UrbanPro
true

Take Class 10 Tuition from the Best Tutors

  • Affordable fees
  • 1-1 or Group class
  • Flexible Timings
  • Verified Tutors

Essay on cyber crime

Sudhansu Bhushan Roy
14/04/2018 0 0

Essay on  cyber crime

In technically driven society, people use various devices to make life simple. Globalization results in connecting people all around the world. The increasing access to and continuous use of technology has radically impacted the way in which people communicate and conduct their daily lives. The internet connects people and companies from opposite sides of the world fast, easily, and relatively economically. Nevertheless, the internet and computer can pose some threats which can have disparaging impact on civilisations. Cybercrime is a hazard against different organisations and people whose computers are connected to the internet and particularly mobile technology.

 

Cybercrime is a dangerous crime involving computers or digital devices, in which a computer can be either a target of the crime, a tool of the crime or contain evidence of the crime. Cybercrime basically defined as any criminal activity that occurs over the Internet. There are many examples such as fraud, malware such as viruses, identity theft and cyber stalking. In present environment, since most information processing depends on the use of information technology, the control, prevention and investigation of cyber activities is vital to the success of the Organizations, Government's agencies and individuals. The procurement and maintenance of highly skill cybercrime expert by Government and Business Enterprises cannot be exaggerated.

 

Earlier, cybercrime was committed mainly by individuals or small groups. Presently, it is observed that there is highly complex cybercriminal networks bring together individuals at global level in real time to commit crimes.

 

Today, criminals that indulge in cybercrimes are not motivated by ego or expertise. Instead, they want to use their knowledge to gain profits promptly. They are using their capability to snip, deceive and exploit people as they find it easy to generate money without having to do an honest work. Cybercrimes have become major threat today.

Cybercrimes are broadly categorized into three groups such as crime against

  1. Individual
  2. Property
  3. Government
  4. Individual:

This type of cybercrime can be in the form of cyber stalking, distributing ,  trafficking and "grooming". In present situation, law enforcement agencies are considering such cybercrime very serious and are joining forces worldwide to reach and arrest the committers.

  1. Property:

Same as in the real world where a criminal can steal and pickpocket, even in the cyber world, offenders resort to stealing and robbing. In this case, they can steal a person's bank details and drain off money; misuse the credit card to make frequent purchases online; run a scam to get naive people to part with their hard earned money; use malicious software to gain access to an organization's website or disrupt the systems of the organization. The malicious software can also damage software and hardware, just like vandals damage property in the offline world.

  1. Government:

Crimes against a government are denoted to as cyber terrorism. If criminals are successful, it can cause devastation and panic amongst the citizen. In this class, criminals hack government websites, military websites or circulate propaganda. The committers can be terrorist outfits or unfriendly governments of other nations.

Types of Cyber Crimes:

There are many types of cybercrimes:

Hacking:

In this category, a person's computer is broken into so that his personal or sensitive information can be accessed. In the United States, hacking is categorized as a wrongdoing and punishable as such. This is different from ethical hacking, which many organizations use to check their Internet security protection. In hacking, the criminal uses a variety of software to enter a person's computer and the person may not be aware that his computer is being accessed from a remote location. Many crackers also try to gain access to resources through the use of password cracking soft wares. Hackers can also monitor what users do on their computer and can also import files on their computer. A hacker could install several programs on to their system without their knowledge. Such programs could also be used to steal personal information such as passwords and credit card information.

Theft:

This type of cybercrime occurs when a person violates copyrights and downloads music, movies, games and software. There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the FBI. Nowadays, the justice system is addressing this cybercrime and there are laws that avert people from unlawful downloading.

Cyber Stalking:

This is a type of online harassment wherein the victim is endangered to a barrage of online messages and emails. Normally, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims' lives more dejected.

Identity Theft:

This is a major problem with people using the Internet for cash transactions and banking services. In this cybercrime, a criminal accesses data about a person's bank account, credit cards, Social Security, debit card, full name and other sensitive information to drain off money or to buy things online in the victim's name. The identity thief can use person's information to fraudulently apply for credit, file taxes, or get medical services. It can result in major financial losses for the victim and even spoil the victim's credit history.

Malicious Software:

This software, also called computer virus is Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to gather sensitive information or data or causing damage to software present in the system.

Child soliciting

 This is also a type of cybercrime in which criminals solicit minors via chat rooms for the purpose of child P.graphy. The FBI has been spending a lot of time monitoring chat rooms visited by children in order to reduce and prevent child  soliciting.

Virus dissemination: Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.).

Computer vandalism:

It is a type of cybercrime that Damages or destroys data rather than stealing. It transmits virus.

Cyber terrorism: It is a use of Internet based attacks in terrorist activities. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.

0 Dislike
Follow 1

Please Enter a comment

Submit

Other Lessons for You

WORK SHEET ON NOUNS
Part One: Identifying Nouns Circle each noun. There is more than one in each sentence 1. The city of Metropolis needs a real superhero to fight crime.2. The superheroes in Metropolis have some pretty...
A

Anshika S.

0 0
0

Avoid using the word "very"
very expensive - costly very great - terrific very important - crucial very fancy - lavish very happy - Ecstatic very intelligent - brilliant very fast - swift very hard -...
D

Deepika A.

0 1
0

TRANSFORMATION OF SENTENCES
Sentences Containing Adverb "Too" The news is too good to be true. The news is so good that it cannot be true. The words 'too' and 'to' are substituted by the words so and that when transforming...
S

Sneha B.

0 0
0

False benefits & advantages of English language labs.
False benefits & advantages of language labs. The number of schools using language labs has increased noticeably. This paper is aimed at discussing the real &...

'DOUBLE PAST SENTENCES 'AND USE OF 'IT' & USE OF 'THERE' ( ENGLISH GRAMMAR )
Double Past Sentences: 1.) Kya boss ke aane se pehle ,aap apna work finish kar chuke the ? Had you finished your work before the boss came ? 2.) Custom officer ke pas jane se pehle wah ghbra raha...
X

Looking for Class 10 Tuition Classes?

The best tutors for Class 10 Tuition Classes are on UrbanPro

  • Select the best Tutor
  • Book & Attend a Free Demo
  • Pay and start Learning

Take Class 10 Tuition with the Best Tutors

The best Tutors for Class 10 Tuition Classes are on UrbanPro

This website uses cookies

We use cookies to improve user experience. Choose what cookies you allow us to use. You can read more about our Cookie Policy in our Privacy Policy

Accept All
Decline All

UrbanPro.com is India's largest network of most trusted tutors and institutes. Over 55 lakh students rely on UrbanPro.com, to fulfill their learning requirements across 1,000+ categories. Using UrbanPro.com, parents, and students can compare multiple Tutors and Institutes and choose the one that best suits their requirements. More than 7.5 lakh verified Tutors and Institutes are helping millions of students every day and growing their tutoring business on UrbanPro.com. Whether you are looking for a tutor to learn mathematics, a German language trainer to brush up your German language skills or an institute to upgrade your IT skills, we have got the best selection of Tutors and Training Institutes for you. Read more