The Importance and Relevance of Cybersecurity in the Modern World

The Importance and Relevance of Cybersecurity in the Modern World

A lot of development in devices is rapidly growing, enabling us to interact instantly worldwide. Nevertheless, not everyone in the virtual world uses ethics. In real world we have protection to prevent crimes that may occur, but also, we have cybersecurity to mitigate the digital world’s crime. Confidentiality means that only the people who have the right of access who were the one who will be able to view or read sensitive information and systems. Infringements of records are example of hackers expose information like credit cards to others. Another instance of that was spammers overload bogus requests on the site and make it slow for others. Cybersecurity is a strategy of protecting one device form virtual attacks. Usually, they attempt to access confidential information and trying to steal money. Policies in cybersecurity are very difficult to implement nowadays before hackers are becoming more innovative. To prevent these attacks experts should provide individuals tools to secure their information and prevent from hacking their devices. Cybersecurity is very important because it will prevent them from identity theft, extortion, important information might leak and other confidential data.

There are types of threats that may attack individual’s devices. First is phishing, the most common type, where the hacker sends bogus emails that look real. They aim to get confidential information like credit cards number and important accounts. Experts say you can prevent phishing by filtering spam emails. Another type of attacks is ransomware which they block you in accessing your computer system and will ask for money. Paying the said will not guarantee the system’s recovery. Malware is another type where there is an involvement of software that illegally accesses your computer and can damage it. Social engineering manipulates a person to illegally access the device. Denial-of-service attack is another method of threat wherein the hacker overloads that system which creates traffic and makes the service down. A trial and error method, called a brute force attack, is used by hackers until they access the individual’s account. A use of Trojan horse will help the attackers’ access computers. Sometime attacks can be long term which reveals the secrets of a company which often uses social engineering. Updating your computer is very important because attackers can access your computer by the unpatched software.

To prevent attacks, it never used the same passwords for every account that contains confidential information. Know how to spot malicious emails. Always keep up to date your software and computers. Backing up files is very important. Attend seminars to expand knowledge about cyberattacks. Don’t give all your information when creating an account online. Only download files from trusted sources. Install antivirus to advance the security of your devices. Always be suspicious if the email is not trusted, don’t click links that may lead to hackers accessing your computers.

I think improving the security virtually is a very important measure most especially in our government. They need to maintain security measures to ensure the safety of individuals, our systems in finance and defense. Now cybersecurity is very relevant in today’s age. There a lot of malware, viruses and attacks that can damage and gain access to your information. Private sectors and businesses are also facing attacks which costs of millions to billions of money, or even lead to bankruptcy ones their security is down. In any individuals that logged in through the Internet are potential victims of cyberattacks. Some people are aware of these but they don’t have a strong prevention about this or worst they don’t know how to prevent it. For example, even they know that the email is malicious they even clicked right away because they are curious about it. And experts are trying hard to conduct training to people who are not knowledgeable enough about cyberattacks.

In my opinion, every individual must have a proper awareness on cyberattacks so that they can protect themselves from hackers. It can cause serios damages to individuals once an attack is done. They might lose data that are sensitive that can damage your reputation. Also, human error is one of the main reasons of breaching of data. That’s why awareness is very important. I also think password management is very helpful, non-repetition in every account is a must. A small mistake id data security can have a high chance of exploitations and can damage you. If your accounts are not properly equipped of safety measures it can give chance to hackers to access your computers that can get money from your account and may not be able to recovery it.

Emergence of Need for Legislations and Policies for Safeguarding Women Against Cyber Crime

Emergence of Need for Legislations and Policies for Safeguarding Women Against Cyber Crime

The technological advancements have unleashed new horizons of crime. Before the birth of the internet the concept of crime was somehow limited to, something physical or concrete which could be felt in real space or time. But after the development of internet and after the creation of the virtual space, the new dimension of crime has evolved. Cyber-crime has become a very prominent form of crime in the new technological era. In this respect, the vulnerability of the users has been a major concern. It has been a proven fact that whatever may the form of crime be, women are the most vulnerable class of the society. Cyber-crime has become a major concern for the countries worldwide. Mr. Antonio Guterres, while speaking to media on 14th of May 2018 said that when it comes to cyber-crime, we have much work to do and no time to waste.

The Indian Legislature enacted the Information and Technology Act, 2000 for the purpose of curbing out the menace caused by cyber-crime and prevent people to suffer from it. It has gone through many amendments and the most recent being in 2008, which was enacted in 2009. The whole research paper would revolve and try and find out answers to two main issues:

  1. Whether an effective legislation is in place to counter cyber-crime?
  2. Whether women have been vaccinated from the impacts of cyber-crime by the legislation and policies or is there an urgent need to implement new legislations and policies?

The research methodology followed for the research is doctrinal. The whole research paper would be centered on finding answers to these aforesaid issues and suggesting measures for the improvement of the condition of women and for providing them proper immunity against cyber-crime.

Introduction

Crime could broadly be termed as a violation of rights, be it be ‘Rights in Rem’ or ‘Rights in Personem’. ‘Rights in Rem’ are generally those rights which an individual has against the society, whereas ‘Rights in Personem’, are the private rights. There has been a constant change in the dimension of crime and hence crime is said to be dynamic in nature. For the very purpose of being in sync with this dynamism, there occurs the need of a proper legal framework. The advent of cyberspace has added a new dimension to the concept of crime and has evolved a new form of crime which is most effectively known as cybercrime. There is no specific statute which provides for an exhaustive definition for cybercrime. In India the Information Technology Act, 2000, is the statute devoted to the purpose of checking cybercrimes. The United Nations is working effectively in this direction with the support of its member nations for assuring proper cyber security. It has passed various resolutions for this purpose and has urged its member countries to come together to counter this menace. The countries have begun to feel the need to have laws against cybercrime as its threat is increasing day by day. The online transactions have increased, online share trade has been initiated, and social networking sites are controlling human minds which has made privacy and security of an individual more vulnerable. For the purpose of reducing this vulnerability a strong statutory provision is required. India has been ahead in this field compared to many other developing nations. The Information and Technology Act was enacted in the year 2000 and has gone through various amendments but the concern still remains that, has it been able to reduce the threat of cybercrime? The Act would be deliberated in the research paper and an appropriate answer would be searched for.

Women have always been considered the most vulnerable class of the society and hence the research paper would be concerned about whether the women have been provided appropriate protection under the IT Act, 2000.

Analysis of the Information Technology Act (2000): Its Nexus with IPC And the Lacunas

The United Nations Commission on International Trade Law (UNCITRAL) felt the need for a legislation related to the cyber space. It adopted the Model Law which dealt with electronic commerce, in the year 1996 in order to bring uniformity in the law of various countries. In the year 1997, the UN passed resolution number 51/162 which urged all the states to enact and amend laws with consonance with the Model law which was passed in 1996. The IT Act, 2000 was made in consonance of the aforesaid UN Model Law. Hence the IT Act, 2000 mostly deals with subject which are mostly related to trade and E-commerce. It is mainly concerned with digital signatures, protection and securing databases. Although chapter XI of the Act deals with the offences but it is very restricted in its approach. It is not well defined as well. The main object of the Act has not been to declare acts as criminal offences and to declare punishments for committing those acts but rather its main object was to provide a legal framework for online transactions and digital signature.

The object of the Act reads, “An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as ―electronic commerce, which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies”.

The object in furtherance to this reads that it has been enacted to amend various sections of Indian Penal Code, Indian Evidence Act, Banker’s Books Evidence Act and Reserve Bank of India Act as to matters which are related to this Act. However the concern is that there has only been a few sections in IPC which have a direct nexus with the IT Act 2000.

After the amendment of 2013, sections for voyeurism, stalking etc. were added in the IPC. The section for voyeurism is not gender neutral. It clearly starts with the words ‘Any Man’, and clearly protects only women against the crime of voyeurism. But if a man is a victim of this offence then there would occur a serious concern regarding the statute which must be followed to punish the offender. The same is in the case of stalking. The section again initiates with the words ‘Any Man’, this gain suggests that the section is not gender neutral. The men who are the victim of these two crimes may find it very tough to prove their point as the statutes are enacted in such a way that it disallows men protection under this section. Its Constitutional validity could very well be challenged as this clearly is in violation with Article 14 of the Constitution of India. But yes, if we talk about protection of women against cyber-crime then these two sections are in sync as these two sections provide special protection to women. The reason for this classification could very well be that women are often being dominated by men and the body of women is often hyper sexualized. Therefore they become prone to such offences like that of stalking and voyeurism. Hence, for the purpose of protecting them against this crime and to provide them with a special veil, these sections have been enacted through the amendment of 2013.

Child pornography has been made a punishable offence through the IT Act, however nothing has been mentioned about women. If a woman is forced or enticed to make a pornographic video then is no section as such under which the person could be punished. Many may argue that Section 67-A of the IT Act would cover this issues but the section only deals with transmission of the video or publishing the video and furthermore if we talk about women being the vulnerable section of the society then there exists the need to use the word ‘women’ in that section expressly. Again to mention Section 67-A does not talk about the subject matter of the sexually explicit content and the manner in which it is made. It also does not uses the word women. If a woman is enticed into making of a sexually explicit content with her consent then it would not fall under the purview of rape, but if that content is stored against her will then there occurs no section to protect her. If a woman is forced or enticed to be a part of a pornographic video which is not published or transmitted then it is hard to tell that under which section the offender would be punished. Section 67-B reads, “Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc., in electronic form”. There exists scope to include women under the purview of this section as well. Women could be included within the purview of this section by including them under the sub-clause (c), (d) and (e). If women are provided protection under the aforesaid clauses then they would not be any more enticed to indulge in any sexually explicit content, they would not be abused online and no electronic record of own abuse could be transmitted.

Criminal intimidation is another offence which is stated under IPC. The matter of fact being that criminal intimidation could very well take place through any electronic medium. The Section 503 of IPC however does not talk about any criminal intimidation through any electronic medium. Multiple cases of blackmail could be found where a person has been intimidated or rather blackmailed online or through any other electronic device. Hence it is of urgent need that cyber laws are made in such a way or amendments in IPC are done in such a way that it protects the people from these offences.

A very important essential of kidnapping is if a minor is enticed by the offender. A minor is mentioned to be any person below the age of 16 if a boy and under the age of 18 if a girl. Now the point is that if a person is enticed through an online medium then there is no active mention for this term. Enticement could very well be through any electronic medium and hence this clause could very well be added. Similarly inducement through any deceitful means is a key element for the offence of abduction. Any person could be deceived through any online medium and be abducted. The terms misrepresentation and fraudulent purpose has been included in the IT Act, 2000 but again they have a very limited domain. Misrepresentation has a vast domain, so is in the case of fraudulent purpose. But the scope for punishment has been restricted under the IT Act and hence there occurs the need for judicial precedents. There exists a fair amount of risk in judicial law making and judge made laws could only be used to fill gaps between the statues. Hence statutes are required to be made effective enough to minimize lacunas and reduce the scope for judge made laws.

Violation of privacy has been included in the IT Act, however its domain is very narrow. After the landmark case of Justice K.S. Puttaswamy v. Union Of India and Ors., the right to privacy has been recognized as a fundamental right. Although a very little has been done in Section 66 E of the IT Act, 2000 for the purpose of protecting the privacy of an individual. Violation of privacy could even clicking pictures without the consent of an individual and transmitting it to other persons for the purpose of their viewing.

The biggest issue which has come up is that the cyber space is limitless, so it is very tough to determine that at what point you need to restrict people so that it does not violate anyone’s right. If a person is exercising his freedom of speech and expression, there exists a point at which he should be restricted or else it may affect others. The determination of that point is very tough. For the very purpose of determining a point till which freedom of speech and expression could be exercised online, Section 66A of the IT Act was enacted. Section 66A has always been a locus of debate regarding its Constitutionality. Section 66A states that if a person sends a message through a computer or any electronic device which is offensive or could cause menace shall be punished for a term period of three years. In addition to this it says that if the message sent by the person is false and he knows it to be false, contains hatred or ill will, and causes inconvenience to others, causes injury, damage, insult etc. then the person shall be punished with a term of three years. Now the problem is it lays down or rather it curtails Article 19(1)(a) of the Constitution of India. Article 19 falls under the Part III of the Constitution and is a fundamental right. Fundamental rights are inalienable rights[footnoteRef:19] and cannot be taken away by the legislature. The ‘Doctrine of Basic Structure’ was accepted by the Supreme Court in the case of Kesavananda Bharti Sripadagalvaru v. State of Kerala. This doctrine states that any law which violates the Basic Structure of the Constitution has to be declared unconstitutional. Fundamental Rights form the Basic Structure of the Constitution and hence any law which violates the fundamental rights of the individuals needs to be declared unconstitutional by the Supreme Court of India. The Section 66A of the IT Act clearly lays down restrictions to Freedom of Speech of Expression and there has been many cases where the Section was challenged or was debated.

The Case of Aseem Trivedi

Aseem Trivedi was a freelance cartoonist. In September 2012, he was arrested Section 66A of the IT Act, Section 2 of Prevention of Insults to National Honor Act, 1971 and under Section 124 of IPC. The most shocking was the charge of sedition against him. He made a few cartoons to depict widespread corruption in India. He replaced the four lions of the National Emblem with four wolves and replaced ‘Truth Alone Triumphs’ with ‘Corruption Alone Triumphs’. In another cartoon he depicted mother India being assaulted by parliamentarian and a bureaucrat. Later the charge of sedition was dropped and he was released on a bail bond of Rupees 5000. A cartoon made to depict a social evil and for the purpose of criticizing the government was declared anti national and a charge of sedition was filed against Aseem Trivedi. The essential of Section 66A of the IT Act are highly ambiguous and arbitrary and is upon the discretion of the authorities.

The Case of Ambikesh Mahapatra

Ambikesh Mahapatra a chemistry professor from Jadavpur University was arrested on the night of 12 April, 2012 for sharing a cartoon of Chief Minister of West Bengal and then Railway Minister Mukul Roy. He forwarded the email from the email address of a housing society and hence the secretary of the housing society was also arrested. They were arrested under Section 66A and 66B of the IT Act, Section 500 of IPC for defamation and under Section 509 for obscene gesture towards a woman and Section 114 of IPC for abetment. The primary section concerning the arrest being Section 66A of the IT Act. In this case it could well be observed that the scenario is being the same. Criticizing the government resulted in arrest of the individual. Hence Section 66A of IT Act was again in question.

The Road to the Watershed Judgment

There were several other cases recorder all across India. The elements of Section 66A were considered arbitrary and unfair. They were also considered to be ambiguous as terms such as ill will, hatred, inconvenience, and annoyance were not defined and cannot be defined as well. Finally a writ petition was filed in the Honorable Supreme Court of India in 2015. In the famous and landmark case of Shreya Singhal v. Union of India, the constitutional validity section 66A of IT Act was challenged and was held unconstitutional by the Supreme Court of India. This was a watershed moment in Indian judiciary.

Various concerns were raised regarding the arbitrary nature of Section 66A of the IT Act and its ambiguity. A writ petition under Article 32 was filed in the Supreme Court of India in 2015. The main contention of the petitioner was that the Section 66A of the IT Act was violative of the fundamental right of freedom of speech and expression and right to equality. The contention of the counsel on behalf of petitioner was that the restrictions laid under Section 66A were ambiguous and no proper definitions were provided for the terms used in the section. Restrictions on freedom of speech and expression are provided under Article 19 and the restrictions in Section 66A are not in nexus with those provided under Article 19. Section 66A is also violative of Article 14 of the Constitution as an unreasonable classification has been created by the legislature. The restrictions levied based on the classification between individuals who use electronic medium and who don’t use them is unreasonable. Based on these two basic contention it was pleaded by the petitioner that the Section 66A of the IT Act shall be declared unconstitutional. The Honorable Supreme Court accepted the contentions and declared Section 66A of the IT Act as unconstitutional that it was violative of the fundamental right of freedom of speech and expression and right to equality. It was effectively held that the nature of the Section 66A was ambiguous and gave the authorities arbitrary powers. The words mentioned under Section 66A are not well defined and hence its interpretation was based on the interpretation of the authorities. The Section 66A was arbitrarily used by the authorities to their own benefit. It was also held that the essentials in Section 66A were not in consonance with the restrictions to freedom of speech and expressions laid under Article 19 of the Constitution of India.

The Way Ahead

Commenting on posts and stories, tweeting, sharing posts and pictures etc. has become a trend. There has to be a restriction to ensure the safety of the citizens, integrity of the nation and to uphold the Constitutional values. Section 66A was enacted for this very purpose to stop people from spreading fake news, creating nuisance and insulting online users or harming the image and integrity of the nation. However its arbitrary nature lead to it being declared as unconstitutional by the Supreme Court. It is evident that there has to be some sought of restriction on the social networking sites as well. The objective of the IT Act, 2000 is very clear and its objective is not to deal with criminal offences and hence a separate act shall be created for the purpose of governing cyber offences. Necessary amendments are to be done in Code of Criminal Procedure for the creation of a separate judicial structure for assuring justice to the victims of cyber-crime. As cyber cells are created to register complaints of Cyber-crimes, on the same note separate cyber courts could be created to ensure quick justice to the victims. As provision for fast track courts have been created, on the same basis provision for separate cyber courts could be created. Provisions must be made for banning pornographic films. Until and unless they would be banned there would be chances that women and children would face abuse and sexual harassment.

Conclusion

Cyber-crime is on rise. As per the National Crime Records Bureau (NCRB), 217 cases of cyber-crime were registered in the year 2007, 288 cases were registered in the year 2008, 420 cases were recorded in 2009 and 926 cases were recorded in 2010 under the IT Act, 2000. A total of 328 cases were recorded in 2007, 176 cases were recorded in 2008, 276 cases were recorded in 2009 and 356 cases were recorded in 2010 under the IPC, these matters were related to cyber- crime. The registered data provides an idea regarding the issue of cyber-crime, raising concerns over the efficacy of the laws in existence. As per the data of NCRB, 1791 cases were registered in 2011 under the IT Act and this number keeps on increasing. Another very disappointing fact is that no separate data is kept regarding women affected by cyber-crime. NCRB maintains the record of women victims of other crimes but no separate data is maintained when it comes to female victims of cyber-crimes.

Cyber-crime has become a concern which has to be addressed immediately. Mr. Antonio Guterres, the Secretary General of the United Nations has very well understood the urgency to deal with the issue of cyber-crime and has member nations to act swiftly in this direction. The United Nations could only advice the member countries of which India is also a part and it cannot compel a law on us, as India being a sovereign nation has to power to deny any external interference. However, cyber law and safety of women is of paramount importance. There are frequent cases of stalking, voyeurism, body shaming, trolling etc. against women. It is a well-accepted fact that women are vulnerable towards offences. If a women puts up a photo on her social media account which shows some part of her body then she faces many kind of harassment from the users.

The IT Act 2000 is an Act to govern E-commerce, online trade and digital signatures. Though a part of the Act is dedicated to describe cyber offences but that is not enough and has failed to provide adequate protection to women. As it has been shown in the research paper that there are no such specific section which talks about the protection of women. There are sections which criminalize child porn or harassment of children. There prevails a scope to include women under that section as well. There has to a ban on pornographic sites to make it sure that any sexually explicit content of a women is not published and transmitted and neither she is forced or enticed to engage herself into any such act. The same goes with the children. Porn ban would ensure that children are not forced to indulge into such activities and are protected from abuse. A stringent law is needed to be enacted so that women and children are safe.

There exists an urgent need to enact a specific law for defining and punishing cyber-crimes. In this particular law there lacks the element to define offence and it is ambiguous in nature. A proper legislation has to be passed so that the threat of cyber-crime could be dealt with. The continuous rise in cases of cyber-crime is an alarming situation. This situation proves that the laws are not stringent and effective enough to deal with the menace of cyber-crime. The Indian Penal Code and the Code of Criminal Procedure also requires certain amendments to be in sync with the changing dimensions of crime. It cannot be left upon the Court to interfere and decide and set a precedent as a law. There has to be statutes and black letter law which could be relied upon and followed. Fast track Courts have been initiated across the country for speedy trials. We have consumer forum for consumer grievances. So, on the same not we could very well have Courts dedicated to deal with cases of cyber-crimes. This would help in reducing the burden of Trial Courts and help in quick disposal of cases.

The electronic world is a borderless space and to draw a limit is very tough. People are free to tweet, share pictures, make comments etc. but somewhere a line has to be drawn. A line has to be drawn between the Fundamental right of freedom of speech and expression and the reasonable restrictions. An access of one’s own right cannot be at the cost of other’s right. Rights are often accompanied by duties. While accessing a right one must be aware of the fact that it is his duty not be harm someone else’s right. Section 66A was enacted to control menace in social networking sites and to draw a limit to freedom of speech and expression but the section was quite ambiguous and arbitrary. It gave the authorities and the government excessive powers, as the terms used in the section were not well defined and those terms were interpreted as per the benefit of the government to put a check on people protesting against the government. The ones raising voice against the government were put behind the bars in the name of violation of Section 66A and said to have caused annoyance, spread hatred etc. This section had been an example of arbitrary actions of the government. The Supreme Court finally intervened and the Section 66A was declared as unconstitutional as it violated the fundamental rights of the people and was against the basic structure of the Constitution. A proper check has to be put, in consonance with the reasonable restrictions provided in Article 19 (2) of the Indian Constitution. There has to be a proper differentiation between sedition and criticizing the government.

Hence it is concluded that the legislations in place is not enough to deal with the menace of cyber-crime and no special protection have been provided to women to protect them against cyber-crime. There is much to be done on this regard so that females no longer remain the vulnerable class of the society and are vaccinated from the perils of cyber-crime.

Data Protection and Prevention of Cyber Crime

Data Protection and Prevention of Cyber Crime

Cybercrimes are liable for the interruption of ordinary pc features and has been acknowledged to cause the downfall of many organizations and private entities. This research paper ambitions to talk about following aspects of cybercrimes: the definition, why they arise, legal guidelines governing them, strategies of committing cybercrimes, who they affect, and cybercrime prevention tactics. More in particular, this paper will delve into one foremost instance of cybercrime ‘hacking’. The record will show the usage and development of generation has amplified one of a kind varieties of crimes which includes robbery crimes and terrorism. Also, this report will show statistical data which will provide an concept of how far cybercrimes has boom over the length of ten years or extra.

Introduction

In our current generation-driven age, preserving our non-public records personal is becoming more hard. The truth is, surprisingly categorised info have become more to be had to public databases, because we are extra interconnected than ever. Our statistics is to be had for nearly anyone to sift via because of this interconnectivity. This creates a bad stigma that using generation is dangerous due to the fact practically every body can get right of entry to one’s personal information for a fee. Technology keeps to promise to ease our each day lives; but, there are dangers of the usage of generation. One of the principle risks of the use of generation is the risk of cybercrimes.

Common Internet customers can be blind to cybercrimes, let alone what to do if they fall sufferer of cyber assaults. Many harmless individuals fall victim to cybercrimes around the world, mainly since generation is evolving at a speedy tempo. Cybercrimes are any crimes that motive damage to every other man or woman the use of a computer and a network. Cybercrimes can arise via issues surrounding penetration of privacy and confidentiality. When privacy and private records is lost or interrupted via unlawfully individuals, it gives way to high profile crimes such as hacking, cyber terrorism, espionage, financial robbery, copyright infringement, spamming, cyber warfare and lots of greater crimes which arise throughout borders. Cybercrimes can occur to all and sundry once their data is breach with the aid of an unlawful person (webopedia.Com).

According to Norton, “over the last 18 months, an ominous trade has swept across the net. The chance landscape as soon as dominated by means of the worms and viruses unleashed by means of irresponsible hackers is now ruled by a new breed of cybercriminals. Cybercrime is encouraged by way of fraud, typified by means of the unreal emails sent by ‘phishers’ that purpose to steal personal facts” (Cybercrime 2011) Cybercrimes are responsible for the achievement of their respective crook belongings and the downfall of many companies and personal entities. The cause of this paper is to train people who don’t understand what are cybercrimes and its significance in developing technological advance during society.

Understanding the chance of cybercrimes is a totally pertinent trouble due to the fact generation holds a extraordinary effect on our society as a whole. Cybercrime is growing every day due to the fact considering that technological advancing in computers makes it very clean for anyone to scouse borrow with out physically harming absolutely everyone due to the lack of awareness to most people of ways cybercrimes are dedicated and the way they could defend themselves against such threats that cybercrimes poses. This paper will discuss several elements of Cybercrimes which include: defining the time period, why cybercrimes occur, laws governing them, strategies of committing cybercrimes, who’s affected, and prevention methods and many more.

Importance Of Data Protection

Firstly, the motive of private statistics safety isn’t to just shield man or woman’s statistics, but to guard the fundamental rights and freedoms of persons that are associated with that records. Whilst defensive non-public statistics it’s miles feasible to make sure that men and women’ rights and freedoms aren’t being violated. For example, incorrect processing of personal statistics, would possibly bring about a scenario wherein a person is omitted for a process opportunity or, even worse, loses present day task.

Secondly, not complying with the private statistics safety regulations can lead to even harsher situations, where it’s feasible to extract all of the money from a person’s bank account or even cause a existence-threatening state of affairs by using manipulating health information.

Thirdly, facts safety guidelines are important for making sure and honest and customer friendly trade and provision of offerings. Personal data safety rules cause a state of affairs, where, for example, non-public records can’t be sold freely which means that people have a more manipulate over who makes them gives and what sort of offers they make.

If private facts is leaked, it could cause agencies sizable damage to their popularity and additionally convey along penalties, which is why it’s critical to conform with the character data protection guidelines. To make certain that non-public information is secure, it’s critical to recognise what statistics is being processed, why it’s being processed and on what grounds. In addition, it’s crucial to perceive which protection and safety features are in use. All of this is possible through a radical facts safety audit, which identifies the records float and whether or not the information safety rules are being accompanied. The audit can be carried out by answering a hard and fast of specific questions which have been organized for that motive. The consequences will deliver a clean review of the processes and viable facts leaks, that may then be stopped .

Defining the Problem

Currently, when individual talk about cybercrime, they may not understand the extent of these crimes. Many questions arise when the term cybercrime is brought into question. Some questions that arise are, ‘Does cybercrimes only done via the Internet?’, ‘Cybercrimes are done via computers only?’ and so on, however, traditional crimes such as theft and fraud that have been done via physical ways are now been converted into digital resources and are now considered as cybercrimes. But what are cybercrimes?

A commonly accepted definition of this term is that a cybercrime is a “crime committed using a computer and the internet to steal a person’s identity or sell contraband or stalk victims or disrupt operations with malevolent programs” (Definition of Cybercrimes). However, other definitions have constraints to anexpansivemeaning to more closelydescribe the word ‘cybercrime’. Some of these definitions as follow:

  • New World Encyclopedia defines it as “is a term used broadly to describe activity in which computers or computer networks are the tool, target, or place of criminal activity. These categories are not exclusive and many activities can be characterized as falling in one or more categories”.
  • Bukisa defines it as “It is this access to the technical specifications of how the Internet and Internet technologies are implemented that allows an attacker to subvert systems, networks and the Internet for their own ends”.
  • Webopedia defines it as “Cybercrime encompasses any criminal act dealing with computers and networks (called hacking)’.

Additionally, cybercrime also includes traditional crimes conducted through the Internet. For example: hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cybercrimes when the illegal activities are committed through the use of a computer and the Internet.

Causes of Cybercrimes

There are many methods or means wherein cybercrimes can occur. Here are a few causes and methods of ways cybercrimes can be devoted on a day by day foundation: hacking, theft of data contained in electronic form, email bombing, data diddling, salami attacks, denial of service assault, virus/ computer virus assaults, logic bombs, trojan assaults, Internet time robbery, and web jacking.

  1. Hacking. In different words can be known as the unauthorized get right of entry to to anylaptop systems or community. This method can occur if pc hardware and software has any weaknesses which can be infiltrated if such hardware or software has a scarcity in patching, protection manage, configuration or poor password desire.
  2. Theft of information contained in electronic form. This kind of method arise whilst facts stored in computersystems are infiltrated and are altered or physically being seized thru tough disks; detachable garage media or different virtual medium.
  3. Email bombing. This is any other shape of net misuse wherein people directs amass numbers of mail to the victim or an deal with in attempt to overflow the mailbox, which may be an man or woman or a employer or maybe mail servers there by way of in the end ensuing into crashing. There are two methods of perpetrating an e mail bomb which encompass mass mailing and listing linking.
  4. Data diddling. Is the converting of facts before or all through an intrusion into the pc device. This type of an occurrence includes transferring uncooked information simply earlier than a pc can methods it and then changing it returned after the processing is finished.

Prevention and Procedure

In this modern age, it seems almost impossible to avoid being a victim of cybercrime, with all the advancements in technology which make it easy for someone to perform cybercrimes. In light of this, there are some ways however to avoid becoming a victim of cybercrime. Most Internet browsers email service, and Internet providers provide a spam-blocking feature to prevent unwanted messages, such as fraudulent emails and phishing emails, from getting to your inbox. However, every user must ensure to turn them on and do not turn them off whatsoever. Also, users must install and keep up-to-date antivirus programs, firewalls and spyware checkers. Along with keeping them up to date, users must make sure that they run the scans regularly. There are many companies out there that provide free software, but there are other you can purchase, along with that of the many produced by the leading companies providers; in addition, those companies provide free version of their paid or subscription antivirus software. Encryption of information that you do not want anyone to have unauthorized access to is a good way to avoid some cybercrimes; information such as password and credit card information for example. Encryption software runs your data through encryption algorithms to make it unintelligible to anyone who tries to hack into your computer.

Another good precaution is to be weary of who you divulge your personal information to. Try to avoid unknown websites, in particular those that ask for your name, mailing address, bank account number or social security number. When doing online shopping make sure website is secure, look for urls that starts with ‘https’ and/or have the Trustee or VeriSign seal. If you do not see these anywhere on the site, you run the risk of submitting credit card information and other personal information to a site that maybe a fraud.

Another way to avoid being a victim of cybercrimes is to avoid being susceptible to common frauds, such as inherences letter, letter asking for your help in placing large sums of money in overseas bank accounts, foreign lotteries, and phony sweepstakes. Those mentioned activities are all methods used by cyber criminals to get your personal information and money. If it sounds too good to be true, it probably is.

Educate children about the proper use of the computer and internet and make sure to monitor their online activities at home and school alike. They should only have access to a computer located in a central area of your home and you should regularly check all browser and email activity. A wise thing to is to use parental control software that limits the type of sites the user can gain access to. In schools, there should be restricted websites and other user restrictions that will help protect the user and entity from cybercrime. Likewise, companies should educate and have written policies governing the workplace pc and its network use to diminish the risk of cybercrime against the company.

One definite way to ensure that you don’t fall victim of cybercrimes is to disconnect your computer entirely from the internet. If there is no network, then you don’t have to worry about any cyber-attacks. However, this option is not the most viable one in our interconnected society. The truth is, it is up to you to take the necessary precautions to avoid potential cybercrimes.

Conclusion

Cybercrimes will continually be an ongoing mission regardless of the advancements being made by numerous international locations. Most international locations have their own laws to combat cybercrimes, however a few doesn’t have any new laws however completely is predicated on wellknown terrestrial regulation to prosecute these crimes. Along with outdated legal guidelines to fight cybercrime, there are nonetheless feeble consequences set in vicinity to punish criminals, accordingly doing no most important prevention of cybercrimes’ which have an effect on the economy and people’s social lives on a large scale through those criminals. Consequently, there’s a determined need for countries on a worldwide scale to return collectively and decide on what constitute a cybercrime, and develop approaches wherein to persecute criminals across exclusive countries.

It is recommend that till sufficient legal moves can be installed place in which individual international locations and worldwide methods of persecution criminals, self-protection stays the first line of defense. The regular individuals and businesses need to make sure they’re educated on what to do in terms of prevent in turning into the subsequent victim of cybercrimes. This basic recognition can help save you ability cybercrimes in opposition to them.

Nevertheless, commercial enterprise have to appoint practices where their personnel comply with right protection practices to make certain that integrity and confidentially of saved information is saved always to fight cybercrimes. Safety practices like making sure that staying off game websites on agency time where viruses may be downloaded, forwarding chain emails, leaving computer unattended or password sharing over digital mediums need to be prohibited. With most of these safety practices carried out,it may be said that the protection of many clients saved statistics is most excellent.

Cyber Security and Malware Protection

Cyber Security and Malware Protection

Cyber security is the act of protecting digital information and information systems. It focuses on protection of valuable information stored on those systems from adversaries who would want to obtain, corrupt, damage, destroy or prohibit access to it. Hence, it is a crucial part of the IT field. Malicious software, or malware, is a cyber security threat that affects the user’s computer system by exploiting the system’s vulnerabilities. It is one of the major threats to the security of information in the computer systems. Therefore, there is a need for malware protection. Although, the existing security solutions generally protect the computer system against known risks they are vulnerable to yet unknown risks. is it is generally difficult to predict, how anti-malware software would react to new, unknown malicious software? And for that reason, malware protection remains in the continuous development phase.

Introduction

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyber-attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes[17]. The field is expanding in importance due to increasing dependence on computer systems, the Internet and wireless networks such as Bluetooth and Wi-Fi, and due to the populous increase of ‘smart’ devices, including smartphones, televisions and the various other devices. It is also one of the major challenges of the modern world [22]. Cyber security is needed because there are threats to the cyber world. One of the major players in that section is malware. Malware is one of today’s biggest threats in computer security. new mobile malware that is emerging on a daily basis further introduces new security risks [5]. Though the existing security solutions generally protect mobile devices against known risks they are vulnerable to yet unknown risks [4]. Malware protection is more important today than ever since cyber security malware threats like viruses and trojans are on a sky-rocketing high.

Literature Review

It’s the 21st century or as its more famously known as, the age of electronics. Everything from the most complex of tasks to the basic of works is now digital in nature, and because of that particular fact, day-to-day tasks are easy and convenient to perform. But not everything is all good, this digital age has its own drawbacks. As with the added benefits of digitization of data, come the threats of the digital world. Cyber crime is almost an integral part of this world and cyber security, a well thought and needed counter measure. Cyber security is the act of protecting information and information systems technological solutions for safeguarding personal data and computer networks are essential but not sufficient to ensure security [2]. As one talks about cyber security, the foremost thing which comes to our minds is the increasing number of cyber-crimes. Governments around the world are taking steps to prevent these cyber-crimes [1]. Cyber ethics, cyber safety, and cyber security should be integrated for better approach. Recently Cybersecurity has emerged as an established discipline for computer systems and infrastructure with a focus on protection of valuable information stored on those systems from adversaries who want to obtain, corrupt, damage, destroy or prohibit access to it. mobile computing, cloud computing, e-commerce, and social networking are the emerging trends of cybersecurity by adopting new technologies. Also there are some challenges that are caused due to lack of coordination between security agencies and the critical IT infrastructure [2]. Turning to the other side of the coin, malware is one of the biggest security threats faced by the cyber community. Malware, or malicious software, exploits the system’s vulnerabilities to infest itself in the system and then harm the data stored in the system by the user. It is generally difficult to predict how anti-malware software reacts to new, unknown malicious software. Therefore, the anti-malware software is in continuous development phase in order to be able to detect new malware or new variants of existing malware, ironically, so is malware [5].

Importance

The government, military, corporate, financial, and medical organizations collect, process, and store unprecedented amounts of data on computers and other devices. An important portion of that data can be sensitive information, whether that be intellectual property, financial data, personal information, or other types of data for which unauthorized access or exposure could have negative consequences. Organizations transmit sensitive data across networks and to other devices in the course of doing businesses, and cybersecurity describes the discipline dedicated to protecting that information and the systems used to process or store it [20]. In today’s connected world, everyone benefits from advanced cyber defense programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to blackmail attempts, to the loss of important data like family photos [10]. Everyone relies on the crucial ground like power plants, hospitals, cloud computing, and financial service companies. Securing these and other organizations is essential to keeping our society functioning, hospitals, and financial service companies [9].

Objective

Computer security broadly has four objectives: confidentiality, availability, integrity, and non-repudiation. the first and foremost objective is confidentiality that is keeping information away from people who should not have it. Accomplishing this objective requires that we know what data we are protecting and who should have access to it [27]. After confidentiality there comes availability which is ensuring that data stored in the computer can be accessed by the people who should access it. Availability is a broad subject addressing things such as fault tolerance to protect against denial of service and access control to ensure that data is available to those authorized to access it. Most computers can at least differentiate between two classes of users: system administrators and general end users. In simple words, integrity means assuring that the information stored in the computer is never contaminated or changed in a way that is not appropriate. Both confidentiality and availability contribute to integrity. Keeping data away from those who should not have it and making sure that those who should have it can get it are fairly basic ways to maintain the integrity of the data. Security is a large enough task just trying to meet the confidentiality-integrity availability objectives. Technologies used for those objectives are also used to create business-related functions for NR, which allows the formation of binding contracts without any paper being printed for written signatures. NR is new and not broadly used, but most security experts agree that it will be based on digital signatures. therefore non-repudiation (NR) means the assurance that someone cannot deny the validity of something.

Challenges

The toughest challenge in cybersecurity is the ever-growing nature of security risks. Traditionally, organizations and the government have focused most of their cybersecurity resources on perimeter security to protect only their most crucial system components and defend against known threats. Today, this approach is insufficient, since the threats are advanced and change more quickly than organizations can keep up with[21]. As a result, consulting organizations promote more proactive and adaptive approaches to cyber security.

Ransomware Evolution

Ransomware is the bane of cybersecurity, IT, data professionals, and executives. Perhaps nothing is worse than a spreading virus that latches onto customer and business information that can only be removed if you meet the cybercriminal’s egregious demands. And usually, those demands land in the hundreds of thousands (if not millions) of dollars.

A.I. Expansion Artificial Intelligence might be able to help defend against incoming cyber-attacks. The list of actual AI applications is already long and growing. Faster and more accurate credit scoring for banks, improved disease diagnosis and treatment development for health care companies, and enhanced engineering and production capabilities for manufacturers are just a few examples. But it’s not all good, the Artificial Intelligence, if configured, could do more harm than good.

Serverless App Vulnerability Serverless apps can invite cyber-attacks. Customer information is particularly at risk when users access your application off-server — or locally — on their device. Unfortunately, with all of the vulnerability that serverless apps represent, they don’t seem to be going anywhere in the years to come.

IoT Threats Most people are always plugged in. The vast majority of humans in first-world countries have an iPhone in their pockets, a computer at work, a television at home, and a tablet in their cars. The Internet of things is making sure that every single device you own is connected. Of course, all of that connection carries with it massive benefits, which is what makes it so appealing in the first place. The problem is that all of that interconnectedness makes consumers highly susceptible to cyberattacks. Many of the devices have serious vulnerabilities.

Applications of Cyber Security

  • Filtered Communication – include a firewall, anti-virus, anti-spam, wireless security and online content filtration.
  • Protection – cyber security solutions provide digital protection to your data that will ensure your employees aren’t at risk from potential threats.
  • Increased productivity – viruses can slow down computers to a crawl, and making work practically impossible. Effective cyber security eliminates this possibility, maximizing the potential output.
  • Denies Spyware – spyware is a form of cyber infection which is designed to spy on your computer actions, and relay that information back to the cyber-criminal.

Malware

Malware is one of the most dangerous phenomenon spreading over the Internet. it is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behaviour an attacker wants. It varies in type and capabilities [16]. In fact, most Internet problems such as spam e-mails and denial of service attacks have malware as their underlying cause. With the increasing significance of malware in Internet attacks, much research has concentrated on developing techniques to collect, study, and mitigate malicious code. Therefore in order to protect our systems from a hazardous act of malware, it is necessary to collect and study malware found on the Internet.

What Does it Do

  1. Provide remote control to an attacker for use of the Infected Machine: the malware controls a system through a remote network connection, things like this are not known to the victim.
  2. Send spam from the infected machine to unsuspecting targets: compromised applications are the most common delivery system used by hackers to transfer malware to users’ devices. Malware operators will usually choose popular apps to repackage or infect, increasing the likelihood that victims will download their rogue version.
  3. Investigate the infected user’s local network: inserting malware into legitimate online ad networks to target a broad spectrum of end users. The ads appear to be perfectly normal and appear on a wide range of apps and web pages.
  4. Steal sensitive data: malware uncovers victims of personal and proprietary information with the intent of monetizing stolen data through direct use or underground distribution.

Types of Malware

  1. Viruses – programs that copy themselves throughout a computer or network. Viruses piggyback on existing programs and can only be activated when a user opens the program. At their worst, viruses can corrupt or delete data, use the user’s email to spread, or erase everything on a hard disk.
  2. Worms – self-replicating viruses that exploit security vulnerabilities to automatically spread themselves across computers and networks. Unlike many viruses, worms do not attach to existing programs or alter files. They typically go unnoticed until replication reaches a scale that consumes significant system resources or network bandwidth.
  3. Trojans – malware disguised in what appears to be legitimate software. Once activated, Trojans will conduct whatever action they have been programmed to carry out. Unlike viruses and worms, Trojans do not replicate or reproduce through infection.
  4. Rootkits – programs that provide privileged (root-level) access to a computer. Rootkits vary and hide themselves in the operating system.
  5. Remote Administration Tools (RATs) – software that allows a remote operator to control a system. These tools were originally built for legitimate use, but are now used by threat actors. RATs enable administrative control, allowing an attacker to do almost anything on an infected computer. They are difficult to detect.
  6. Spyware – malware that collects information about the usage of the infected computer and communicates it back to the attacker.
  7. Botnets – short for ‘robot network’, these are networks of infected computers under the control of single attacking parties using command-and-control servers. Botnets are highly versatile and adaptable, able to maintain flexibility through redundant servers and by using infected computers to relay traffic. Botnets are often the armies behind today’s distributed denial-of-service (DDoS) attacks.

Propagation Techniques

  • Web browsing – the easiest way of getting infected is through drive-by-download. Malware often spreads through unwanted software downloads, malicious PDF documents, pictures, word documents, or fake software. Using this technique, malware developers have no target other than to infect as many computers as possible. Modern browsers like Chromium (the open source project on which Google developed Chrome) include two mechanisms that are designed with security in mind.
  • USB thumb drives – thumb drives(or USB drives) are also used to spread malicious software. This method uses the Autorun feature to launch malware when the storage device is connected by the operating system. A common attack situation is performed by intentionally dropping USB drives in front of targeted organizations.
  • Email Spear Phishing – spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. Spear phishing attempts are not initiated by random attackers, but are more likely to be administered by perpetrators out for financial gain, trade secrets or military information. Similar to e-mail messages used in regular phishing expeditions, spear phishing messages appear to come from a trusted source. Phishing messages usually appear to come from a large and well-known company or Web site with a broad membership base, such as eBay or PayPal. In the case of spear phishing, however, the apparent source of the same observe frequently visited websites that they visit and trust, afterwards they infect these websites with malware in the hope that a person from the targeted group will get infected. here lies the drawback of data science(data mining) as well.

Malware Protection

Malware security protection provides that second vital layer of protection for your computer or network. The increased need for malware protection also has to do with the widespread availability today of sophisticated tools originally intended for cyber espionage and cyber warfare.

  1. Access control and password security: the concept of user name and password has been a key way of protecting our information. This may be one of the first measures regarding cyber security and protection.
  2. Authentication of data: the documents that we receive must always be authenticated be before downloading that is it should be checked if it has introduced from a trusted and a safe source and that they are not altered. Authenticating of these documents is usually done by the anti-virus software present in the devices. Thus a good anti-virus software is also essential to protect the systems from viruses.
  3. Malware scanners: this is software that usually scans all the files and documents present in the system for malicious code or harmful viruses. Viruses, worms, and Trojan horses are examples of malicious software that are often grouped together and mentioned to as malware.
  4. Firewalls: a firewall is a software program or piece of hardware that helps mask out hackers, viruses, and worms that try to reach our computer over the Internet. All messages entering or leaving the internet pass through the firewall present, which examines each message and blocks those that do not meet the specified security criteria. Hence firewalls play an important role in detecting the malware.
  5. Anti-virus software: antivirus software is a computer program that detects, prevents, and takes action to defeat or remove malicious software programs, such as viruses and worms. Most antivirus programs include an auto-update feature that enables the program to download profiles of new viruses so that it can check for the new viruses as soon as they are discovered. An anti virus software is a must and basic necessity for every system.

Conclusion

Cybersecurity is a vast field that is becoming more important because the world is becoming densely interconnected as networks being used to carry out risky transactions. This also results in malware being spread like wildfire. As a result, cyber-crime continues to pass up different paths with each year that passes and so does the security of public data. Although, the existing security solutions generally protect systems against known risks at the same time they are vulnerable to, yet unknown, risks. It is generally difficult to predict how anti-malware software reacts to new, unknown malicious software. The latest and disruptive technologies, along with the new cyber tools and threats that come to light each day, are challenging organizations with knowledge of not only knowing how to secure their infrastructure but also, which new platforms and intelligence they require to do so. There is no ideal or long-lasting solution for cyber-crime, it keeps on evolving as the crimes do. But the ability to try our level best to minimize them is the security that stands in between to ensure a safe and secure future in cyberspace.

References

  1. Niyati Parikh, Deep Patel, Roshni Patel. A Disquisition of Cyber Crime. IJSTE – International Journal of Science Technology and Engineering – April – 2017.
  2. Vairaprakash Gurusamy, Bharagav Hirani. Cyber Security for Our Digital Life. National Conference on Innovations and Computer Technology and its Applications (NCICTC) – 2018.
  3. Aru Okereke Eze, Chiaghana Chukwunonso E.. Malware Analysis and Mitigation in Information Preservation. IOSR Journal of Computer Engineering (IOSR-JCE) – Jul – Aug 2018.
  4. Sevil Sen, Emre Aydogan, Ahmet I. Aysan. Co-evolution of Mobile Malware and AntiMalware. IEEE Transactions on Information Forensics and Security – Oct – 2018.
  5. Frankie E. Catota, M. Granger Morgan, Douglas C. Sicker. Cybersecurity Education in a Developing Nation: The Ecuadorian Environment. Journal of Cybersecurity – 2019.
  6. Computer_Networks_5th_Edition_Andrew_S_Tanenbaum_David_J_Wetherall: pearson education.
  7. Computer security principles and practice: William stallings and lawrie brown publisher: pearson education.
  8. IEEE Cybersecurity – Home of the IEEE Cybersecurity Initiative https://cybersecurity.ieee.org/
  9. www.threattrack.com
  10. https://academic.oup.com/cybersecurity/article/5/1/tyz001/5382610?searchresult=1
  11. www.link.springer.com
  12. http://static.usenix.org/events/sec09/tech/full_papers/kolbitsch.pdf
  13. https://www.ijert.org/research/malware-and-malware-detection-techniques-a-surveyIJERTV2IS120163.pdf
  14. https://researchgate.com
  15. https://www.researchgate.net/publication/272238656_A_Survey_on_Malwares_and_Malw_are_Detection_Systems
  16. https://www.researchgate.net/publication/269399065_A_LITERATURE_REVIEW_ON_ MALWARE_AND_ITS_ANALYSIS
  17. http://land.threattracksecurity.com/Security-Analysts-Say-Defending-Against-AdvancedMalware-Still-A-Major-Struggle.html
  18. https://www.ijert.org/research/malware-and-malware-detection-techniques-a-surveyIJERTV2IS120163.pdf
  19. https://www.engpaper.com/cyber-security-2017.html
  20. https://digitalguardian.com/blog/what-cyber-security
  21. https://digitalguardian.com/blog/what-cyber-security
  22. https://en.wikipedia.org/wiki/Computer_security
  23. https://en.wikipedia.org/wiki/Malware
  24. https://www.paloaltonetworks.com/cyberpedia/what-is-malware
  25. https://www.ivanti.com/blog/malware-protection-cybersecurity-threats
  26. https://www.kaspersky.co.in/resource-center/preemptive-safety/what-is-malware-and-howto-protect-against-it
  27. http://www.informit.com/articles/article.aspx?p=26952
  28. https://www.bcg.com/en-in/publications/2018/artificial-intelligence-threat-cybersecuritysolution.aspx

Changes in the Future of Cyber Crimes and Policing: Analytical Essay

Changes in the Future of Cyber Crimes and Policing: Analytical Essay

Cybercrime and intrusions have been occurring over the past few decades. Over the years it has become more prevalent and sophisticated than in previous years. Cybercrime is used on a computer, whether by phone, desktop, or laptop over the internet or network. The world is connected through this technology and has many advantages; however, many disadvantages have been noted. This growing technology brings increased risk of fraud, theft, and exploitation. As technology continues to advance, the systems and software become vulnerable to cyber attacks that include viruses, breaches, media fraud, and phishing to name a few. The good news is, with the help of law enforcement and cybersecurity, that the cyberspace continues to be safeguarded with the use of specialized tools and technology. Since there is always a continued risk with advancements in technology, law enforcement, and other officials must enhance security and minimize risks to combat the cybercrime. Cybercrime happens all over the world and involves international cooperation. When it comes to international cases, it is challenging because other countries have different laws that aren’t designed to handle this type of crime. In most cases, local, state, and federal governments work together from multiple jurisdictions to combat the issues of cybercrime. However, in some cases, there will be jurisdictional issues that get in the way. There will be a need for future changes with fewer jurisdictional issues as well as tougher punishments to help solve and combat these cybercrimes. In addition, these future changes will have a significant impact on the field of policing.

Various Jurisdictions Coordination

Local law enforcement agencies receive the majority of the cyber crimes reports. Although the local officers receive the report, they do not always handle the case. According to a 2013 Police Executive Research Forum (PERF) survey, ’66 percent of responding agencies refer cases to the FBI, and 51 percent to the U.S. Secret Service’ (Page 7). On issue is local agencies do not have the same definition of cyber crimes, which makes collaborating with other jurisdictions difficult. With different agencies having different definitions of what a cybercrime is, they have a hard time getting the case to the appropriate resources. Local agencies differed in size which can cause issues. In my state of Idaho, we have departments that range from 6 officers to 600 officers. The smaller local agencies do not have the staffing to have a full-time committed cyber crimes detective. According to the article Cyber-Crime: Law Enforcement Must Keep Pace with Tech-Savvy Criminals “the pool of qualified candidates is limited because those investigating or examining cyber-crime must be highly trained specialists, requiring detective and technical skills, including knowledge of various IT hardware and software, and forensic tools” (WOLF, 2009). This presents an issue with time and training making them inadequate when it comes to handling these cases.

Jurisdiction becomes a large problem when investigating cyber crimes. Local, state, and Federal jurisdictions vary between physical jurisdictions. If a guy in Idaho steals money from a woman in Texas via a computer, the jurisdiction of the crime becomes a hassle. Many law enforcement officials agree the multiagency task forces are the key to solving many of these issues. The Federal Bureau of Investigation (FBI) has created various multiagency task forces such as National Cyber Investigative Joint Task Force (NCIJTF) and Crimes Against Children (ICAC) task force. ICAC is a collaboration of state local and federal resources that investigate cyber crimes involving children, such as online predators. Many times these online predators are out of state and are requesting inappropriate sexual nature images and videos from children or sharing them with other adults. ICAC solves jurisdictional issues because they have the ability to charge an offender with either a local, state, or federal charge depending on what statutes the offender broke. Multijurisdictional task forces allow the gap of jurisdiction to be bridged and the offenders to successfully be prosecuted. Many states are receiving grant money to create these cyber crime task forces.

Possible Future Changes in Cyber-Related Laws

Local, state, and Federal laws will continue to grow and become more aligned in the eyes of cybercrime. Cyber crimes are still relatively new and as fast as technology is changing the language in the laws has yet to catch up in a more universally between, local, state, and federal jurisdictions. According to the book Cybercrime: Investigating High-Technology Computer Crime in order for the justice system to have clear guidelines “adequate criminal statutes addressing the various high-technology crimes and their punishment, and (2) consistent rulings from the courts as to how the law can be applied to investigations of high-technology crimes’ (Moore, 2011, Pg. 258). Legislation and law changes will be the most significant shifts in the future. The ability for agencies to help with solving these crimes with fewer jurisdictional issues will drastically help in solving cyber crimes.

Punishments are always a significant factor in the deterrence theories. Right now many of the cyber crimes punishments are not harsh enough to gain a good level of deterrence. The risk of doing a little jail time is well worth the possible monetary benefit to many of the cybercriminals. Policy changes must ensure the prosecution and penalties for cyber criminals make them at least think twice. Deterrence will also be fixed with the jurisdictional issues. Cybercriminals understand how difficult it is for the smaller jurisdictions to solve these crimes, so they continue to commit them there knowing they do not have adequate resources. Some criminal justice personnel has theorized that more of a handle on programs created will be enforced or even charging the ones who make programs that allow for easy use of cyber crimes more accountable. The issue with holding the program makers responsible is the same thing as holding gun manufacturers responsible for their guns used in crimes.

Impact

Law enforcement agencies whether local state or federal, having the ability to investigate cyber crimes more adequately will have an enormous impact on the criminal justice field and police in general. With agencies having more qualified personnel trained and ready to handle these crimes, they can adequately serve the people in their community. Policing is slowly changing with the times. This is not just a policing issue this is a criminal justice issue. Laws and statutes must change for judges to provide harsher penalties and allow for police agencies to solve these crimes promptly.

Conclusion

Cybercrime takes up the majority of crimes in America. Local, state and federal multi-agency task forces are a start to solving the headache of cyber crimes jurisdictions. The criminal justice system needs to push the changes in the future of cyber crimes and policing. Although cyber crimes are not going to disappear and will not decline in the sense of crimes committed, with adequate changes to the criminal system some criminals prosecuted for their crimes. This paper discussed how the various jurisdictions coordinate and partner to address jurisdictional differences, identified possible future changes in local and federal cyber-related laws, and explained the overall impact these changes would have on the field of policing.

Expertise of Cyber Crimes and Their Influences over Society: Analytical Essay

Expertise of Cyber Crimes and Their Influences over Society: Analytical Essay

Abstract

In the modern generation of online processing, maximum of the statistics is online and liable to cyber threats. There are a huge variety of cyber threats and their conduct is tough to early understanding hence tough to restrict inside the early stages of the cyber attacks. Cyber assaults may additionally have some motivation at the back of it or can be processed unknowingly. The attacks the ones are processed knowingly may be considered as the cybercrime and they have severe affects over the society in the form of low-cost disrupt, psychological ailments, threat to National protection etc. Restriction of cyber crimes is depending on proper evaluation of their conduct and understanding in their impacts over diverse degrees of society. Therefore, the present-day manuscript offers the expertise of cyber crimes and their influences over society with the destiny trends of cyber crimes.

Keywords: Cyber Attacks, Cyber Crimes, Potential Economic Impact, Consumer believe, National Security.

I. Introduction

The current generation is just too fast to make use of the time thing to enhance the performance issue. It is best feasible due the use of Internet. The term Internet can be described as the gathering of hundreds of thousands of computers that provide a network of digital connections between the computers. There are hundreds of thousands of computer systems connected to the internet. Everyone appreciates the use of Internet but there is some other facet of the coin that is cybercrime by way of using Internet. The term cyber crime can be defined as an act committed or neglected in violation of a regulation forbidding or commanding it and for which punishment is imposed upon conviction. Other phrases represent cyber crime as ―Criminal hobby directly associated with the use of computer systems, in particular, unlawful trespass into the computer gadget or database of some other, manipulation or theft of saved or online data, or sabotage of equipment and information.‖ [1]. The Internet space or cyber area is growing very rapid because the cyber crimes. Some of the styles of Cyber-criminals are stated as underneath.

  • Crackers: These individuals are cause on causing loss to fulfill some antisocial motives or only for fun. Many computer virus creators and distributors fall into this category.
  • Hackers: These people explore others’ pc structures for education, out of curiosity, or to compete with their peers. They can be attempting to advantage using a extra powerful laptop, advantage admire from fellow hackers, construct a recognition, or gain acceptance as an expert without formal education.
  • Pranksters: These people perpetrate tricks on others. They typically do not intend any particular or longlasting damage.
  • Career criminals: These individuals earn element or all in their earnings from crime, although they Malcontents, addicts, and irrational and incompetent humans: ‘These individuals extend from the mentally unwell do not always engage in crime as a full-time occupation. Some have a activity, earn a touch and scouse borrow a little, then flow on to some other activity to copy the system. In a few instances they conspire with others or paintings within organized gangs which includes the Mafia. The greatest prepared crime danger comes from organizations in Russia, Italy, and Asia. ‘The FBI mentioned in 1995 that there have been more than 30 Russian gangs running inside the United States. According to the FBI, a lot of those unsavory alliances use superior records technology and encrypted communications to elude seize’ [2].
  • Cyber terrorists: There are many styles of cyber terrorism. Sometimes it is a rather smart hacker breaking into a central authority internet site, different times it is only a organization of like-minded Internet users who crash a internet site by flooding it with visitors. No be counted how innocent it is able to appear, it is still unlawful to those addicted to capsules, alcohol, competition, or attention from others to the criminally negligent.
  • Cyber bulls: Cyberbullying is any harassment that occurs through the Internet. Vicious discussion board posts, name-calling in chat rooms, posting faux profiles on net websites, and imply or cruel email messages are all methods of cyberbullying.
  • Salami attackers: Those attacks are used for the fee of economic crimes. The key here is to make the alteration so insignificant that during a unmarried case it might pass absolutely omitted e.G. A financial institution worker inserts a application into financial institution‘s servers, which deducts a small quantity from the account of each consumer. In popular cyber crimes may be labeled as follows-

1.1. Data Crime

a. Data Interception

An attacker video display units statistics streams to or from a goal so one can accumulate information. This assault may be undertaken to collect facts to guide a later assault or the data gathered may be the end goal of the assault. This assault typically entails sniffing network traffic, but may additionally include staring at different kinds of information streams, which includes radio. In most types of this attack, the attacker is passive and clearly observes ordinary communication, however, in a few versions the attacker may also try to initiate the status quo of a statistics circulate or have an impact on the nature of the records transmitted. However, in all variations of this assault, and distinguishing this attack from other information series methods, the attacker isn’t the intended recipient of the information flow. Unlike a few other records leakage assaults, the attacker is observing explicit information channels (e.G. Network site visitors) and studying the content. This differs from assaults that collect extra qualitative statistics, which include communication volume, now not explicitly communicated through a records stream [3]. B. Data Modification

Privacy of communications is vital to ensure that data can’t be modified or considered in transit. Distributed environments carry with them the opportunity that a malicious third party can perpetrate a computer crime via tampering with statistics because it movements between web sites [4].

In a records amendment assault, an unauthorized celebration on the network intercepts facts in transit and changes parts of that records earlier than retransmitting it. An example of this is converting the dollar quantity of a banking transaction from $100 to $10,000.

In a replay assault, an entire set of valid data is again and again interjected onto the network. An example could be to copy, 1000 times, a valid $100 bank account transfer transaction. C. Data Theft

Term used to describe whilst information is illegally copied or taken from a commercial enterprise or different person. Commonly, this statistics is user information inclusive of passwords, social safety numbers, credit score card facts, other personal information, or different exclusive company statistics. Because this information is illegally acquired, whilst the character who stole this records is apprehended, it’s far likely he or she will be prosecuted to the fullest quantity of the regulation [5].

1.2. Network Crime

a. Network Interferences

Network Interfering with the functioning of a pc Network by way of inputting, transmitting, negative, deleting, deteriorating, altering or suppressing Network information. B. Network Sabotage

‘Network Sabotage’ or incompetent managers trying to do the jobs of the human beings they commonly are in rate of? It can be the above by myself, or a aggregate of factors. But if Verizon is using the help the children, hindering first responders line then they is probably the usage of network troubles as an excuse to get the federal authorities to interfere inside the hobby of public protection. Of course if the federal authorities forces these human beings again to paintings what is the cause of unions and strikes besides [6].

1.3. Access Crime

a. Unauthorized Access

‘Unauthorized Access’ is an insider‘s view of the computer cracker underground. The filming befell all throughout the United States, Holland and Germany. ‘Unauthorized Access’ seems on the personalities at the back of the computers monitors and objectives to separate the media hype of the ‘outlaw hacker’ from the fact [7]. B. Virus Dissemination

Malicious software that attaches itself to different software program. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are examples of malicious software that destroys the machine of the sufferer [8].

1.4. Related Crimes

a. Aiding and Abetting Cyber Crimes

There are three elements to maximum helping and abetting costs towards an character. The first is that every other character devoted the crime. Second, the character being charged had information of the crime or the principals’ rationale. Third, the character furnished some shape of help to the fundamental. An accessory in legal terms is usually defined as someone who assists in the fee of a criminal offense devoted by way of any other or others. In maximum instances, a person charged with assisting and abetting or accessory has information of the crime either earlier than or after its incidence. A character who’s aware about a crime before it takes place, and who offers a few shape of resource to those committing the crime, is understood in criminal terms as an ‘accent earlier than the truth.’ He or she may additionally help via recommendation, moves, or economic guide.

  • A. Individual who is unaware of the crime earlier than it takes area, but who allows inside the aftermath of the crime, is known as an ‘accessory after the fact’ [9, 10].
  • B. Computer-Related Forgery and Fraud: Computer forgery and computer-related fraud constitute computerrelated offenses.
  • C. Content-Related Crimes: Cyber intercourse, unsolicited industrial communications, cyber defamation and cyber threats are blanketed below content material-associated offenses.

The total cost to pay via sufferers in opposition to these assaults is in thousands and thousands of tens of millions Dollar consistent with year that’s a big amount to trade the state of un-advanced or underneath-evolved nations to developed international locations. Some of the facts related to cyber crimes may be notably marked through the records furnished by using a US base information enterprise [11]-

  • Research examine has discovered that one in 5 online consumers in the US have been victims of cybercrime in the last years.
  • RSA, the security division of EMC have released their Quarterly Security Statistics Review concerning identity theft online, phishing and malware, information breaches and facts loss. O The evaluate discovered that 23 percent of people international will fall for spear phishing assaults, even as web pages are inflamed on common every four. Five seconds.
  • In Australia, cybercrime costs agencies greater than $600 million a 12 months, while within the US, one in five online purchasers have been victims of cybercrime within the remaining years, equating to $eight billion.
  • The evaluate also determined that customers are increasingly more concerned about their protection online. The Identity Theft Resource Centre, 2009 Consumer Awareness Survey within the US located that 85 percent of respondents expressed problem about the safety of sending facts over the Internet, whilst fifty-nine percentage expressed a need for improvement inside the safety of the facts they put up over websites.
  • Reported cases of instances of unsolicited mail, hacking and fraud have accelerated 50-fold from 2004 to 2007, it claims [12].
  • One latest file ranked India in 2008 as the fourteenth u . S . Within the world website hosting phishing websites [13]. Additionally, the booming of call facilities in India has generated a niche for cyber criminal interest in harvesting facts, the file maintained.
  • The phrases of Prasun Sonwalkar [14] reflects the hazard of cybercrime in India ―India is rapid emerging as a main hub of cybercrime as recession is driving pc-literate criminals to digital scams, claimed a look at through researchers at the University of Brighton. Titled ‘Crime Online: cybercrime and Illegal Innovation’, the take a look at states that cybercrime in India, China, Russia and Brazil is a motive of ‘particular situation’ and that there has been a ‘jump in cyber crime’ in India in current years, in part fuelled by means of the large wide variety of call facilities.‖

From Crime Desk of UK [15] stated that on line fraud is worth round £50 billion a yr global, with criminal gangs more and more using the state-of-the-art era to dedicate crimes, provoking the Association of Police Officers to nation within the FT that ‘the police are being left at the back of by using sophisticated gangs’.

Computer spam refers to unsolicited commercial classified ads disbursed on-line via electronic mail, which could from time to time deliver viruses and other packages that damage computers. For the 12 months up to now, the UAB Spam Data Mine has reviewed millions of spam e-mails and efficiently linked the masses of thousands of advertised Web sites inside the unsolicited mail to 69,117 specific hosting domain names, Warner said. Of the overall reviewed domain names, 48,552 (70%), had Internet domains ―or addresses ―that ended inside the Chinese usa code ‘.Cn’ . Additionally, forty eight,331 (70%) of the websites have been hosted on Chinese computers [16].

Many of the African countries are lack of the cyber rules and legal guidelines (many articles and news are available at [17] on this guide). Due to this a cyber crook might also get away even then this is stuck. Countries like Kenya, Nigeria, Tunisia, Tanzania and many others. Are almost loose from the cyber legal guidelines and guidelines.

The above text simplest coated only a few of the examples related to US, Europe, Asia and Africa to reveal the horrible situation of cyber crimes. Restriction of cyber crimes is depending on right analysis in their conduct and knowledge in their affects over numerous degrees of society. Therefore, in the modern-day manuscript a systematic information of cyber crimes and their affects over society with the future tendencies of cyber crimes are defined.

Cyber Crimes against Women: Discursive Essay

Cyber Crimes against Women: Discursive Essay

Crimes against women under cyber law: an introspection and suggestive study

Abstract-

Information and technology are the quintessence of the modern era. The virtual space is the present now and indeed cyberspace has quickly escalated the need for cyber laws. The dimensions of cyber crime have been expanding at a catastrophic rate. Paradoxically, the proportion of benefits that should have arisen from the cyberspace have tilted towards the misdemeanours and vicious circle of organized crimes that have been taking place to which teenage girls and women are the most endangered. The present paper introspects upon the assumptions suggesting cyber violence as gender-specific violence and explores the vastness and extent of these crimes against women in realm of cyber stalking, bullying, morphing pornographic images, electronic blackmailing, and defaming, blackmailing, abusing and matters connection with the victimization of women in the cyberspace. Furthermore, the paper will throw light on the domestic and international legislation which have been adopted to curb this ever-increasing menace in the domain of virtual space. An enunciated paradigm will also be drawn based on the current incidents concerning contravention of cyber laws, henceforth inculcating the law enforcement responses and reposing faiths in justice systems. A comparative study will also be made on the measures taken around the globe and its impact and effectiveness in the information technology regime as well as victim support and rehabilitation system. Finally, the paper will put forth the suggestive remedies and responses which can be most suitably adapted and practiced in the Indian socio-legal scenario and its technological manifests.

Introduction

“As the world is increasingly interconnected, everyone shares the responsibility of securing cyberspace” – Newton Lee

The dimensions of cyberspace are such that, in the presence of the dark web and even the deep web, no one can possibly ascertain the extent of this. The vastness of cyberspace has created the worrisome and sorry state of affairs. This gift of globalization and technological advancement has become a curse of the twenty-first century. Cyberspace is a boon or a bane is a matter of debate and speculation. However, it is well established that there is an increase in number of cyber crimes against women at the rate of 6.3% from 11592 reported cases in 2015 to 12,317 reported cases in 2016 as per the National Crime Records Bureau. In India, Maximum number of cases under cyber-crimes were reported in Uttar Pradesh (2,639 cases) (21.4%) followed by Maharashtra (2,380 cases) (19.3%) and Karnataka (1,101 cases) (8.9%) during 2016. During 2016, 48.6% of cyber-crime cases reported were for illegal gain (5,987 out of 12,317 cases) followed by revenge with 8.6% (1,056 cases) and insult to the modesty of women with 5.6% (686 cases).[footnoteRef:2] [2: NCRB Crime Report 2016, available at:http://ncrb.gov.in/StatPublicati ons/CII/CII20 16/pdfs/Crime% 20Statistics%20-%202016.pdf (last visited on 5 September 2019)]

Analysis of the cyber crimes against women and tackling mechanism

The tackling mechanism in India for cyber crimes known as the Information Technology Act, 2000 is more or less considered as a half-baked law. Since the priority was given to the protection of electronic commerce popularly called the e-commerce and communications, cyber-socializing communications has remained untouched with no specific regard to cyber victimization of women in India. The Indian Information Technology (IT) Act of 2000 is based on the 1997 United Nations Model Law on Electronic Commerce and focused on communications infrastructure and e-commerce initiatives.’ The IT Act included some penalties for economic crime committed online, but failed to address cybercrime against individuals. Amendments to the law passed in 2008 regulated more illegal cyber activities, including distribution of images depicting child sexual abuse. Women who are raped are often re-victimized when the images of their rape are recorded and used against them to perpetuate the cycle of violence.[footnoteRef:3] [3: Anita, G., Niveditha, M. (2009, December 9). Economic and Political Weekly, available at: http://www.jstor.org/stable/25663650 (last visited on 10 September 2019)]

Specifically, Section 66A, 66E, 67, and 67A[footnoteRef:4] which deal with crimes that affect women provides for punishment for sending offensive messages through communication service. It covers any electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or mislead the addressee or recipient about the origin of such messages. Online threats of rape, abuses, derogatory messages, hacking someone’s mail or social media page to defame are punished under this law for offenses causing mental violence. As simple and pragmatic as it may sound, it is easy for Police to arrest a person under this act but filing a charge sheet becomes next to impossible as the Police is often found not well equipped or read for these matters to understand the gravity and to track the authentic source of these sort of messages. Paradoxically, the news of arrest is easily found on any informational or media sources but the updated data and statistics on charge sheeting or conviction are no available. This is due to the reason that people arrested are often not investigated upon for a charge sheet be made against them and are discharged or acquitted later by court later. Section 66E provides punishment for violation of privacy. Privacy here means capturing, transmitting, publishing any image of private area of body and publishing that without anyone’s consent making it a punishable offence. For women it is specifically mentioned ‘buttock or female breast’. However, this definition lacks significantly because any part of private area should not be visible to public without consent regardless of that person is in public or private place. This section deals exclusively with privacy of body and the provision of consent makes it critical as it later becomes difficult to prove consent was not there in the activity. Registering a crime is not important and unless we consider investigation, inquiry or making charge sheet, conviction and acquittal, it is not possible to understand the situation. Often cyber crimes against women take place within marital relations when an estranged partner uploads obscene images of his wife. In these cases also proving the consent becomes a complex activity. Even if consent was there whether it was an informed consent also becomes important. Cases registered under Section 66E is abnormally low since the conviction rate of IT Act is not at all impressive. [4: the Information Technology Act, 2000]

The Indian Evidence Act is very vital in dealing with electronic evidences. Guidelines of evidences are provided by the Indian Evidence Act 1872. Indian Evidence Act was amended to include evidences relating to electronic record. Presently, Section 65A and 65B provides for evidences related to electronic record and admissibility of electronic record. The act needs to be more explicit, updated and stronger to deal with the issue of electronic evidences. Without compatible evidence it is very difficult to improve conviction rate of cyber crimes. Section 354 of IPC presently covers voyeurism, stalking and sexual harassment all of which are now punishable criminal offence. Stalking, Voyeurism and sexual harassment where computer is used as a medium are mostly registered under IPC. The judiciary also needs to be sensitized about the record-keeping of electronic records and dealing with them. The police also needs to be more well-equipped in dealing with electronic records.[footnoteRef:5] [5: National Dialogue on Gender-based Cyber Violence National Dialogue on Gender-based Cyber Violence Introspecting the Gaps between Cyber Crimes against Women and Laws ]

Law enforcement response

A rapid increase in the use of computer and internet has given rise to new forms of crimes like publishing sexually explicit materials in electronic form, video voyeurism and breach of confidentiality and leakage of data by intermediary, e-commerce frauds like impersonation commonly known as Phishing, identity theft and offensive messages through communication services.[footnoteRef:6] Section 66A of Information Technology Act, 2000 which dealt with punishment for sending offensive messages through communication service, etc. was struck down not because it is outside the purview of Art 19(1)(a) alone but because of vice of vagueness and the use of loose language. None of the terms in 66A are even attempted to be defined and cannot be defined, the result being that innocent persons are roped in as well as those who are not.[footnoteRef:7] [6: Shreya Singhal vs. Union of India (24.03.2015 – SC)] [7: Ibid.]

Comparative study on measures and remedies

This most concerning issue of “cyber crime against women” was ignored and unaddressed until the first cybercrime convention, which took place in 2001. The Convention on Cybercrime of the Council of Europe (CETS No.185), known as the Budapest Convention, is the only binding international instrument on this issue. It serves as a guideline for any country developing comprehensive national legislation against Cybercrime and as a framework for international cooperation between State Parties to this treaty. The Budapest Convention is supplemented by a Protocol on Xenophobia and Racism committed through computer systems.[footnoteRef:8] [8: Budapest Convention, available at: https://www.coe.int/en/web/cybercrime/the-budapest-convention (Last visited on 12 September 2019).]

United Kingdom’s Protection of Harassment Act, 1997 covers cyber offenses such as cyber harassment and cyber stalking typically against women originating from domestic violence or dating violence. The offenses related to unauthorized access are regulated by a compact legislation called “Computer Misuse Act, 1990”. This Act was created to protect the both men and women who are victims but the language clears provides that the Act suits to the need for preventive action against harassment of women. This Act mainly covers the three offenses namely, unauthorized access to computer material, to enable any such access to secure unauthorized access, intention to create further menace with such unauthorized access, and unauthorized modification of the computer material. the United States Of America Code makes it an offense to use a telecommunications device in interstate or foreign communications to: (1) make, create solicit and initiate the transmission of “any comment, request, suggestion, proposal, image, or other communication which is obscene, lewd, lascivious, filthy, or indecent, with intent to annoy, abuse, threaten, or harass another person”; (2) make, create solicit and initiate the transmission of “any comment, request, suggestion, proposal, image, or other communication which is obscene or indecent, knowing that the recipient of the communication is under 18 years of age, regardless of whether the maker of such communication placed the call or initiated the communication”; (3) Make a telephone call or “utilize a telecommunications device, whether or not conversation or communication ensues, without disclosing his identity and with intent to annoy, abuse, threaten, or harass any person at the called number or who receives the communications”; (4) Make or cause “the telephone of another repeatedly or continuously to ring, with intent to harass any person at the called number”; (5) Make repeated telephone calls or repeatedly initiate communication “with a telecommunications device, during which conversation or communication ensues, solely to harass any person at the called number or who receives the communication”; or (6) Knowingly permit any telecommunications facility under his or her control to be used to commit any of the previously-listed activities. The penalties for these offenses include fines, imprisonment for up to two years, or both.[footnoteRef:9] [9: Section 223(a) of Title 47 of the U.S. Code. ]

Disregard to women in patriarchal society as compared to the USA and UK has led more statistical rise of cyber crime against women in India than the counterparts. While the nature of the problems originated from the information and communication technology remain more or less same across the world, however the economic, political and social conditions of these countries is different to each other. Irrespective of how any mechanism to curb cyber crimes are developed, the ultimate solution to this problem, like any other lies in our society. Based on the direction of Hon’ble Supreme Court under the matter of Suo moto Writ Petition no.3/2015[footnoteRef:10] certain guidelines were issued by the Apex Court bringing new initiatives taken by different organizations to bring a difference in the present situation. [10: Re: Prajwala Letter Dated 18.2.2015]

International conventions, as well as domestic laws of many countries, may have developed laws to protect society as a whole from the clutches of the “dark side” of cyberspace however has not mitigated the cyber crimes from its root. Numerous NGOs have been coming forward realizing the need of the hour.

An initiative of Government of India known as the National Cyber Crime Reporting Portal facilitates the victims/complainants to report cybercrime complaints online. This portal caters to complaints pertaining to cyber crimes only with special focus on cyber crimes against women and children. Complaints reported on this portal are dealt by law enforcement agencies/ police based on the information available in the complaints. It is imperative to provide correct and accurate details while filing complaint for prompt action.[footnoteRef:11] Online cybercrime reporting platform [11: https://cybercrime.gov.in/]

  • One national-level cyber forensic laboratory
  • Training of Police officers, judges & prosecutors
  • Cybercrime awareness activities
  • Research & Development[footnoteRef:12] [12: Government of India Ministry of Home Affairs Delhi Cyber Crime prevention against Women and Children, available at: https://pib.gov.in/Pressreleaseshare.aspx?PRID=1559115 Press Information Bureau (Last visited on 12 September 2019).]

The complaint lodged on the portal is obtained by the nodal officer of the concerned state. Cyber Crime State Nodal Officer will then forward the said complaint to concerned Superintendent of Police (SP) at district level and further investigation is completed. Some remedies as enunciated by the National Crime Reporting Portal provides that If anyone is victim of cyberstalking, he or she should be consulted by parents, friends or relatives and file complaint against the cyber stalker on National Cyber Crime Reporting Portal or the Police. It is also advisable to save all communications with the stalker as evidence. Most important measure is to keep evidence such as Credit card receipt, Bank statement, envelope (if received a letter or item through mail or courier), brochure/Pamphlet, online money transfer receipt, copy of email, URL of webpage, chat transcripts, suspect mobile number screenshot, videos, images or any other kind of document.

Being careful while accepting friend request from strangers on social media. Ensuring personal information, photos and videos and selecting privacy settings accordingly is also suggested. Being careful to uploading photos on social media which shows location or places being frequent visited as there could be cyber stalker may keep tab on daily lifestyle of victim. Being careful about sharing personal details such as address, phone number, date of birth etc. on social media and avoid downloading email attachments or clicking on suspicious links received in emails from unknown or unreliable sources. It is advisable to scan all removable media with anti-virus software before use. Passwords should also not be stored in readable forms like in notebook, computer or books.

Conclusion

Henceforth on the basis of the aforementioned detailed submissions on cyber crimes against women it is further suggested that Securing our online presence just like you secure ourselves, there shall be mindfulness of appearance on video chat & video calls and fake social media accounts as not all the accounts are real and not all information provided on accounts are true. Being cautious with sensitive browsing the deleted data on communication devices can be recovered, being careful while giving mobile devices, PC’s for servicing/repairing/selling, Protecting communication devices, Report if content is found related to of Child Pornography (CP)/Child Sexual Abuse Material (CSAM) or sexually explicit material.[footnoteRef:13]For this NCRB has already been notified as Central Government nodal agency to issue notices under Section 79(3)b of Information Technology (IT) Act. There also exists limitations in availing National Crime Reporting Portal wherein only three categories of offences under cyber domain is made punishable and reportable that is Child Pornography (CP), Child Sexual Abuse Material (CSAM) and sexually explicit content such as Rape/Gang Rape (CP/RGR) content. A complainant also suffers from a bulk load of procedural compliance to lodge a complaint and ambiguity is also surfaced regarded whether a particular offence, for instance cyber stalking falls under which category making registration of crime really an excruciating process. There is an undeniable need to curb women victimisation in cyber domain for creation of a safe and more technological cyber domain for future. [13: Cyber awareness and hygiene for teens and young adults, available at: https://cybercrim e.gov.in/ Webform/C rime_OnlineSafetyTips.aspx (last visited on 12 September 2012).]

Cyber Crime and Security in Business: Analytical Essay

Cyber Crime and Security in Business: Analytical Essay

Abstract

Cybercrime are in charge of the intrusion of ordinary PC works and has been known to cause the defeat of numerous organizations and individual substances. This exploration paper means to examine following parts of Cybercafes: the definition, why they happen, laws overseeing them, strategies for carrying out cybercafes, who they influence, and cybercrime counteractive action systems. All the more particularly, this paper will dig into one fundamental case of cybercrime ‘hacking’. The report will demonstrate the use and movement of innovation has opened up various kinds of wrongdoings and we will also see how the business is affected by the invasion of privicy and how the paper hijacking is also growing into a big business and is creating a big program for the company who run these paper publishing company and we will also see about burglary violations and psychological oppression. Likewise, this report will show measurable information which will give a thought of how far cybercrimes has increment over the time of ten years or more.

Aims and Objectives

  1. To determine the impact of cybercrime on networks.
  2. To determine the advent of cybercrime.
  3. To determine the pros and corn of network security.
  4. To determine how network security reduces the treat of cybercrime

Introduction

In our cutting edge innovation-driven age, keeping our own data private is more troublesome. In all actuality, exceptionally grouped points of interest are ending up more accessible to open databases, since we are more interconnected than any time in recent memory. Our information is accessible for nearly anybody to filter through because of this interconnectivity. This makes a negative shame that the utilization of innovation is perilous in light of the fact that for all intents and purposes anybody can get to one’s private data at a cost. Innovation keeps on promising to facilitate our day-by-day lives; be that as it may, there are threats of utilizing innovation. One of the primary risks of utilizing innovation is the danger of Cybercrimes.

Normal web clients might be unconscious of cyber crimes, not to mention what to do on the off chance that they fall casualty of digital assaults. Numerous blameless people succumb to cyber crimes around the globe, particularly since innovation is developing at a fast pace. Cyber crimes are any wrongdoings that reason damage to another individual utilizing a PC and a system. Cyber crimes can happen by issues encompassing entrance of protection and classification. Whenever protection and private data is lost or hindered by unlawfully people, it offers approach to prominent violations, for example, hacking, digital psychological oppression, reconnaissance, monetary burglary, copyright encroachment, spamming, digital fighting, and numerous more wrongdoings which happen crosswise over fringes. Cyber crimes can transpire once their data is rupture by an unlawful client.

In the course of the most recent year and a half, an unfavorable change has cleared over the web. The danger scene once overwhelmed by the worms and infections released by flighty programmers is presently led by another type of cybercriminals. Cybercrime is spurred by extortion, exemplified by the counterfeit messages sent by phishers that plan to take individual data Cyber crimes are in charge of the accomplishment of their particular criminal resources and the destruction of numerous organizations and individual elements.

Cyber crimes create an overwhelming errand for law authorization bureaus since they are extremely technological wrongdoings. Law requirement associations must have people prepared in PC disciplines and PC legal sciences keeping in mind the end goal to precisely research PC wrongdoings or cyber crimes that have been perpetrated. Furthermore, numerous states must modernize and create enactment, which denies cybercrimes and layouts suitable penalties for those violations. Cyber crimes will probably turn out to be more continuous with the landing of propel advancements. It is essential that regular people, law authorities, and different partners of the equity framework are very much educated about cyber crimes to decrease the danger that they cause.

The reason for this paper is to instruct people who don’t comprehend what are Cyber crimes and its significance in becoming mechanical progress all through society. Understanding the danger of cyber crimes is an extremely related issue since innovation holds an incredible effect on our general public all in all. Cybercrime is developing each day on the grounds that since mechanical progressing in PCs makes it simple for anybody to take without physically hurting anybody due to the absence of information to the overall population of how cyber crimes are carried out and how they can secure themselves against such dangers that cyber crimes postures. This paper will talk about a few parts of Cybercrimes including characterizing the term, why cyber crimes happen, laws administering them, strategies for perpetrating cyber crimes.

Methodology

The pursuit will base on optional information amassing. The information will be squeezed out from different diaries, articles, and books. Optional research portrays data amassed by writing, communicate media, productions, and other nonhuman sources. This sort of research does not require human fields. The examination promotion utilized is subjective and utilized the contextual investigation strategy. Subjective research is for all intents and purposes more inalienable than quantitative one. Strategies for inquire about with a specific end goal to accomplish planned assignments different hypothetical and experimental strategies are conjured in the ace theory. Hypothetical strategies for investigation: Historical technique is connected to give learning about digital violations furthermore, arrange security. Legitimate techniques are conjured to sum up the utilized writing and to draw deductions.

The estimations of decision for writing were pertinence to look into point and year of distributing. Both open and singular libraries, and also online libraries, were chaffered to approach the information. Some of online databases that were gotten to are google scholar, qoura, emerald, proudest, and so on. Information accumulation foundations, for instance, Gallup furthermore, AC Nielsen bear on inquires about on a rehashed premise homing in on a wide lay of subjects. A library is an array of administrations, assets, and sources. It is sorted out for the working of and is kept up by a open body, an association, or even a person. In the formal sense, a library is a gathering of books. The term can mean the total, the development that homes such an array, or both.

Laws of Cybercrime

In this segment of this paper, we’ll talk about Laws and enactment that oversees cybercrime in the United State and inside different nations around the world. This segment will feature a few laws and let individuals know a portion of the laws that are out there to secure them and a portion of the corrections to these laws to stay aware of the distinctive progression in innovation. {2}Casey, Eoghan. Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press, 2011Section 1030(a) basically punish the person who are gaining unauthorized access to the system with denial of service .{5}Marion, Nancy E. ‘The Council of Europe’s Cyber Crime Treaty: An exercise in Symbolic Legislation.’ International Journal of Cyber Criminology 4, no. 1/2 (2010): 699. The us parliment bascially passed the controlling the assult of non solicated pornography and marketing act of 2003

All laws aren’t the same in numerous nations, particularly with regards to cyber crimes. For various nations have particular laws representing issues, for example, cyber crimes. For case, in some countries such as India accepted The Information Technology Act which was passed and uphold in 2000 on Electronic Commerce by the United Nations Commission on Trade Law. In any case, the Act expresses that it will sanction web-based business and supplementary modify the Indian Penal Code 1860, the Act 1872, the Banker’s Book Evidence Act1891, and the Reserve Bank of India Act 1934.

{3}Nappinai, N. S. ‘Cyber Crime Law in India: Has Law Kept Pace with Engineering Trends-An Empirical Study.’ J. Int’l Com. L. & Tech. 5 (2010): 22. India got its Informational technology act in 2000 and fail to meet the global standard. Area 43 which clarify and authorize the unlawful access, exchanging, infection episodes causes hurt for instance Stuxnet worm, DOA, interruption with the administration profited by anybody. Be that as it may, different segments battle against source records by means of workstations being changed which can final product detained up to multi-year or be fined expressed by Section 65 while in Section 66 it puts on a show to assent access with frameworks, violations that conflict with hoodlums can be detained up to 3 years or fine which goes up to 2 years or more.{1}Casey, Eoghan. Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press, 2011.

The identity theft act and restitution act came into the effect on 26 Sep 2008 responsible for the fraud for cyber.

New Types of Frauds in Cyber Crime

Hijacked Journal

{6}Dadkhah, Mehdi. ‘New types of fraud in the academic world by cyber criminals.’ Journal of advanced nursing 72, no. 12 (2016): 2951-2953. Hijacked Journals are phony sites that utilization the name and ISSN of legitimate diaries to swindle creators. These diaries Distribute creators’ papers without audit by accepting cash. There is some examination with respect to captured diaries, yet it appears this is inadequate in light of the fact that the quantity of casualties of commandeered diaries is developing. A few creators talk about captured diaries and characterize general rules for creators to distinguish this misrepresentation. Likewise, there are articles that uncover particular commandeered diaries with confirmation of their extortion. A portion of the exploration centers around the manners in which falsifiers cheat creators, including sham affect factors, counterfeit meetings, and social building. There were 20 known captured diaries in 2014, however, roughly 90 captured diaries were identified in June 2015. This demonstrates the commonness of commandeered diaries is developing. Likewise, in the underlying commandeered diaries, ruffians utilized basic strategies for capturing, and, by and large, they utilize a content administration framework to make the site. Nonetheless, in 2015, we saw complex sorts of capturing, where criminals make seized sites like the first ones and utilize complex social building procedures to swindle logical databases, for example, Thomson Reuters, and record the phony site in these databases. Two illustrations are Allgemeine Frost und Jag Zeitung. Counterfeiters cheat Thomson Reuters what’s more, filed counterfeit URLs by utilizing a few vulnerabilities in this logical database.

Invasion of privacy by selling of private information

{7}Posey, Clay, Becky Bennett, Tom Roberts, and Paul Lowry. ‘When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse.’ (2011).n the present century, protection is the very pinnacle of concern and in the scholastic world, we can see a few sorts of protection attack through the offering of private data. A few faulty diaries or meetings offer their members’ data, including email addresses, phone numbers, and aptitude to individuals who look for this data for notice. For instance, numerous scientists get calls for papers from savage diaries after cooperation in gatherings or get spam messages about some organization. The best approach for managing this sort of intrusion of security is recognition of phony gatherings from true ones. Counterfeit gatherings regularly have obscure logical boards of trustees, utilize free URLs and general mail administrations, for example, Yahoo and Gmail.

Paper Hijacking

.As of late, criminals have made phony editing locales to seize unpublished papers and pitch them to individuals who look for such papers. The greater part of these phony editing locales guarantee quick, high caliber, and modest editing to convince their casualties to send papers. In the wake of capturing and offering the papers, we can locate a similar paper distributed with various creators. The response to: ‘which creators are the genuine creators of paper?’ is difficult to decide. For identification of these counterfeit editing destinations, we propose that creators utilize the Who is database and the Google page positioning calculation. By utilizing the Who is database, a creator can look through the space furthermore, get related data; if the area enrollment time is not as much as multi-year, the explored site is suspicious. Concurring our assessment, a real editing site has in excess of one-page positioning.

Discussion

After analyzing the results of the study through qualitative analysis it can be said that computers and the Internet are now a familiar part of our lives. You may not see them often, but they are involved in some way in most of our daily activities in the business, educational institutions, and government. Without the support of any of these tools, we would be able to handle the overwhelming amount of information that seems to characterize our society. But the problem of security limits the integrity of information and computer systems. More people need to know the use of computers and the protections that are daily offered for the safe handling of information. {8}Downes, David, Paul Elliott Rock, and Eugene McLaughlin. Understanding deviance: a guide to the sociology of crime and rule-breaking. Oxford University Press, 2016.Cyber warfare has been defined as the process of nation-state to introduce computers of other countries or networks to cause damage or destruction. Cyber warfare is a form of warfare that occurs on computers and the Internet, by electronic means rather than physical. Moreover, the Internet is a means of easy access, where any person, remaining anonymous, can proceed with an attack that is difficult to associate, virtually undetectable and difficult to smuggle, let alone reaching a high impact such action directly hitting the opponent by surprise. The term network security refers to protection against attacks and intrusions on corporate resources by intruders who are not allowed access to these resources. . A hacker can take months to violate a system and increasingly sophisticated methodologies are used by the present-day hackers. A hacker enters a prohibited area to gain access to confidential or unauthorized information. The mass media prefer to characterize them as criminals to intercept credit card codes and use them for personal gain. There are also those who intrude into airport systems producing chaos in flight schedules and aircraft. Today hacking is a prime concern of businessmen, legislators, and officials. A similar but different form of information intrusion is cracking. Crackers are people who disturb others; pirate software protected by law, destroying complex systems by transmitting powerful virus, and so on. Restless teenagers quickly learn this complex craft. They differ with hackers because they lack any kind of ideology when they do their jobs. Instead, the main objective of hackers is not to become criminals but fight against an unjust system used as a weapon system itself. Every organization should be at the forefront of change processes. Where continuous information is available, reliability and time is a key advantages. In fact, hacking is so easy that if you have an online and know how to send and read e-mail, you can start hacking immediately. Here you can find a guide where you can download programs especially appropriate for the hacker on Windows. Usually, these programs are free. They try to explain some easy hacker tricks that can be used without causing intentional damage. The threats to the network security are not just for organizations but can be observed all over the world in different countries and the degree to which each of them are exposed to threats.

Benefits of Network Security

  1. Prevents unauthorized users from accessing your network.
  2. Provides transparent access to Internet-enabled users.
  3. Ensures that sensitive data is transferred safely by the public network.
  4. Help your managers to find and fix security problems.
  5. Provides a comprehensive system of warning alarms attempt to access your network.
  6. {4}Trcka, Milan V., Kenneth T. Fallon, Mark R. Jones, and Ronald W. Walker. ‘Network security and surveillance system.’ U.S. Patent 6,453,345, issued September 17, 2002. the network security help in post-event reconstruction in a security network

Conclusion

Cyber crimes will dependably be a progressing challenge in spite of the headways being made by various nations. Most nations have their own laws to battle cyber crimes, yet some doesn’t have any new laws yet exclusively depends on standard earthbound law to arraign these wrongdoings. Alongside obsolete laws to battle cybercrime, there are as yet weak punishments set up to rebuff crooks, accordingly doing no real aversion of cyber crimes which influence the economy and individuals social lives on a huge scale by those offenders. Subsequently, there is a urgent requirement for nations on a worldwide scale to meet up and choose what constitute a cybercrime, and create manners by which to oppress offenders crosswise over various nations.

It is prescribe that until the point when adequate legitimate activities can be set up where singular nations and worldwide methods for mistreatment hoodlums, self-security remains the principal line of barrier. The ordinary people and organizations need to ensure they are instructed on what to do as far as avoid in turning into the following casualty of cyber crimes. This essential mindfulness can help counteract potential cybercrime against them.

It is relatively difficult to reduce cybercrime from the internet. Thinking back on the a wide range of acts passed, history can be witness that no enactment has flourished altogether elimination of cybercrime from the world. The main conceivable advance is to make individuals mindful of their rights and obligations and further making more culpable laws which is more stringent to check them. Without a doubt, the diverse Acts were and still are verifiable strides in the virtual world as we probably am aware it. This further recommends there is a need to convey modifications in the Information Technology Act so it can be more compelling to fight cyber crimes. Alert ought to be employed for the master enactment instructive organizations that the necessities of the digital laws are not arranged so thorough that it might defer the development of the trade and exhibit to be counter-beneficial to many. Remember, cybercriminals are advancing also as far as PC learning per innovative progression made.

Referencing

  1. Casey, Eoghan. Digital evidence and computer crime: Forensic science, computers, and the internet. Academic Press, 2011.
  2. Casey, Eoghan. Digital evidence and computer crime: Forensic science, computers, and the internet. Academic Press, 2011
  3. Nappinai, N. S. ‘Cyber Crime Law in India: Has Law Kept Pace with Engineering Trends-An Empirical Study.’ J. Int’l Com. L. & Tech. 5 (2010): 22.
  4. Trcka, Milan V., Kenneth T. Fallon, Mark R. Jones, and Ronald W. Walker. ‘Network security and surveillance system.’ U.S. Patent 6,453,345, issued September 17, 2002.
  5. Marion, Nancy E. ‘The Council of Europe’s Cyber Crime Treaty: An exercise in Symbolic Legislation.’ International JourDadkhah, Mehdi.
  6. New types of fraud in the academic world by cyber criminals.’ Journal of advanced nursing 72, no. 12 (2016): 2951-953.nal of Cyber Criminology 4, no. 1/2 (2010): 699.
  7. Posey, Clay, Becky Bennett, Tom Roberts, and Paul Lowry. ‘When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse.’ (2011).
  8. Downes, David, Paul Elliott Rock, and Eugene McLaughlin. Understanding deviance: a guide to the sociology of crime and rule-breaking. Oxford University Press, 2016.

Ways to Combat the Cyber Crimes: Analytical Essay

Ways to Combat the Cyber Crimes: Analytical Essay

Recommendation

Besides joining Malaysian Communications and Multimedia Commission (MCMC) and international conventions such as Budapest Convention, there were still many steps we can do to combat the cyber crimes.

In United Kingdom, Due to the increasing of the cyber crimes in United States, Police Central e-crime Unit (PCeU) formed by the Metropolitan Police service, and the government are fully supported by the Home Office. PCeU has provided some courses such as essential of the cyber security and the introduction of the cyber security, programs such as related to cyber crimes to the police officer to let them understand and knowledgeable about the dangerous of the cyber crimes and how to respond if they meet the cyber crime cases.

Apart from that, in 2005, the website ‘Get Safe Online’ was supported and sponsored by the Government and the industry. In this website, it provides the services of advises the people relate to the cyber crimes, information, and knowledge about how to protect themselves from the cyber crimes and also gives the tutorial how to set the antivirus software, firewalls, and some content filter to the public, especially the company who works in the category of business. This websites will be in link with the National Fraud intelligence Bureau to update the public about the latest information of online threats and scams from the scammer.

Besides that, the United Kingdom government also realise that the needs to set an organisation or reporting place for the children, young person who has being threatened online, that is Child Exploitation and Online Protection command (CEOP). Functions of CEOP are to spot the offenders who alleged threatening the children or young person. Under CEOP official websites, there were a segment known as ‘most wanted’ list out the name and the picture of the offender that involve in child sex and abuse. With the uses of the websites, Virtual Global Taskforce is a non-government organization helps tracking all the child abusers offenders all over the world. In order to increase the awareness of cybercrime among the children and young adults, CEOP establish a program called ‘Thinkuknow’ to let them know more about the dangerous and the action they can do when happen online harassment or online bullying. The children and young adults who suffer from cyberbullying and account hacking also can seek help through CEOP or the website that runs under CEOP.

Apart from that, United Kingdom also keep review and raise the standard to keep the children and young person away from the cyber crimes , for example , UK Council for Child Internet Safety (UKCCIS) has establish a campaign known as ‘click clever , click safe’ and under this campaign comes out with the conduct code known as ‘ Zip it , Block it, Flag it’ .Zip it means think carefully before you write something online, Block it means block the user who keep spamming unknown attachments or links while Flag it means flag out someone when someone online asking you out. These conduct code ensure the children and young adult safe online. United Kingdom not just keep enhance its own legislation, launches types of programs but also joining some international conventions such as United Nations, G7 and the Council of Europe Cybercrime convention to discuss together with other country relate to some big issues such as the ways to combat the cyber crimes.

In United States, Federal Bureau of Investigation (FBI) is leading agency to the case that involves the cyber crimes. The threads of cybercrime to the country becoming more commonplace, more un-safety and sophisticated, for examples, the company maybe involve in the scenarios that have hackers try to hack into the company’s confidential data, citizens maybe involve in scenarios of identity thief, the online predators also targeted the children and young adults. So under FBI, they form a cyber division to decrease the cyber crimes. FBI also establishes a websites known as ‘Internet Crime Complaint Centre (IC3) ’ to let the public has an alternative way to complain the crimes related to the cyber crimes.

United States government also form an organization known as National Computer Security Survey (NCSS). NCSS work with the National Cyber Security Division (NCSD) and Bureau of Justice Statistics in order to create an accurate data relate to cyber crimes to the public. The function of the NCSS are to collect a useful and reliable data and information relate to which types of the cyber crimes that the public faced the most and also the number of losses by the public who faced the cyber crimes, it also provides the details of how the offenders commit cyber crime to the citizens or the company to let the public knows their pattern of commit crime and it creates awareness among the public. Internet Crimes against Children (ICAC) Task Force investigates the offenders who commit online sexual harassment or online bullying to the children or young adults. United states also join some international organisations which enforce the cybercrime laws such as Interpol, Europene Cybercrime Center and NATO Cooperative Cyber Defense Centre. Firstly, the Interpol is an organization who detects the cybercrime and also lists out some prevention to the member of this international organization to prevent the cyber crimes keep increasing in their own country. Secondly, the European Cybercrime Center plays an important role to assist the United Nations to combat against the cybercrime or more even worst the terrorism. In order to strengthen the enforcement of the law in relation to the cybercrime and also protects the public from the cyber crimes, Europol, the function of the European Cybercrime centre is to deals with big issues such as a cyber-attack that are done by some criminal organizations. While, NATO Cooperative Cyber Defence Centre focuses more about the research and training relate to the development, education of cyber law.

In my opinion, I think that Malaysia should follow the development countries such as United Kingdom and United States footsteps to establish some organisation, websites or programmes such as united kingdom open the course relate to the cyber security to the police officer to enable the police officer can help the public . Besides that , both country also establish websites to protect the children from cyber crimes such as ‘Get Safe Online, and also establish some campaign such as ‘Thinkuknow’ and ‘click clever , click safe’ , so I think that Malaysia should creates more websites and campaign to create awareness of the dangerous of cybercrime among the public especially children and young adults. Besides that, I think that Malaysia should join more international convention as the convention may gives some advises relate to the prevention of cybercrime, then our country can find a best solution to combat the cyber crimes and government should reserve some budgets for the establishment of a cyber security centre and also investigation unit for only cyber crimes as cyber crimes also one of the big issues in our country.

Analytical Essay on Cybercrime and Identity Theft

Analytical Essay on Cybercrime and Identity Theft

Crime happens every day. When you are online you become vulnerable to any form of cybercrime. According to the textbook Go! All in One: Computer Concepts & Applications, cybercrime is “criminal activity on the internet” (Gaskin, Vargas, Geoghan and Gravett 110). Cybercrime is one of the top crimes committed in the United States. National crime agencies, like the FBI, now have areas to stop it. According to the Law Offices of Elliot and Kanter “over 143 million Americans have been affected by computer crimes in the last year, with 80% of those surveyed reporting they or someone they knew had been victimized” (Kanter 2018). There are many different types of cybercrimes; many people have fallen as a victim to them. The different types and most common types are malware, cyberbullying, identity theft, phishing, hacking, and child soliciting and abuse.

Malware is “a type of software that has been particularly designed to gain access to or damage a computer, mostly without the knowledge of the owner” (Raymond 2018). How malware typically happens is when the user clicks on something on the Internet that seems to be trustworthy. This is usually done through different pop-ups online or through email. When malware is installed it takes over the computer and in turn, the computer starts acting very weird. The easiest way to recognize that malware has been installed is if your computer starts getting slower and slower. This is something that is the easiest to recognize. The best way to avoid downloading malware is to make sure what you are downloading to your computer is safe. Word to the wise do not download anything random.

Cyberbullying is the most common type of cybercrime for young adults and teenagers. Many people have been affected by this. Cyberbullying is “bullying that takes place over digital devices like cell phones, computers, and tablets” (U.S. Department of Health and Human Services 2018). This type of bullying has become very popular because people can stay behind a screen and do not need to do it face-to-face. Also, for a person to be bullied, they do not have to be mentioned in any posts. Unfortunately, from personal experience, there is nothing a person can do to prevent it. The best way to help prevent cyberbullying is to keep the amount of social media pages to a minimum. There are seven ways to keep track of it “notice, talk, document, report, and support” (U.S. Department of Health and Human Services 2018). For parents, this will be hard but try to make sure you have access to your child’s social media pages. Two personal experiences for myself have made cyberbullying something that I can get behind to work towards stopping it. With social media becoming more for younger kids, this is happening more and more often.

Identity theft is happening more and more often. “Identity theft happens when someone steals your personal information to commit fraud” (United States Government 2019). Unfortunately, this type of cybercrime is becoming more and more common than it was years ago. There are three main types of identity theft. The first is tax identity theft. Tax identity theft is when “someone uses your Social Security number to falsely file tax returns with the IRS or your state” (United States Government 2019). This is very common come tax season. According to Huntington Bank, the best ways to keep yourself safe are to “file your taxes early, be aware of any phishing scams, and safeguard your social security and other personal information” (Huntington Bank 2019). Using these tips for tax season will help identity theft during tax season. Another high identity theft area is medical identity theft. Medical Identity theft is when “someone steals your Medicare ID or health insurance member number. Thieves use this information to get medical services or send fake bills to your health insurer” (United States Government 2019). The worst part of medical identity theft is that you usually do not know it happening until you get the bill for being at a doctor or hospital and that person was not you. The best way to combat this type of identity theft is to check medical bills and report anything questionable. The final main type of identity theft is social identity theft. The easiest way to explain this one is when “someone uses your name and photos to create a fake account on social media” (United States Government 2019). This is becoming more and more common. The best way to make sure someone cannot have access to your account is to make the password hard. This would mean making it longer than you normally would as well as adding special characters and numbers (United States Government 2019). Something that goes for all identity theft is to report everything that you know you did not do yourself.

Phishing on the other hand is more common than someone would think. Phishing is the “use of email messages or IMs that appear to be from those you do business with, such as your bank, credit card company, social network, auction site, online payment processor, or IT administration” (Gaskin, Vargas and Geoghan 111). Many people fall for these scams because usually they look like they are from a reputable site that you have interacted with in the past. Sometimes suspicious emails do end up in your junk mail, but other times it seems to have come from a reputable source. The best way for anyone to make sure they are getting the correct information is by double checking the whole email or message. Sometimes they are obvious other times they are not as obvious.

Hacking has been around for years when it comes to computers. The definition of hacking is “to break into a network, computer, file, etc., usually with malicious intent” (Harper 2010). There are good and bad hackers out in the world. The bad hackers are the ones who get on your computer or device and sometimes put malicious software on it, or they go through your computer to add something that is not good. Then there are good hackers. In 2006 the FBI, the Federal Bureau of Investigation, has started a new division. This division is called “FBI can respond with a range of investigative assets, including the little-known Cyber Action Team (CAT)” (Federal Bureau of Investigation 2019). The Cyber Action Team has been a great asset when it comes to hacking, the right way. The best way this is shown is in the tv show “Criminal Minds”. Though it is not very accurate when it comes to portraying the FBI, there is one person who hacks almost every episode. Penelope Garcia, an IT Specialist on the show, is always hacking into other systems during each episode (Davis). Garcia always does the good version of hacking. This is what the FBI does to combat hackers.

Child soliciting is very common on the internet. The definition is “Child solicitation in the United States is the crime of soliciting or luring, or attempting to lure, regardless of the outcome, a child into sexual activity with an adult. The definition of a child about this offense will vary somewhat between states according to different ages of consent” (IAC Publishing, LLC 2019). Each state has different laws regarding the age of a child. The state of Ohio is thirteen years of age for a child. Many pedophiles will use online chat rooms or the more modern version of using direct messages through social media outlets. For young kids they do not know the dangers. The best way to make sure your child is not taking part in this is to keep a close eye on their social media accounts or not let them have social media until they are a certain age.

In conclusion, cybercrime is a nasty topic to talk about. The internet is a dangerous place. Everyone that has either accessed, has current access, or will access the internet is at risk for coming across a form of cybercrime. There are many types of cybercrimes but the seven listed above are the most common. There are task forces with the FBI that were made just to investigate cybercrimes. In February 2013 the United States alone had 355,341 cyber attacks (Dubai Website Design Company). This figure alone is a major amount for a short period of time. In the end cybercrime has not gone down and as anyone can see does not seem to be slowing down.

Works Cited

  1. Criminal Minds. By Jeff Davis. Perf. Kristen Vangsness. 2005. TV.
  2. Federal Bureau of Investigation. 2019. web. 15 March 2019.