Crime is a challenge to the world that thinks well. As time and the invention of new and advanced technologies change, the world of crime is also changing. The tools and techniques are changing every day. The red-hot reflection of this is the most important, remarkable and momentous invention of the 20th century related to computer crime, better known as cybercrime or cyber crime or simply computer crime. The computer also has two opposite sides like a coin. On the one hand, thanks to the gift of computer technology, the entire world is becoming much more compact. Simultaneously, on the contrary, in the world of crime, a new seed has sprouted.
The Encyclopaedia Britannica defines computer crime as any crime committed through special knowledge or expert use of computer technology. 166 Computer crime can involve criminal activities of a traditional nature, such as theft, fraud, forgery, defamation, abuse and mischief. There are mainly 37 types of cyber crimes. Now let’s discuss some of the most common and frequent acts in which the computer is a tool for illegal acts. This type of activity usually involves a modification of a conventional crime through the use of computers.

(1) Hacking: – Hacking is simply defined as unauthorized access to computer systems or networks. This is done to steal information stored on computer hard drives and is estimated to cost US corporations more than $63 billion a year. Government agencies are not immune. The defense department is attacked by hackers 2,50,000 times each year, only about 500 of these include detected incidents. Hacking can compromise an entire organization, such as the destruction of a website, or it can involve the corruption of a few files. The hacking process has several components, such as: footprint (the ability to obtain essential information about the target organization), the second is the automation ping sweep, and the final process is called enumeration. Billions of dollars are spent annually around the world on efforts to protect computer security, which remains a low priority for many organizations. However, with the flourishing of the Internet and the establishment of internal intranets, on which the existence of businesses depends, the problem of piracy can only grow in importance.

(2) Cyber ​​Pornography: – This would include pornographic websites, pornographic magazines produced using computers and the Internet.

(3) Email Spoofing: – A spoofed primary email is one that appears to originate from one source but has actually been sent from another source.

(4) Email Bombing: It refers to sending a large number of emails to the victim, causing the victim’s email account or mail servers to crash.

(5) Logic bombs: – There are event dependent programs. This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs.

(6) Trojan horse attacks: – A Trojan horse, as this program is aptly called, is an unauthorized program that works from within what appears to be an authorized program, thus hiding what it is really doing.

(7) Salami attacks: – These attacks are used for the commission of financial crimes. The key here is to make the toggle so insignificant that in a single case it would go completely unnoticed.

(8) cobweb lifting,

(9) cyberterrorism,

(10) Intellectual Property Rights / Pirated Software Distribution,
(11) Try,

(12) cyber vandalism,

(13) Internet pyramid schemes,

(14) Fraud and deception

(15) Virus/worm attacks and many more unconventional cyber crimes.

Computer crimes are committed in a very systematic, sophisticated and complex way. Some cyber crime tools and techniques are: unauthorized access, packet sniffing, a spynet log file, tempest attack, password cracking, buffer overflow, etc.

A writing about the crime will be incomplete without the discussion about the criminals. This is very hard to believe; but this is the truth that the majority of amateur hackers and cyber criminals are teenagers, the age group between 9 and 18 years old, who are just beginning to understand what seems to be a lot about computers, it is a matter of pride to have hacked into a computer system or website. The simple reason for this kind of criminal behavior pattern in children is mainly seen due to curiosity to know and explore things. There were also organized hackers, professional hackers/crackers, and disgruntled employees. The reason organized hackers hack is to fulfill their political bias, fundamentalism, etc. Pakistanis are said to be one of the best quality hackers in the world. In the case of professional hackers/crackers, their work is motivated by the color of money. And the group of dissatisfied employees includes those people who have been fired by their employer or who are dissatisfied with their employer.

Indian Cyber ​​Crime Scenario: – Internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of, be it entertainment, business, sports, or education. Given the limitless number of free websites, the Internet is undeniably open to exploitation. “Any criminal activity that uses a computer as a tool, target, or means to perpetuate further crime falls within the realm of cybercrime,” says Supreme Court attorney and cyberlaw expert Pavan Duggal.

While the global cybercrime scene looks bleak, the situation in India is no better. There are no hard statistics, but according to Duggal, Indian corporate and government sites have been attacked or defaced more than 780 times between February 2000 and December 2002. In cities like Bangalore, New Delhi and Mumbai, where cybercrime cells exist, there is potential for improvement. Law enforcement agencies are still not well equipped or oriented on cybercrime.

Cyber ​​crimes in India are slowly evolving from a simple email crime to more serious crimes like hacking and source code theft. Indian hackers always thought they were too sophisticated to fall into the hands of the country’s tough cops, who are routinely accused of brutality by various human rights groups. But that sentiment evaporated after one of four people recently arrested in connection with a hacking incident accused Mumbai police of breaking his hand during questioning.

According to Sundari Nanda, SP, CBI, “most of the time the victims do not complain, it may be because they know the magnitude of the crime committed against them, or as in the case of commercial houses, they do not want to confess that their system does not It is safe”. As research shows, cybercrime poses a real threat. Those who believe otherwise simply haven’t woken up to the massive losses and setbacks experienced by businesses around the world. Money and intellectual property have been stolen, corporate operations have been impeded and jobs have been lost as a result of cybercrime. To prevent this, the entire corporate world or any other business house just needs to be aware and any matter should be reported immediately. Saileshkumar Zarkar, Technical Advisor and Network Security Consultant at the Mumbai Police Cyber ​​Crime Cell, advocates the 5P mantra for online security: Caution, Prevention, Protection, Preservation and Perseverance. More importantly, users should try to save any traces of electronic information on their computers. That’s about all one can do, then, until the laws get stricter or the technology more advanced. You have been warned.

Leave a Reply

Your email address will not be published. Required fields are marked *