Untitled Document
   
 
ff
Cyber Crime and Safety
 

DEFINITION OF CYBER CRIME

 

Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet."
A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both”. The computer may be used as a tool in the following kinds of activity- financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber defamation, cyber stalking. The computer may however be target for unlawful acts in the following cases- unauthorized access to computer/ computer system/ computer networks, theft of information contained in the electronic form, e-mail bombing, data didling, salami attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer system, physically damaging the computer system.

 

TYPES OF CYBER CRIME:-

 

HACKING

 

Hackers write or use ready-made computer programs to attack the target computer. They possess the quality to enter in to target computer and obtain the data. Some hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money. They extort money from some corporate giant threatening them to publish the stolen information which is critical in nature.  

 

CHILD PORNOGRAPHY

 

The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. The easy access to the pornographic contents readily and freely available over the internet lowers the inhibitions of the children. Paedophiles lure the children by distributing pornographic material, then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions. Sometimes Paedophiles contact children in the chat rooms posing as teenagers or a child of similar age, then they start becoming friendlier with them and win their confidence. Then slowly paedophiles start sexual chat to help children shed their inhibitions about sex and then call them out for personal interaction. Then starts actual exploitation of the children by offering them some money or falsely promising them good opportunities in life. The paedophiles then sexually exploit the children either by using them as sexual objects or by taking their pornographic pictures in order to sell those over the internet. The children are advised to not to chat with strangers.

 

CYBER STALKING

 

Cyber Stalking can be defined as the repeated acts harassment or threatening behaviour of the cyber criminal towards the victim by using internet services. The Stalkers have desire to control the victims life. Majority of the stalkers are the dejected lovers or ex-lovers, who then want to harass the victim because they failed to satisfy their secret desires. Most of the stalkers are men and victim female. Go top

 

CREDIT CARD FRAUD

 

The unauthorized and illegal use of a credit card to purchase property. Information about the credit card is obtained by using skimmers, the most prone places to such crimes are restaurants, bars etc. Information about the Credit Card is also obtained through Phishing. In case of anyone asking for the credit card details of the user on the internet, it is advised to first confirm telephonically from that particular organization.

 

PHISHING

 

The act of sending an e-mail to a user falsely claiming to be an legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the users information. Phishing is the idea that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting. it is advised that the user should first confirm telephonically from that particular organization to whom he thinks he is supplying the information as genuine.

 

NET EXTORTION

 

Copying the company’s confidential data in order to extort said company for huge amount.

 

VIRUS DISSEMINATION

 

Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious

 

SOFTWARE PIRACY

 

Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. 

 

IRC CRIME

 

Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other. It is requested that, a summary of the above mentioned Cyber related crimes may be published in leading newspapers in Public Interest, to make the innocent net users aware of the same to prevent them from falling in traps of cyber criminals.

 

DENIAL OF SERVICE ATTACK

 

This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide. Denial of Service attack, is  a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic.. For all known DoS attacks, there are software that fixes the system administrators and can be installed to limit the damage caused by the attacks. But, like Virus, new DoS attacks are constantly being dreamed up by Hacker. In case the user feels that he has become the victim to denial of service he should complain about the same to the police.

 

E - SECURITY TIPS

 

GENERAL INFORMATION

 

● Don't delete harmful communications (emails, chat logs, posts etc). These may help provide vital information about the identity of the person behind these. 
● Try not to panic. 
● If you feel any immediate physical danger of bodily harm, call your local police. 
● Avoid getting into huge arguments online during chat or discussions with other users. 
● Remember that all other internet users are strangers. You do not know who you are chatting with. So be careful and polite. 
● Be extremely careful about how you share personal information about yourself online. 
● Choose your chatting nickname carefully so as not to offend others. 
● Do not share personal information in public spaces anywhere online, do not give it to strangers, including in e-mail or chat rooms. Do not use your real name or nickname as your screen name or user ID. Pick a name that is gender and age neutral. And do not post personal information as part of any user profile. 
● Be extremely cautious about meeting online acquaintances in person. If you choose to meet, do so in a public place and take along a friend. 
● Make sure that your ISP and Internet Relay Chart (IRC) network have an acceptable use policy that prohibits cyber-stalking. And if your network fails to respond to your complaints, consider switching to a provider that is more responsive to user complaints. 
● If a situation online becomes hostile, log off or surf elsewhere. If a situation places you in fear, contact a local law enforcement agency. 
● Save all communications for evidence. Do not edit or alter them in any way. Also, keep a record of your contacts with Internet System Administrators or Law 

 

GENERAL SECURITY TIPS

 
CHILDREN:-
 

Do not give out identifying information such as Name, Home address,
School Name or Telephone Number in a chat room. Do not send your photograph to anyone on the Net without first checking with your parents or guardians. Do not respond to messages or bulletin board items that are suggestive, obscene, belligerent or threatening. Never arrange a face-to-face meeting without telling parents or guardians. Remember that people online may not be who they seem to be.

 
PARENTS:-
 

Use content filtering softwares on your PC to protect children from
 pornography, gambling, hate speech, drugs and alcohol. There is also software to establish time controls for individual users (for example blocking usage after a particular time at night) and log surfing activities allowing parents to see which site the child has visited. Use this software to keep track of the activities of your children.

 

SUGGESTIONS FOR BETTER SECURITY:-

 

● Use strong passwords: Choose passwords that are difficult or impossible to guess. Give different passwords to all other accounts. 
● Make regular back-up of critical data. Back-up must be made atleast once in each day. Larger organizations should perform a full back-up weekly and incremental back-up every day. Atleast once in a month the back-up media should be verified. 
● Use virus protection software. That means three things: having it on your computer in the first place, checking daily for new virus signature updates, and then actually scanning all the files on your computer periodically. 
● Use a firewall as a gatekeeper between your computer and the Internet. Firewalls are usually software products. They are essential for those who keep their computers online through the popular DSL and cable modem connections but they are also valuable for those who still dial in. 
● Do not keep computers online when not in use. Either shut them off or physically disconnect them from Internet connection. 
● Do not open e-mail attachments from strangers, regardless of how enticing the subject line or attachment may be. Be suspicious of any unexpected e-mail attachment from someone you do know because it may have been sent without that person's knowledge from an infected machine. 
● Regularly download security patches from your software vendors. 

 
INERNET GUIDELINES FOR STUDENTS:-
 

● The Internet is the global storehouse for information. It is like having the biggest library in the World at your fingertip.---Use the net to increase your knowledge, to do class work better. 
● Visit interesting places sitting at your computer - visit the Taj or the Smithsonian Institution or the Louvre in Paris - all without stirring from your chair. --This is what the net is all about-an explosion of information. 
● Use the net to keep in touch with children from other parts of the Country or other Countries-make new pen friends; collect information. Many on-line service providers host chat rooms especially for children, monitored continuously for safety. -- The net is a global community - without any barriers, distances, boundaries. 
● Be careful about talking to "strangers" on a computer network. 
Respect privacy on the net. You may have known the password of some other user- your friend/schoolmate. But do not use it to read their mail or send mail from their ID. Remember somebody else can also do this to you. 
● Use the net to find information about schools and colleges-events or courses they may be offering. Many of them offer you a virtual guided tour of their facilities. Take advantage of this. This will help you take a decision when planning your future

● Be careful about what you download from the net. Use a virus scan before the download as many programs may contain virus-this has the potential to destroy your system. 

 
DONT'TS:-
 

● Do not give your password to anybody. Somebody who is malicious can cause great harm to you and your reputation. It is like leaving your house open for a stranger and walking away. 
● When talking to somebody new on the net, do not give away personal information-like numbers of the credit card used by your parents, your home addresses/ phone numbers and such other personal information. 
● If you feel uncomfortable or threatened when somebody on the net feeds you an improper or indecent message inform your parents or elders. 
● Do not break into somebody else's computer and worse still change things; you are probably destroying a lifetime of hard work by somebody. You may be intelligent but use your intelligence for better things. Somebody else can be as ruthless and as intelligent to break into your system and destroy your creations as well. 
● Do not copy a program that is copyrighted on the net. It is illegal. You are actually stealing somebody else's hard work. There is a lot of illegally available material on the net. Do not use it yourself. 

 
 
 
free web counter
Untitled Document

All Rights Reserved : SSP Office, Shahid Bhagat Singh Nagar, Punjab