WHAT IS CYBER CRIME
Online activities are vulnerable to crime and can affect the personal safety of an individual. Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation, and mischief, all of which are subjected to the Indian Penal Code. The only difference between a normal crime and a cyber crime lies in the tools used to commit the crime.
Cyber crime can be broadly classified into two categories :
1. The Computer as a Target i.e, using a computer to attack other computer. E.g., Hacking, virus/Worm attack, DOS attack, etc.
2. The Computer as a Weapon i.e., using a computer to commit real world crimes., E.g., Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography, etc.
UNAUTHORIZED ACCESS & HACKING
Hacking refers to an illegal intrusion into a computer system or network. There is an equivalent term to hacking i.e., cracking, but Indian laws Perspective, there is no difference between the term hacking and cracking. Hackers write or use ready-made computer programs to attack the target computer. Some hackers hack for personal monetary gain, such as stealing credit card information, transferring money from various bank accounts to their own account followed by withdrawl of money. They extort money from some corporate gaints threatening them about publishing the stolen information which is critical in nature. Government websites are the hot target of hackers due to the press coverage, it receives. Hackers always want to enjoy extensive media coverage.
Motives behind the crime includes :
- Greed
- Power
- Publicity
- Revenge
- Adventure
- Desire to access forbidden information
- Destructive mindset
Hacking a web server or taking control of another person's website is called Web Hijacking.
HACKER
Hackers are highly technical people who secretly break into computers to steal important data or sometimes to destroy it. Hackers not only steal the important data but also hack applications and web sites to change the program logics. Hackers usually tamper with data for unethical purposes, just for obsession to break system securities. Although hacking is done without any consent from the user, but it is not always destructive. Hacking which is done for a good cause, such as national security, system security, and to discover the vulnerabilities existing in information system is known as Ethical Hacking. Ankit Fadia is a well known ethical hacker from India.
CRACKER
Crackers are technical people who are experts in breaking into system, to steal important data, such as financial details, or password, etc. sometimes they use key loggers for this purpose. Here Key logger programs are used to check user's keystrokes and get important information, like password, etc. Crackers also cause harm to computers by destroying data. Apart from this they disturb applications by spreading malwares, changing program logics, and outputs.
CONCLUSION
Hackers and Crackers both explore computers and access data and applications without owner's permission. But hackers do it for both ethical and non ethical purposes, whereas crackers are always destructive.
How to protect yourself against cyber crime
So, now you understand the threat cyber crime represents, what are the best ways to protect your computer and your personal data? Here are our top tips:
1. Keep software and operating system updated
Keeping your software and operating system up to date ensures that you benefit from the latest security patches to protect your computer.
2.Use anti-virus software and keep it updated
Using anti-virus or a comprehensive internet security solution like Kaspersky Total Security is a smart way to protect your system from attacks.
Anti-virus software allows you to scan, detect and remove threats before they become a problem. Having this protection in place helps to protect your computer and your data from cyber crime, giving you piece of mind.
If you use anti-virus software, make sure you keep it updated to get the best level of protection.
3.Use strong passwords
Be sure to use strong passwords that people will not guess and do not record them anywhere. Or use a reputable password manager to generate strong passwords randomly to make this easier.
4.Never open attachments in spam emails
A classic way that computers get infected by malware attacks and other forms of cybercrime is via email attachments in spam emails. Never open an attachment from a sender you do not know.
5.Do not click on links in spam emails or untrusted websites
Another way people become victims of cybercrime is by clicking on links in spam emails or other messages, or unfamiliar websites. Avoid doing this to stay safe online.
6.Do not give out personal information unless secure
Never give out personal data over the phone or via email unless you are completely sure the line or email is secure. Make certain that you are speaking to the person you think you are.
7.Contact companies directly about suspicious requests
If you get asked for data from a company who has called you, hang up. Call them back using the number on their official website to ensure you are speaking to them and not a cybercriminal.
Ideally, use a different phone because cybercriminals can hold the line open. When you think you’ve re-dialed, they can pretend to be from the bank or other organization that you think you’re speaking to.
8. Be mindful of which website URLs you visit
Keep an eye on the URLs you are clicking on. Do they look legitimate? Avoid clicking on links with unfamiliar or spammy looking URLs.
If your internet security product includes functionality to secure online transactions, ensure it is enabled before carrying out financial transactions online.
9. Keep an eye on your bank statements
Our tips should help you avoid falling foul of cybercrime. However, if all else fails, spotting that you have become a victim of cybercrime quickly is important.
Keep an eye on your bank statements and query any unfamiliar transactions with the bank. The bank can investigate whether they are fraudulent.
Now you understand the threat of cybercrime, protect yourself from it. Hope this blog is helpful for you. Keep Visiting my blog for this type of information.
Thank- you so much
0 Comments
Post a Comment
If you have any doubt, please let me know