Essay on Cyber Crime
Cyber crime is one of the modern threats related to information technology used by the hackers, miscreants. The range and variety of these crimes indicative of the fertility and ingeniousness of human mind.
Cyber Crime Essay in 1000 Words:
What is Cyber Crime?
Cyber crimes that target computer networks or devices directly with spam email, spreading hatred, hacking sensitive information, bank details, computer terrorism etc.
Cyber crimes or computer-related crimes, fall into two broad categories – crimes that target computer networks or devices directly and crimes facilitated by computer networks or devices but having primary targets independent of them. In the first place, the network is a target; in the second place, the network is a facilitator where target being something else. Spreading computer viruses falls in the first category and illegal distribution of pornographic material using the network belongs to the second category.
Computer technology presents many new challenges to social policy regarding issues such as privacy, as it relates to data mining and criminal investigations.
What is Hacking:
Hacking in simple terms means an illegal intrusion into a computer system and network. There is an equivalent term to hacking i. e cracking, but from Indian Laws perspective there is no difference between the term hacking and cracking. Every act committed towards breaking into a computer or network is hacking.
Hackers use or write ready-made computer programs to attack the target computer. Some hackers hack for personal monetary gains, such as to stealing the bank information, transferring money from various bank accounts to their own account followed by withdrawal of money.
What is Cyber Stalking:
Cyber stalking can be defined as the repeated acts harassment or threatening behaviour of the cyber criminal towards the victim by using internet services. Stalking in general terms can be referred to as the repeated acts of harassment targeting the victim such as following the victim, making harassing phone calls, killing the victims pet, vandalizing victims property, leaving written messages or objects.
Stalking may be followed by serious violent acts such physical harm to the victim and the same has to be treated and viewed seriously. It all depends on the course of conduct of the stalker.
What is Phishing:
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the users to visit a website where they are asked to update personal information, such as password, credit card, social security , bank account that the legitimate organization already has.
The website, however, is bogus and set up only to steal the users’ information. By spamming large groups of people, the phishers counted on the e-mail being read by a percentage of people who actually had listed credit card numbers with legitimately.
Denial of Service Attack:
This is an act by the criminal who foods the bandwidth of victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access.
Drug Trafficking:
Drug traffickers are increasingly using internet to sell drugs and other illegal wares through encrypted e-mails and other internet technology. Some drug traffickers strike bargains at the cyber cafe and use courier websites to track illegal packages of drugs. The use of information technology has emboldened timid drug-users to procure illegal drugs more comfortably.
Cyber Terrorism:
Cyber terrorism can be defined as an act of terrorism committed through the use of cyber space or computer resources. A simple propaganda through the internet regarding terrorism can be spread through the use of internet. In its worst form a terrorist can carry out an actual attack by using computer resources.
Cyber Laws:
Authentication of electronic records:
●1. Subject to the provisions of this section any subscriber may authentic an electronic record by affixing his digital signature.
● 2. Authentication of the electronic record shall be effected by the use of asymmetric crypto system and hash function which envelope and transform the initial electronic record into another electronic record.
Legal Recognition of Electronic Record:
Where any law provides that information or any other matter shall be in writing or in the type-written or printed form, then notwithstanding anything in contained in such law, such requirement shall be deemed to have been satisfied if such information or matter is:
(a) rendered or made available in electronic form; And
(b) accessible so as to be usable for a subsequent reference
How to Prevent Cyber Crime:
●The first step towards the prevention of cyber crime would obviously be to promote awarness about criminal activities and to alert the users of the need to tighten up their security.
●Institutes like the IITs and other engineering colleges have short term courses on cyber security. These courses should be updated time to time and must reach to the people.
●Laws against cyber crimes also need to be well defined and periodically reviewed and revised. Rapid advancement in information technology is changing the nature of cyber crime as well. The laws will have to keep pace with them to be effective.
●Employees using IT equipment is also need to be carefully scrutinized in order to filter out undesirable elements.
Conclusion:
It is an undeniable fact the modern civilization has become very much dependant on internet and information technology. At the same cyber crimes are going on in a parallel way. Individuals as well as organizations need to take all legal, technical, social and commercial measures to prevent or restrict cyber crimes.
You May Like To Read More: