Cyber Crime and Security: a Modern Day Threat

Cyber Crime and Security: a Modern Day Threat

International Journal of Electrical Electronics & Computer Science Engineering Special Issue - ICSCAAIT-2018 | E-ISSN : 2348-2273 | P-ISSN : 2454-1222 Available Online at www.ijeecse.com Cyber Crime and Security: A Modern Day Threat Prashant1, Abhishek2, Sonia3 1-2UG Scholar, School of Computer Science, Lingaya’s University, Faridabad, India 3Assistant Professor, School of Computer Science, Lingaya’s University, Faridabad, India Abstract: This paper gives a brief insight to one of the computer, often via shared media such as a floppy disk, trending topics around i.e. Cyber crimes and security. It CD, thumb drive, shared directory, etc. Viruses are presents various illicit activities such as forgery, cyber always embedded within another file or program. stalking and bullying, unauthorize access to systems, phishing, DDOS, creating and spreading malwares, Worm: self-reproducing program which propagates via Cyberterrorism, Spam etc that is taking place over internet the network. and violating our fundamental rights. It contains specific computer crimes, documented cases, applicable laws, Trojan Horse: program which purports to do one thing, security, approaches and some preventive measures to avoid but secretly does something else; example: free screen being victim of any nefarious designs. The primary objective saver which installs a backdoor is to aware reader about modern day crimes by updating you with the approaches and methods to be undertaken. Root Kit: set of programs designed to allow an adversary to surreptitiously gain full control of a Keywords: Cybercrime, Malwares, DDOS, Phishing, Cyber targeted system while avoiding detection and resisting Stalking, Spam Cyber Terrorism removal, with the emphasis being on evading detection I. INTRODUCTION and removal The terms computer crime and cybercrime are more Botnet: set of compromised computers ("bots" or properly restricted to describing criminal activity in "zombies") under the unified command and control of a which the computer or network is a necessary part of "botmaster;" commands are sent to bots via a command the crime, these terms are also sometimes used to and control channel (bot commands are often include traditional crimes, such as fraud, theft, transmitted via IRC, Internet Relay Chat). blackmail, forgery, and embezzlement, in which Spyware: assorted privacy-invading/browser- computers or networks are used. As the use of perverting programs computers has grown, computer crime has become more important. Malware: an inclusive term for all of the above -- "malicious software Computer crime can broadly be defined as criminal activity involving an information technology Ex: David Smith & The Melissa Virus Example infrastructure, including illegal access (unauthorized Spam: Spam, or the unsolicited sending of bulk email access), illegal interception (by technical means of non- for commercial purposes, is unlawful to varying public transmissions of computer data to, from or within degrees. As applied to email, specific anti-spam laws a computer system), data interference (unauthorized are relatively new, however limits on unsolicited damaging, deletion, deterioration, alteration or electronic communications have existed in some forms suppression of computer data), systems interference for some time.Spam originating in India accounted for (interfering with the functioning of a computer system one percent of all spam originating in the top 25 spam- by inputting, transmitting, damaging, deleting, producing countries making India the eighteenth ranked deteriorating, altering or suppressing computer data), country worldwide for originating spam. misuse of devices, forgery (ID theft), and electronic fraud. Phishing: Phishing is a technique used by strangers to "fish" for information about you, information that you Computer crime issues have become high-profile, would not normally disclose to a stranger, such as your particularly those surrounding hacking, copyright bank account number, PIN, and other personal infringement through warez, child pornography, and child identifiers such as your National Insurance number. grooming. There are also problem of privacy when confidential information is lost or intercepted, lawfully or Fraud: Computer fraud is any dishonest otherwise. misrepresentation of fact intended to induce another to do or refrain from doing something which causes loss. II. SPECIFICE COMPUTER CRIMES In this context, the fraud will result in obtaining a benefit by: Malware: Malware is Malicious Software - deliberately created and specifically designed to damage, disrupt or 1. Altering computer input in an unauthorized way. destroy network services, computer data and software. 2. Altering or deleting stored data; or There are several types of computer virus program which can copy itself and surreptitiously infect another 29 International Journal of Electrical Electronics & Computer Science Engineering Special Issue - ICSCAAIT-2018 | E-ISSN : 2348-2273 | P-ISSN : 2454-1222 Available Online at www.ijeecse.com 3. Altering or misusing existing system tools or On 17 Feb 2017, Cloudfare announced that a bug in software packages, or altering or writing code for its platform caused random leakage of potentially fraudulent purposes. sensitive customer data. Other forms of fraud may be facilitated using computer On 19 June 2017, 198 million voter records exposed systems, including bank fraud, identity theft, extortion, that were hosted on an Amazon S3 server. and theft of classified information (Csonka, 2000) On 16 May 2017 strain of ransomware called 1. Obscene Or Offensive Content: The content of WannaCry spread around the world, encrypting websites and other electronic communications may be thousands of computers around the world, distasteful, obscene or offensive for a variety of reasons. In demanding ransom to restore affected systems. some instances, these communications may be illegal. On 7 Dec. 2017, Cyberthieves loot tens of millions 2. Harassment: Whereas content may be offensive in a in bitcoin NiceHash cryptocurrency marketplace non-specific way, harassment directs obscenities and derogatory comments at specific individuals focusing On 15 Dec. 2017, Attacker exploit old WordPress to for example on gender, race, religion, nationality, sexual inject sites with code enabling redirection, takeover. orientation. This often occurs in chat rooms, through In India, National Crime Records Bureau (NCRB) has newsgroups, and by sending hate e-mail to interested shared information graph related to cyber crimes that parties (see cyber bullying, cyber stalking, harassment took place recently. This shows how vulnerable are we by computer, hate crime, Online predator, and stalking). as a user, how securely we are using internet. A country Any comment that may be found derogatory or of million of users are in persistent threat of the offensive is considered harassment. technology and they are being targeted for their poor 3. Drug Trafficking: Drug traffickers are increasingly knowledge of cyber security. The illustration displays taking advantage of the Internet to sell their illegal cases that have been reported but what about those substances through encrypted e-mail and other Internet which go unreported. We need to pay attention while Technology. Some drug traffickers arrange deals at working on internet and keep ourselves updated with internet cafes, use courier Web sites to track illegal upcoming threats. packages of pills, and swap recipes for amphetamines in restricted-access chat rooms. The rise in Internet drug trades could also be attributed to the lack of face-to-face communication. These virtual exchanges allow more intimidated individuals to more comfortably purchase illegal drugs. The sketchy effects that are often associated with drug trades are severely minimized and the filtering process that comes with physical interaction fades away. Furthermore, traditional drug recipes were carefully kept secrets. But with modern computer technology, this information is now being made available to anyone with computer access. 4. Cyber Terrorism: Cyber terrorism in general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources (Parker 1983). As such, a simple propaganda in the Internet, that there will be bomb attacks during the holidays can be considered cyberterrorism. At worst, cyberterrorists may use the Internet or computer resources to carry out an actual IV. APPLICABLE LAW IN INDIA attack. As well there are also hacking activities directed towards individuals, families, organised by groups With the emergence of technology the misuse of within networks, tending to cause fear among people, technology has also expanded to its optimum level and demonstrate power, collecting information relevant for then there arises a need of strict statutory laws to ruining peoples' lives, robberies, blackmailing etc. regulate the criminal activities in the cyber world and to protect technological advancement system. It is under III. DOCUMENT CASES these circumstances Indian parliament passed its “Information Technology Act, 2000” on 17th oct to In late 2015, JP and Morgan Chase & Co. target of have its exhaustive law to deal with the technology in giant hacking conglomerate, where financial related the field of e-commerce, e-governance, e-banking as data extracted and exposed globally. well as penalties and punishments in the field of cybercrimes. 30 International Journal of Electrical Electronics & Computer Science Engineering

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    4 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us