Cybercrime against individuals
Поможем в ✍️ написании учебной работы
Поможем с курсовой, контрольной, дипломной, рефератом, отчетом по практике, научно-исследовательской и любой другой работой

In such cybercrimes, individual persons are affected. The goal is to exploit human weakness like greed and naivety. The potential harm of such a crime to humanity is severe. Few of the popular cybercrimes against persons include cyber porn specially child-pornography, violation of privacy, harassment of a person through e-mail spoofing, hacking, cracking, cyber stalking, defamation, cheating, fraud, e-mail spoofing, password sniffing, credit card frauds, gam-bling etc.

Cybercrime against property

The second category of cybercrimes is against property. Intellectual Property Crimes, cyber squatting, cyber vandalism, transmission of malware that disrupt functions of the system/wipe out data or create malfunctioning of the attached devices, cyber trespassing, Internet time thefts are few of the most popular cybercrimes against property.

Cybercrime againstgovernment/organizations/society

One of the distinct cybercrimes against government and related organizations is cyber terrorism. The individuals and groups use electronic media and the cyberspace to threaten the international governments and the citizens of a country. This crime manifests itself into terrorism when an government or military websites are hacked and vital information is retrieved. Cybercrime against organization and society mainly includes unauthorized access of computer, password sniffing, denial of service attacks, malware attacks, crimes emanating from use net group, industrial spying/espionage, network intrusions, forgery, web-jacking etc.

Internet crime schemes

Today the current and ongoing Internet trends and schemes in the world can be categorized under the three classifications mentioned in ‘‘Categories of cybercrimes’’ section. People who carry out these crimes are called as cybercriminals. Depending on the motivation factor the cybercriminals can be classified as under (Nina Godbole):Type I Cybercriminals — These include the hobby hackers or the politically motivated hackers who are hungry for recognition.Type II Cybercriminals — They are not hungry for recognition. These include the psychological perverts, financially motivated hackers or organized criminals Type III Cybercriminals — These are the disgruntled or former employees seeking revenge.

Behaviours in cyber crimes

The cybercriminals mentioned in ‘‘Internet crime schemes’’ section track information in many ways. In this section, the behaviour of the cybercriminals to perform cybercrimes is outlined.

• In common fraud scams the criminals gathers the information by phishing and spoofing leading to identity theft. The imposter pretends to be the other person and uses their information without their knowledge to commit theft or fraud. Crimes related to health care, insurances are also performed by hacking and forging identities.

• Cyber harassment and defamation especially the cases of paedophiles and stalkers use false identities to trap the children and teenagers. Social media sites, chat rooms etc. are a major source for harassment and defamation.

• Cybercrimes like the electronic spamming is the abuse of e-messaging system to send unsolicited bulk messages indiscriminately. In this overheads like the lost productivity and frauds are borne by the public and Internet service providers, who are then forced to add extra capacity to cope up with the deluge(https://en.wikipedia.org/wiki/Spamming).

• In cases like the frauds like auction frauds, non-delivery of existent/non-existent merchandize, the seller responds to the victim of the auction fraud and poses to be in a region outside the place indicating emergency leaving(https://www.ic3.gov/crimeschemes.aspx). The criminals teals this information from certain unsecured websites or by identity theft.

• Forgery is often achieved by hacking wherein the hacker attack the target computer and retrieve personal information of the victims and use it for their personal monetary gains. The Industrial spying/espionage are achieved through ‘‘spying’’.

Cyber crime statistics

The Indian government has passed IT ACT 2000 which was amended in 2008 and focused on data privacy, information security, security practices, and inclusion of some additional cybercrimes like child pornography and cyber terrorism. In However the percentage increased in three parameters cannot be ignored as well. The worst hit is the hacking complaints. There is about 850% increase in the hacking complaints.

Conlcusion

Information and communication technologies (ICTs); does not benefit to individuals, organizations and governments; but also widens the scope of criminal activities as well. Presently, the credit card thefts and online money-laundering cases of cyber crimes are on the rise. Harassment and defamation through social media are also a matter of concern to individuals. Cyber-terrorism is the most prominent aspects of cyber crime across countries. It is the lack of cyber crime awareness that leads to cyber-crimes. The Cabinet Committee on Security (CCS) approved the National Cyber Security Policy in July 2013 that aims to create a secure computing environment in the country and build capacities to strengthen the current set up with focus on manpower training.

 

Text 9

 

Дата: 2019-03-05, просмотров: 246.