to obtain confidential information for the purpose of selling it to other parties (criminals).
6. Online credit card fraud - Online credit card fraud is illegal online acquisition of a credit card number and use of it for unauthorized purposes such as fraudulent purchases.
7. E-theft–E-theft occurs when a perpetrator hacks into a financial institution e.g. a bank and diverts funds to accounts accessible to the criminal. To prevent e-theft, most major banks severely limit what clients can do online.
8. Online denial of service - Online denial of service is use of email barrages, computer viruses, or other techniques to damage or shut down online computer systems, resulting in loss of business.
9. Spam - Spam refers to unsolicited email; spam is illegal if it violates the Can-Spam Act of 2003, such as by not giving recipients an opt out method.
10. E-fraud - E-fraud is the use of online techniques by a perpetrator to commit fraud.
Popular forms of e-fraud include spoofing, phishing, and online credit card fraud.
11. Cyberterrorism - Cyber terrorism occurs when terrorists cause virtual destruction in online computer systems
12. Software Piracy - Software piracy is the theft of intellectual assets associated with computer programs.
So, as we saw above that in today’s generation many types of cybercrimes have evolved and people are continuously becoming victim of it. So, a need arisesto make people aware of cyber crimes so that they can’t be a victim of it.
3 PREVENTION FROM CYBERCRIME/
CYBERCRIME PREVENTION TIPS – 1. Use Strong Passwords- Use different
user ID/password combinations for different accounts and avoid writing them down. Make the passwords more complicated by combining letters, numbers, special characters.
2. Secure your computer- Activate your firewall. Use anti-virus/malware software. Prevent viruses from infecting your computer by installing and regularly updating anti-virus software.
3. Block spyware attacks- Prevent spyware from infiltrating your computer by installing and updating anti-spyware software.
4. Be Social-Media Savvy- Make sure your social networking profiles (e.g.
Facebook, Twitter, YouTube, MSN, etc.) are set to private.
5. Secure your Mobile Devices - Be aware that your mobile device is vulnerable to viruses and hackers.Download applications from trusted sources. Install the latest operating system.
6. Protect your Data- Use encryption for your most sensitive files such as tax returns or financial records.
7. Secure your wireless network - Wi- Fi (wireless) networks are vulnerable to intrusion if they are not properly secured.Review and modify default settings.
8. Protect your e-identity- Be cautious when giving out personal information such as your name, address, phone number or financial information on the Internet.
9. Avoid being scammed - Always think before you click on a link or file of unknown origin.Don’t feel pressured by any emails. Check the source of the message. When in doubt, verify the source.
10. Back Up Important Files :Reduce risk of losing files to a virus, computer collapse, robbery or tragedy by producing back-up copies. Keep your critical files in one place on your computer’s hard drive so you can easily create a backup copy.
11. Parental Control - Monitor the online activities of your children.
They should only have access to a computer located in a central area of
ACCENT JOURNAL OF ECONOMICS ECOLOGY & ENGINEERING
Peer Reviewed and Refereed Journal IMPACT FACTOR: 2.104 (INTERNATIONAL JOURNAL) UGC APPROVED NO. 48767, ISSN No. 2456-1037
Vol.03, Issue 03, March 2018 Available Online: www.ajeee.co.in/index.php/AJEEE
3 your home and you should regularly check all browser and email activity.
A wise thing to do is to use parental control software that limits the types of sites the user can gain access to.
4 CONCLUSION
As we have seen that it’s the world of internet today. Because of lack of time in today’s world, respondent is more like to work online. There is gateway to make a payment for online transaction, but hackers may hack their accounts and make online frauds. Social websites also have more preference by the respondent.
There is also respondent made some cyber-crime such as hacking others social accounts. Respondents are also a victim of pornography. This is also one of the offences of Cyber Crime. So, as the cases
of cybercrimes are increasing day by day it is the foremost need to become of what cybercrime is? , and what are the steps through which we can keep us safe and not become a victim so that it becomes easy to tackle with it.
REFERENCES
1. Malhotra. T. (2017). CYBER CRIME AWARENESS AMONG TEACHER TRAINEES:
Scholarly Research Journal for Interdisciplinary Studies, Pg. No. (5249-5258) Retrieved from www.srjis.com.
2. https://bitsbusinessit.com/top-10-cyber- crime-prevention-tips/.
3. Kumbhar. M. A STUDY OF CYBERCRIME AWARENESS FOR PREVENTION AND ITS IMPACT: Journal of Recent Trends In Research, Pg. No. (248).
4. https://sites.google.com/site/callingoffcyberc rime/preventions-and-precautions.
5. https://www.rcmp-grc.gc.ca/to-ot/tis- set/cyber-tips-conseils-eng.htm.