and living.Here Public are now capable of doing things

and living.Here
Public are now capable of doing things which were not imaginable few years ago.
Internet has enabled the use of website communication and a lot of anytime
anywhere the IT solutions for the betterment of human kind. Cyber crime is a
very serious threat. Governments, police departments and intelligence units
have started to react cyber threats. In this paper, we will try to discuss
about cybercrime in detail including the types, methods, technical reasons and
adverse impact of cyber crimes on a network as well as the behavior ,
psychology behind this crime & some effective solutions .

Introduction: Cyber crime,  is the crime that
involves a computer and a network.1 The computer may have been used in the commission
of a crime, or it may be the target.2Actually cyber crimes can be defined as:
“Offences that are committed against individuals or groups of individuals
with a criminal motive that causes intentionally harm the reputation of the
victim or cause physical or mental harm3. Cybercrime can threaten a
person or a nation’s security and financial health.4 Issues surrounding these types of crimes have become
high-profile, particularly those surrounding hacking, copyright infringement, unwarranted mass-surveillance, sextortion, child pornography, and child grooming. There are also problems of privacy when confidential information is intercepted or disclosed, lawfully . Governmental
and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing
international borders and involving the interests of at least one nation state
is sometimes referred to as cyberwarfare .

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Cyber Crime :

Cyber crime is the latest  the most complicated problem in the cyber
world. “Cyber crime  said to be those
species, of which, genus is the daily crime, and where either the computer is a
subject of the conduct conventional crime”. “Any criminal operation that uses a
computer  target or a means for
enternalize further crimes comes within the of cyber crime” . The computer may
be used as a instrument in the following kinds of activity- financial crimes,
pornography, online gambling,hacking, computer information hacking crime, email
spoofing,  cyber defamation, cyber
stalking. The computer may however be 
act the following cases- unauthorized access to  computer networks,and the information
contained in the electronic form, data didling, salami attacks,  web jacking, theft of computer system,
physically damaging the computer system.4

of Cybercrime:

Cyber criminals always want to make big money. They target rich
people or rich organizations like banks, casinos and financial firms where a
huge amount of money flows daily and hack sensitive information. Catching such
criminals is difficult. Hence, that increases the number of cyber-crimes across
the globe. Computers are vulnerable, so laws are required to protect and
safeguard them against cyber criminals. We could list following reasons for the
vulnerability of computers:

§  Easy to access – The problem behind sequrites a
computer system from unauthorized access is that there are many possibilities
of breach due to the complex technology. Hackers can steal access codes,
advanced voice recorders etc. that can fool biometric operation easily and
bypass firewalls can be utilized to get past many security operation.5

§  Capacity to store data in comparatively small
space – The computer has the unique characteristic of storing data in a
very small space. This makes  easier for
the people to steal information from any other storage and use it for own

§  Complex – The computers run on operating systems and these operating systems
are programmed of millions of codes. The human mind is imperfect, so they can
do mistakes at any stage. The cyber criminals take advantage of these gaps.5

§  Negligence – Negligence is one of the characteristics in human conduct. So,
there may be a possibility that protecting the computer system we may make any
negligence which provides a cyber-criminal the access and control over the
computer system.5

§  Loss of evidence – The data related to the crime
can be easily destroyed. So, Loss of evidence has become a very common &
obvious problem which paralyzes the system behind the investigation of

Different types of
cyber crime:

Hacking: It is a simple term that defines
sending an illegal instruction to any other computer or network. In this case,
a person’s computer is hacked so that his personal or sensitive information can
be accessed. The criminal uses a variety of software to crack a person’s
computer and the person may not be aware that his computer has been accessed
from a remote location. Often, government websites are a hot target for hackers
because it helps them gain notoriety which is further fuelled by aggressive
media coverage. This is different from ethical hacking which is used by many
organization to check their Internet security protection.6

Child pornography and Abuse: The internet is being highly used
to abuse children sexually worldwide. This is also a type of cyber-crime
wherein criminals solicit minors via chat rooms for the purpose of child
pornography. The Cybersecurity department of every nation is spending a lot of
time monitoring chat rooms frequented by children with the hopes of reducing
and preventing child abuse and soliciting.6

Data diddling:

Data Diddling is unauthorised altering of data before or during
entry into a computer system, and then changing it back after processing is
done. Using this technique, the attacker may modify the expected output and is
difficult to track. In other words, the original information to be entered is
changed, either by a person typing in the data, a virus that’s programmed to
change the data, the programmer of the database or application, or anyone else
involved in the process of creating, recording, encoding, examining, checking,
converting or transmitting data.

This is one of the simplest methods of committing a
computer-related crime, because even a computer amateur can do it. Despite this
being an effortless task, it can have detrimental effects. For example, a
person responsible for accounting may change data about themselves or a friend
or relative showing that they’re paid in full. By altering or failing to enter
the information, they’re able to steal from the enterprise. Other examples
include forging or counterfeiting documents and exchanging valid computer tapes
or cards with prepared replacements. Electricity boards in India have been
victims of data diddling by computer criminals when private parties were
computerizing their systems.7

Web jacking:

Web jacking derives its name from “hijacking”. Here, the hacker
takes control of a web site fraudulently. He may change the content of the
original site or even redirect the user to another fake similar looking page
controlled by him. The owner of the web site has no more control and the
attacker may use the web site for his own selfish interests. Cases have been
reported where the attacker has asked for ransom, and even posted obscene
material on the site.

The web jacking method attack may be used to create a clone of the
web site, and present the victim with the new link saying that the site has
moved. Unlike usual phishing methods, when you hover your cursor over the link
provided, the URL presented will be the original one, and not the attacker’s
site. But when you click on the new link, it opens and is quickly replaced with
the malicious web server. The name on the address bar will be slightly
different from the original website that can trick the user into thinking it’s
a legitimate site. For example, “gmail” may direct you to “gmai1”. Notice the
one in place of ‘L’. It can be easily overlooked.7

Prevention of Cyber

We know that 
Prevention is always better than cure. 
We should keep in mind the following things


For prevent cyber stalking avoid
disclosing any information pertaining to one self. This is as good as
disclosing anyones identity to strangers in public place.

It is urgent to avoid sending any
photograph online particularly to strangers and chat friends as there have been
incidents of misuse of the photographs.

Everyone must use latest and update
antivirus software to guard against virus attacks.

 It is necessary always keep back up volumes so
that one may not suffer data loss in case of virus contamination

 Never send someones credit card number to any
site that is not secured, to guard against frauds.

 Always keep a watch on the sites that  children are accessing to prevent any kind of
harassment  of children.

At last  It is better to use a security programme that
gives control over the cookies and send information back to  the site as leaving the cookies unguarded . 


technology advances and more people rely on the internet to store sensitive
information such as banking or credit card information, criminals are going to
attempt to steal that information. Cyber-crime is becoming more of a threat to
people across the world. Raising awareness about how information is being
protected and the tactics criminals use to steal that information is important
in today’s world. According to the FBI’s Internet Crime Complaint Center in
2014 there were 269,422 complaints filed. With all the claims combined there
was a reported total loss of $800,492,073.43 But yet cyber-crime
doesn’t seem to be on the average person’s radar. There are 1.5 million
cyber-attacks annually, that means that there are over 4,000 attacks a day, 170
attacks every hour, or nearly three attacks every minute, with studies showing
us that only 16% of victims had asked the people who were carrying out the
attacks to stop.44 Anybody who uses the
internet for any reason can be a victim, which is why it is important to be
aware of how one is being protected while online