Cybercrime is one of the fastest growing areas of crime. Cybercrime is criminal activity done using computer and the Internet. These include attacks against computer data and systems, identity theft, internet auction fraud, the penetration of online financial services, as well as the deployment of viruses and various email scams such as phishing. The global nature of the internet has allowed criminals to commit almost any illegal activity anywhere in the world, making it essential for all countries to adapt their domestic offline controls to cover crimes carried out in cyberspace. The use of the Internet by terrorists, particularly for recruitment and the incitement of radicalization, poses a serious threat to national and international security.
Types of Cyber Crime
Cyber Contraband : Transferring illegal items through the internet(such as encryption technology) that is banned in some locations.
Cyberlaundering : Electronic transfer of illegally obtained monies with the goal of hiding its source and possibly its destination.
Cyberstalking : Express or implied physical threats that creates fear through the use of computer technology such as email, phones, text messages, webcams, websites or videos.
Cyberterrorism : Premeditated, usually politically motivated violence committed against civilians through the use of , or with the help of, computer technology.
Cybertheft : Using a computer to steal. This includes activities related to : breaking and entering, DNS cache poisoning, embezzlement and unlawful appropriation, espionage, identity theft, fraud, malicious hacking, plagiarism and piracy.
Hacking : The activity of breaking into a computer system to gain an unauthorized access is known as hacking.
Phishing : The act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source.
Cyberstalking : The use of communication technology, mainly the Internet, to torture other individuals is known as cyberstalking.
Computer Viruses : Computer viruses are computer programs that can replicate themselves and harm the computer systems on a network without the knowledge of the system users.
Identity Theft : This is one of the most serious frauds as it involves stealing money and obtaining other benefits through the use of a false identity.
Today, we are more dependent on computers and the information that they store than ever before. From spyware, viruses, and Trojans to identity theft and computer hardware malfunctions any disruption can have a huge impact on our lives. The spread of computer virus infections can be stopped through the practice of safe computing. The following are a list of some recommendations for safe computing :
- Always check a removable disk for viruses before using it.
- Ensure that your system boots through the hard disk first. Remove all removable disk from the drive during boot-ups.
- Install software from the original optical disk. If the originals are not available, scan the secondary media for viruses before installation.
- Donot use illegal software. The illegal software contains viruses.
- Ensure that the antivirus package scans all system and boot files at start up
- The automatic virus monitors should be running constantly on your system to ensure that no infected files are transferred to your hard disk over the network.
- Always scan files downloaded from the Internet or transferred over the network before executing them on your machine.
- Scan all e-mail attachments before executing them on your machine.
- Never load an unknown disk into your system unless you make sure it is virus free.
- Finally, enable the personal firewall on your computer. This will help to keep unauthorized people from snooping around your computer when it's connected to the Internet.
- Digital Signature law
- Cyber crime law
- Intellectual property right laws
- Telecommunication law
- Data protection and privacy law