Cyber crime
Introduction:-
.Crimes that involves a computer and a network.
.offences that are committed against individuals or groups of individuals with a crimnal motive to intentionally harm the reputation of victim or cause physical or mental harm,or loss to the victim directly or indirectly,using modern telecommunication networks such as Internet (networks including chat rooms,emails,notice boards and groups) and mobile phones (Bluetooth /SMS/MMS).
Types of crimes:-
1. Hacking : Hacking in simple terms means an illegal intrusion into a computer system and network.
2.Child Pornography: The Internet is extensively used for sexual abuse of children.
3.Cyber Stalking: This term is used to refer to the use of the internet ,email,or other electronic communication devices to stalk another person.
4.Denial of Service: This is a technology driven cyber instrusion where by the influencer floods the bandwidth or blocks the user's mails with spam mails depriving the user,access to the internet and the services provided therefrom.
5.Dissemenation of Malicious Software (Malware): Malware is defined as a software designed to perform an unwanted illigal act via the computer network.
(a) Virus: A virus is a program that can infect other programs by modifying them to include a possible evolved copy of itself.(b)Worms : Worms are also disseminated through computer networks,unlike viruses ,computer worms are malicious progrs that that copy themselves from system to system ,rather than infiltrating legitimate files.
(C) Trojans : Trojans is another form of Malware,trojans do things other than what is expected by the users.
(d) Hoax : Hoax is an e-mail that warns the user of a certain system that is harming the computer.
(6).Spyware : spyware invades a computer and ,as its name implies monitors a user's activities without consent.
(7).Phising: Phishers lure users to a phony web site , usually by sending them an authentic appearing e-mail.
(8).Data interception: Hijacking e-mails,interference of an intermediary in the network ,may be a prelude to another type of computercrime,typically data modification.
(9).Network Related:
Network interference-any activity that causes the operation of a computer network to be temporarily disrupted.
Conventional cyber crimes:
1.Cyber Defamation
2.corporate Cyber Smear
3.Digital Forgery
4.Online Gambling
5.online sale of illegal articles
5.E-mail spamming/ e-mail bombin
Solutions:
(A) Digital Signature:
A Digital Signature is a technique by which it is possible to secure electronic information in such a way that the information, as well as the integrity of the information, can be verified.
(B) Encryption :
One of the most powerful and important methods for security in computer systems is to be encryp sensitive records and messages in transit and in storage.
(3).Security Audit:
A security audit is a systematic evalution of the security of a company's information system by measuring how well it conforms to a set of established criteria.
(D) Cyber Forensics:
Cyber Forensics is a very important ingredient in the investigation of cyber crimes.Cyber forensics is the discovery, analysis,and reconstruction of evidence extracted from any element of computer systems,computer networks,computer media, and computer peripherals that allow investigators to solve a crime.
Cyber Laws in INDIA
:- Indian Telegraph Act of 1885
:- information Technology Act,2000
. The information Technology Act,2000 intends to give legal recognition to e- commerce and e -governance and facilitate its development as an alternate to paper based traditional methods.
The Act has adopted a functional equivalents approach in which paper based requirements such as docu,records and signatures are replaced with their electronic counterparts.
:-National Cyber security Policy,2013
.To build secure and resillient cyber space Creating a secure cyber ecosystem,generate trust in transaction
.24×7 National critical information infrastructure Protection center Nciipc) indigenous technological solutions ( Chinese products and reliance on foreign software)
CYBER CRIMES IN NEWS
1.SEX -STORTION:- Online Sextortion is one of cyber offensive where online predators,are on prowl to trap the native users especially women ,childre ,teens.They try to befriend them on popular platforms like Social networking platforms, messaging apps,chat rooms etc . And they manipulate them into sharing Intimate content which is later mutualized for sexual favors,blackmailing e.t.c
2.Whatsapp pink virus being spread through Whatsapp groups.
Apk file that promises to download and install a pink-colored whatsapp on the victim's phone.
:- Several Whatsapp users have reported seeing and even forwarding the Whatsapp pink message .
The message claims to download a pink version of Whatsapp instead of the standard Green one.
Once clicked,the link can give complete access of the victim device to the hacker.
3.Chinese Cyber attack on Mumbai :-
Recorded Future said that in the lead -up to the May 2020 border skirmishes,it observed a noticeable increase in the provisioning of PlugX , plugX is a old Malware and targeting of multiple Indian government, public sector and defence organizations from at least May 2020,it said.
While not unique to Chinese cyber espionage activity, PlugX has been heavily used by China-nexus groups for many years.
4.Cyber attack on AIIMS Delhi :
On the morning of November 23,the All India Institute of Medical Science(AIIMS) was hit by a cyberattack.
The management of this leading medical institute said it was a ransomeware attack that affected outpatient and inpatient digital hospital services,including smart lab,billing, report generation, appointment scheduling, e.t.c