Monday, 5 December 2022

CYBER CRIMES

                  Cyber crime

Introduction:-

.Crimes that involves a computer and a network.

.offences that are committed against individuals or groups of individuals with a crimnal motive to intentionally harm the reputation of victim  or cause physical or mental harm,or loss to the victim directly or indirectly,using modern telecommunication networks such as Internet  (networks including chat rooms,emails,notice boards and groups) and mobile phones (Bluetooth /SMS/MMS).



Types of crimes:-

1. Hacking : Hacking in simple terms means an illegal intrusion into a computer system and network.

2.Child Pornography: The Internet is extensively used for sexual abuse of children.

3.Cyber Stalking: This term is used to refer to the use of the internet ,email,or other electronic communication devices to stalk another  person.

4.Denial of Service: This is a technology driven cyber instrusion where by the influencer floods the bandwidth or blocks the user's mails with spam mails depriving the user,access to the internet and the services provided therefrom.


5.Dissemenation of Malicious Software (Malware): Malware is defined as a software designed to perform an unwanted illigal act via the computer network.

(a) Virus: A virus is a program that can infect other programs by modifying  them to include a possible evolved copy of itself.
(b)Worms  : Worms are also disseminated through computer networks,unlike viruses ,computer worms are malicious progrs that that copy themselves  from system to system ,rather than infiltrating legitimate files. 

(C) Trojans : Trojans is another form of Malware,trojans do things other than what is expected by the users.

(d) Hoax : Hoax is an e-mail  that warns the user of a certain system that is harming the computer.

(6).Spyware : spyware invades a computer and ,as its name implies monitors a user's activities  without consent.

(7).Phising: Phishers lure users to a phony web site , usually by sending them an authentic appearing e-mail.

(8).Data interception: Hijacking e-mails,interference  of an intermediary in the network ,may be a prelude to another type of computercrime,typically data modification. 

(9).Network  Related:

Network interference-any activity that causes the operation of a computer network to be temporarily disrupted.

Conventional cyber crimes:

1.Cyber Defamation
2.corporate Cyber Smear
3.Digital Forgery
4.Online Gambling
5.online sale of illegal articles
5.E-mail spamming/  e-mail bombin

Solutions:

(A) Digital Signature:
A Digital Signature  is a technique  by which it is possible to secure electronic information  in such a way that the information, as well as the integrity of the information, can be verified. 
(B) Encryption :
One of the most powerful  and important  methods for security  in computer  systems  is to be encryp sensitive records and messages in transit and in storage.
(3).Security Audit: 
A security  audit is a systematic  evalution of the security  of a company's information  system  by measuring  how well it conforms to a set of established criteria.
(D) Cyber Forensics:
Cyber Forensics is a very important  ingredient in  the investigation  of cyber crimes.Cyber forensics is the discovery, analysis,and reconstruction of evidence extracted from any element of computer  systems,computer networks,computer media, and computer peripherals  that allow  investigators  to solve a crime.
Cyber Laws in INDIA 
:- Indian Telegraph Act of 1885
:- information  Technology Act,2000
.    The information  Technology  Act,2000 intends to give legal recognition  to e- commerce and e -governance and facilitate its development  as an alternate to paper based traditional methods.

The Act has adopted a functional equivalents  approach in which paper based requirements  such as docu,records and signatures are replaced  with their  electronic counterparts.
:-National Cyber security Policy,2013 
.To build secure and resillient cyber space Creating a secure cyber ecosystem,generate trust in  transaction 

.24×7 National  critical information  infrastructure  Protection center Nciipc) indigenous  technological  solutions ( Chinese products and reliance on foreign software)

       CYBER CRIMES IN NEWS

1.SEX -STORTION:- Online  Sextortion is one of cyber offensive where online predators,are on prowl to trap the native users especially women ,childre ,teens.They try to befriend them on popular platforms like Social networking platforms, messaging apps,chat rooms etc . And they manipulate  them into sharing Intimate content which is later mutualized for sexual favors,blackmailing e.t.c

2.Whatsapp pink virus being spread through  Whatsapp groups.

Apk file that promises to download and install a pink-colored whatsapp on the victim's phone.

:- Several Whatsapp users have reported seeing and even forwarding the Whatsapp pink message .

The message claims to download a pink version of Whatsapp instead of the standard Green one. 

Once clicked,the link can give complete access of the victim device to the hacker. 




3.Chinese Cyber attack on Mumbai :-

Recorded Future said that in the lead -up to the May 2020 border skirmishes,it observed a noticeable increase in the provisioning  of PlugX , plugX is a old Malware and targeting of multiple Indian government, public sector and defence organizations from at least May 2020,it said.

While not unique to Chinese cyber espionage activity, PlugX has been heavily used by China-nexus groups for many years.

4.Cyber attack on AIIMS Delhi :

On the morning  of November 23,the All India Institute  of Medical Science(AIIMS) was hit by a cyberattack.

The management of this leading medical institute  said it was a ransomeware attack that affected outpatient and inpatient digital hospital services,including smart lab,billing, report generation, appointment scheduling, e.t.c

RANSOMWARE is a malware designed to deny a user access to files.

By encrypting  files  and demanding  a ransom for the decryptionkey,cyberattackers corner organization into a position, 

Where paying the ransom are the quickest ,easiest,and the cheapest way to regain access  to their files. 

No comments:

Post a Comment

please you have any doubts, please let me know.

CYBER CRIMES

                  Cyber crime Introduction:- .Crimes that involves a computer and a network . .offences that are committed against individu...