What is cyber crime?
Any illegal or unethical activity through internet use or using computer as a
tool can be a cyber crime. Cyber crime is done by cyber criminals who try to
exploit broken software. Creating and selling broken software is a crime. Also,
creating and selling untested software is also considered a crime.
Types of cyber crime
Cyber crime can be of many types. Types of cyber attacks are discussed below:
- Hacking
Hacking is basically gaining unauthorized access to your system profit, protest,
information gathering, or to evaluate system weaknesses. The provisions for
hacking are given in IT Act, 2000 under section 43-A and 66 and section 379 &
406 of Indian Penal Code. The punishment for hacking is 3 years or shall be
imposed with fine up to 5 lakhs.
- Denial of Service
It brings down the server (any server). It is known as the flooding machine with
requests in an attempt to overload systems. It also uses bots for tasks. The
provisions are given under section 43(f) of IT Act with imprisonment up to 3
years or with fine up to 5 lakh rupees.
- Virus Dissemination
It involves direct or search unauthorized access to system by introducing
malicious programs known as viruses, worms etc. Virus needs host while worms are
standalone.
Provisions are provided under the IT Act, 2000 under sections 43-C, 66 and
section 268 of the Indian Penal Code.
- Credit Card Fraud
Card fraud begins either with the theft of the physical card or with the
comprise of data associated with the account. Provisions of such fraud are given
under Section 66 C and 66 D of IT ACT, 2000 and section 468 & 471 of Indian
Penal Code, 1860.
- Phishing
A malicious individual or group who scam users. They do so by sending e-mails
or creating web pages that are designed to collect an individual’s online bank
credit card, or other login information. The provisions to prosecute any person
for phishing are given under section 66 C, 66 D and 74 of the IT Act with
imprisonment up to 3 years or with fine up to 1 lakh rupees.
- Cyber Stalking
It can be defined as the use of electronic communications to harass or frighten
someone, for example by sending threatening emails. The provisions are given
under IT Act, 2008 under section 72 and section 354 C (voyeurism) of the Indian
Penal Code. Also, section 67 provides imprisonment up to 3 years with fine.
What leads to the commission of cyber crime?
There are 4 main causes which lead to the commission of cyber crime.
- Breach Because of Mobile Devices
In 2015, mobile devices had less than 1% infection rate, so they were considered
safe. Now, more than three-fifths of IT security professionals report that it is
either certain.
- Embedding Malware Into Legitimate Applications
Cyber criminals have embedded malware into legitimate applications and they are
targeting poorly secured WiFi spots, stealing passwords, and more in their quest
to steal information.
- Exploiting Unauthorized Products
In many cases, attackers like to exploit unauthorized products having weak
security controls in the corporate cloud.
- Unlimited Internet Access
By using internet, we have given convenience in accessing without any
limitations. This is the foremost factor which causes cyber crime.
Conclusion
Across the globe and specifically in India, these frauds are growing rapidly
since 2010. This is mainly due to lack of awareness in some states and also,
among some banks and other organizations. However, if we adopt few anti-fraud
strategies like biometrics or keeping an expert in this field could prevent us
from getting into such frauds.
Bibliography/References:
- India: Cyber security 2020, ICLJ.com(February 22,
2019), https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/india
- Chandrima Khare, laws Punishing Cyber Stalking and Online Harassment,
iPleaders.in (July 13, 2018), https://blog.ipleaders.in/cyber-stalking/
- Abhinav Rana, Credit Card Fraud: Penal Provisions and Ways to Deal with
it, iPleaders (February 21, 2020), https://blog.ipleaders.in/credit-card-fraud/
Authentication No: JL30592569478-26-720
|
Please Drop Your Comments