All about Cyber crime and Cyber Terrorism

By Surajit Bhaduri|Updated : November 24th, 2020

The world in the present stage faced many changes in the past three decades. This short period brought the world, into the palm of every individual. Every person now can perform any activity from the place he stays by just using his mobile phones, laptops, and other devices.

According to Meeker, the reason for an increase in subscribers of the internet is because of the abovementioned telecom industry. Though feeling happy and proud to hold such a position there arises a threat too. This threat not only shakes India but also the whole world.

This threat evolves to be a crime and thus termed cybercrime having its birthplace in France in the year 1820. Similar to the definition of crime this threat is either knowingly done or unknowingly done against a state or any individual or a firm.

People involved in this crime are incredibly organized and professionalized and thus it also comes under white-collar crime.

Though the birth of cybercrime was long back, India recognized it in the 21st century and started its precautionary moves. One of the precautionary steps took by India was by passing an act known as the Information Technology Act, 2000 which deals and gives provision about the concept of cybercrime along with punishments.

hacking

Provision of Information Technology Act, 2000

The IT Act addressed electronic documents, E-Books, and authentication of those records. It also includes penalties for breach of security offenses. The IT act went under some changes as internet technology grows up.

In 2008 it detailed the description of communication devices which include mobile devices and the owners of the given IP address.

Offensive messages which make controversial changes in this act related to section 66A. The concept of cybercrime is discussed under “OFFENCES” Chapter XI of the act.

hack

Types of Cybercrime

  • Phishing scams: Phishing scams are attempts by scammers to gain your personal information bank account numbers and passwords. They may contact through SMS, E-Mail, and even through phone calls.

  • Online Scams: Online scams will only happen online. They would trick you to give your personal information by an ad popping up that you have won a reward or by asking for your card details for shipping.

  • Malware: It is a contraction of malicious software onto the system. It may cause harm to the devices and data by viruses like Trojan and spyware. It may also affect computers, mobiles, and tablets and they can steal your personal information.

  • E-Mail Bombing: An E-Mail bombing is more a form of internet abuse. It is an overload of E-Mails that has been sent to a single person which will crash the server and it is a difficult process to fix it.

  • Virus Dissemination: It not only gets a piece of malware into the victim’s computer but it also spreads across the other software. Without a full quarantine process and safe environment, the next time if they open the infected software the process starts over again.

  • Logic Bombs: The Logic Bomb acts like a virus but it is triggered by an event. They even maybe a date or time, the removal of a file so on. The people who implement Logic Bombs are mostly insiders who have access to the computer.

  • Theft: Internet theft happens through the internet. It can be done in various ways by using fake advertisements, fake E-Mails to steal your personal information and then use it to steal money from your bank account.

  • Social Media Hack and Spamming: Social media hacking is often done as a joke. They hack the accounts of the celebrities and may end up following people that they don’t usually follow and put some random statuses. Social media spamming means a person creating some fake accounts and become friends or followed by some average person.

    • This gives the fake account freedom to spam the account through bulk messaging and spread malware. Spamming can also produce malicious links with the intention of harming or damaging a user or their device.

  • Electronic Money Laundering: The rise of online banking made the way to detect the illegal transfer of money more difficult. The use of proxy servers added the third component of money laundering impossible to detect without leaving any trace of IP address.

  • Sales and Investment Fraud: The contact details and the available account information of the investment or sales account holders, the fraudsters can easily adapt to their persona. They will contact the customers with easy and profitable opportunities and they seem more reliable to trustworthy.

  • Eavesdropping and Surveillance: Eavesdropping without the consent of the party is illegal. It can be done online or on a mobile phone. The most common way of Eavesdropping is tapping a phone or some listening devices.

  • Software Piracy: Nowadays we can almost find any movie, song, or software free on the internet. Software privacy is an unauthorized use and distribution of computer software. Using Pirated material may be good but it also brings many risks with it.

  • Data Diddling: Data Diddling is the process of altering the data illegally or without any authorization that is changing data before or as it is input into the computer or the output.

  • Salami Slicing Attack: Salami Slicing Attack is a technique where they steal money from the person a bit of amount every time, so there will not be a noticeable difference in the bank accounts.

  • Hacking: A Hacker is an intruder who enters into your computer without your permission. They may do it for fame, power, as it shows the other people that they are capable to enter into other computers. Some use this to steal personal information and corporation financial data. Hackers have a good understanding between themselves and computers.

  • Cyber Stalking: Cyber Stalking is especially common among teenagers and adults. Mostly the stalker and the person know each other. They may stalk through social media. Online stalking's aim is to make the victim miserable.

  • Cyber Bullying: Cyber Bullying is similar to cyberstalking. They may post images or videos online which will offend the victim. It also creates fake accounts to post harmful or distressing content and sending abusive messages.

  • Identify Theft: It is the most common type of Cybercrime, where they use to steal the personal information of the victim like Credit card details, addresses, E-Mail addresses, and more.

  • Child soliciting and Abuse: It is a type of cybercrime that they may solicit the children through chat rooms for the reason of pornography. A child is regarded as the person under the age of 16. These types of crimes are strictly monitored by the police.

  • Ransomware: Ransomware is a virus that affects our computer which doesn’t allow us to access the information and data. Then these attackers will send you a message that gives these amounts of money and will give your data back.

Cyber Terrorism

It is the use of computers politically, against any nation's government policies or to know about the nation's secured details illegally is known as cyber terrorism.

Hacking generally does not come under cyber terrorism. Though both relate to the access of cyberspace with mala fide intention, their goal differs. Hacking when done either against a person or company does not fall under terrorism. But any hacking process against a nation falls under cyber terrorism and such activities endanger the sovereignty and integrity of the nation.

hack

Cyber Jurisdiction:

Basically viewing on the concept of law, it is bound within a boundary which means each law has its own boundary for its execution.

While considering cybercrime, the crime is done with the base of technology and cyberspace. Cyberspace is an environment where all networks are connected with each other.

If a hacker performs a crime, he has to solve these cyberspace issues and come up with the server to be hacked. In such a case, a user can access the websites from anywhere in the world and it becomes difficult to find the actual criminal who performs such hacking.

Thus the jurisdiction for this crime stands as a question mark to all nations because of its universal nature. Information Technology act was passed in order to bring such issues under control, but this act does not talk much about this issue.

Section 75 deals with jurisdiction for cybercrimes. It states that the act extends to a person outside India and it does not consider the person’s nationality.

hack

Conclusion

All people are not victims of cybercrime, but they need to be aware of this crime. It is a crime where people don’t look face to face; it only requires a mouse a cursor to take all your money from your account. Lack of awareness among the people is also one of the major reasons that are; if the people are aware of the crime they would not let any unwanted information on social media or any other websites.

Though there are several provisions to prevent cybercrime the government still lags in its proceedings because of the lag in its people’s support. The next support is the treaties and statutes signed and passed in order to prevent the loss occurring/occurred by this crime. Though these statutes deal with the crime, it only talks about the event which has already happened.

But along with this some measures can also be dealt with in such statutes about the threats that may arise in the future which does not prevail currently. If cybercrime is not protected there is no doubt that it will be a major crime in the near future.

As all problems have their own solutions with it at the time of its evolution the problems faced now in the technological world also has its solutions with it, it is the responsibility of the people and the government to identify and follow the principles.

Key Takeaways

1. One of the precautionary steps took by India was by passing an act known as the Information Technology Act, 2000 which deals and gives provision about the concept of cybercrime along with punishments.

2. The IT Act addressed electronic documents, E-Books, and authentication of those records. It also includes penalties for breach of security offenses. The IT act went under some changes as internet technology grows up.

3. In 2008 it detailed the description of communication devices which include mobile devices and the owners of the given IP address.

4. Offensive messages which make controversial changes in this act related to section 66A. The concept of cybercrime is discussed under “OFFENCES” Chapter XI of the act.

5. Cyber terrorism is the use of computers politically, against any nation's government policies, or to know about the nation's secured details illegally is known as cyber terrorism.

6. Section 75 of the IT Act deals with jurisdiction for cybercrimes. It states that the act extends to a person outside India and it does not consider the person’s nationality.

=======================

To help you out in your exam preparation, we suggest you take a free trial of CLAT 2021: A Comprehensive Course. Crack CLAT 2021 & Reach Your Dream NLU! So, why wait? 

CLAT 2021: A Comprehensive Course:

Start Free Trial Now!

Thanks
 
Prep Smart. Stay Safe. Go BYJU'S Exam Prep

Comments

write a comment

Follow us for latest updates