Digital Online Shopping

Amazon is India's largest one-stop online Shopping Store. You can discover and buy the product at an affordable price like Electronics, Books, Kitchen goods, Men & Women Clothing, Furniture, Shoes, of all Brands and get exciting deals.

Nov 8, 2020

Importance of Cyber Security

 Importance of Cyber Security

Importance of Cyber Security

During the COVID-19 lockdown period, everything from education to exams and employment to business has gone online. But now people are starting to feel more comfortable online which also saves time, money, and labour. With this system, the Importance of Cybersecurity also increases manifold.


Cybercrime is a crime. These include computers, mobiles, and their networks. If any computer or mobile or their footprint is found at the crime scene or any crime, they will receive it.


Offenses committed with a digital device are included in the category. Cybercrime also includes misappropriation and misuse of personal information, stealing, or stealing someone's personal information from a computer or mobile without permission.


Computer crimes are also committed in many ways. Such as stealing data, deleting data, altering information. Giving useful information to anyone else without the permission of the original owner or stealing computer parts and destroying them.


Besides, there are many other types of cybercrime, such as sending spam-mails, hacking electronics devices, phishing attacks, uploading and sharing viruses, assuming someone's identity, and stalking someone online or keeping an eye on them.



Types of Cybercrime & Information

 

Hacking - The act of stealing and altering anyone's personal information such as a username or password or hacking is an attempt to use a private network in a computer system or commuter for illegal purposes without the original owner's permission.

 

Spam-e-mail - in which unwanted heaps of emails are sent. Which only harms the computer or mobile. This can lead to defects and sometimes spam emails with spy software being input into mobile or computer. Then every activity done by the person is recorded.

 

Phishing: Phishing is a social engineering attack. They were used to steal any login information and data, including credit or debit card numbers. An attacker sends an email, instant message, or text message to the sufferer by assuming a known identity. As a result, the victim gives information about his / her non-disclosure, keeping in view the credible identity, and the damage is done.

 

Cyberbullying - making rude comments on social media platforms like Facebook, whatsApp, and Instagram, making cyber threats on the Internet, making fun of someone, putting others to shame through the Internet, is called cyberbullying. Children and women are the biggest victims.

 

Spreading viruses: Cybercriminals sends some software to your computer or mobile. These include virus worms, Trojan horses, logic horses, etc. sent only to disrupt the operation of computers and mobiles.

 

Rumours on social media: Many human beings use social media appreciably to unfold social, ideological, religious, and political issues. Users do not understand the motives behind the post and deliberately share such links or posts. This can lead to social unrest, such as mob lynching. Such incidents are also included in the category of cybercrime and cyber-terrorism.

 

Fake Bank call: You get the phony email, message, or phone call. Looks like it came from your bank. You are asking for your card information, ATM number, and password, and at the same time, you are informed that if you do not provide this information, your account will be locked, or please provide information on links. Remember that any bank or bank official never requests such data.

 

Sexting: Sexting refers to a type of cybercrime that involves sending digital images, videos, text messages, or emails, usually showing sexual activity from a mobile phone.

 

SIM swap: A SIM swap scam means that when a fraudster fraudulently obtains a new SIM card of your registered mobile number from your mobile service provider, with the help of that new SIM card, they can make financial transactions. OTP can also receive and receive all types of notifications.

 

Also Read: Cloud Storage Security       


SMSing: SMSing refers to a type of fraud in which a mobile phone text message is used to visit any fraudulent websites or download malicious content via the web. When someone follows such text messages, they end up in substantial financial losses.

 

Smishing: It is a combination of short message services and Phishing in which Cyber criminals send emails that seek to recipient to open a malware attachment or a link. Smishing is becoming an emerging and growing threat in the cyber world.

 

Child Pornography: It is a crime to publish or share an image or video on the Internet of any kind that contains a sexual image in any form or form of sexual abuse. At the same time, Section (2B) of the Information Technology (IT) Act also states that the publication or transmission of a child's electronically displayed material in a sexual act is punishable.

      

Cyberstalking: Cyberstalking refers to a crime in which a person uses an electronic communication medium to chase someone. Efforts to make to increase personal contact, to communicate, even when there are clear signs of reluctance on the part of the person or the victim, are monitored continuously utilizing the Internet, email, or any other type of electronic communication.

 

Cyber ​​Grooming: Cyber ​​grooming is a crime when a person forms an online relationship with a young person and manipulates or forces them to engage in sexual activity.

 

Job Fraud - Online Job Fraud Trying to deceive people who need employment giving False promises of getting a good job with a high salary and money laundering in the name of registration and different processes.

 

Sextortion: Sextortion refers to an online blackmail crime in which a person threatens to disseminate their personal and sensitive material to society, using electronic means, when they do not provide pictures of sexual activity, consent to sexual activity, or pay a cyber-criminal. Sometimes photographs or videos are also sent by MORPH.


Identity Theft - In this type of crime, any person fraudulently or dishonestly uses that person's electronic signature, password, by incorrectly assuming another person's name electronically.


The Reason for more to Cybercrime in India


Any crime is born when we do not have any information related to that crime. In such a situation, cybercrime gets more boost, and some people do not even know that they have become victims of cybercrime.


In today's time, everyone uses the Internet a lot. But due to not being aware of cybercrime, mostly women become victims of cybercrime. 


According to India's statistics, one-third of the women of India have become victims of cybercrime, out of which only 35% of women have filed cybercrime complaints. 


Apart from this, some women have not filed any complaint about cybercrime, according to those figures, 46.7 percent of women fall in this figure.


The surprising thing is that there is 18.3 percent of women who have been cybercrime with them, but they are not even aware of this. This crime has reached its stage in today's time, and the biggest reason for this is not aware of cybercrime.


Also Read: How to use LinkedIn Professionally        


Measures to avoid cybercrime


No work can be done without the Internet but doing any work without taking precautions can prove to be harmful to you. Therefore, if you read all the measures given below and adapt them in your life, you will never be a victim of cybercrime.


Use a secure internet service - We often start using it as soon as you get free Internet, whereas you should know that any free internet can be harmful to you. Because there is some such WiFi also, using which all personal information of your phone is stolen. So always avoid any free WiFi facility.


Use a strong password - Always put a strong password in all applications related to your personal information. It should not be that you have been using your same password for years, but you should keep changing your password regularly so that no one can crack it. With this, you can avoid being a victim of cybercrime.


Keep your software up to date - To prevent accidents related to cybercrime with you, you must keep your operating system and Internet software fully updated. If you keep updating your software regularly, then no hacker will be able to steal any of your data from your software.


Restrict your social media settings - In today's time, social media has its own identity. And the biggest cybercrime is also carried out through social media, in such a situation, it is essential for you to completely restrict your information on all types of social media accounts.


The most important thing is to give information about your social media account only to those people who are reliable to you. No unknown person can enter your social media account and misuse the information related to you, so keep all the information related to your account restricted.


Tell your children about the Internet - In today's time, small children are becoming victims of cybercrime because they do not have complete information about the Internet, due to which they soon go astray.


In such a situation, it becomes the duty of good parents to explain to their children all the information related to the Internet in detail so that they can be alerted before anything goes wrong with them.


Take care of your website - If you are a businessman and run one of your websites, then keep your website safe and secure. If you see even a small flaw, then change the password of your website immediately.


Avoid sharing your personal information on social media - In today's time, all the people who are a big celebrity or common man, uploading all the information related to themselves through social media. In such a situation, some stockers take care of your profile and start following you.


By uploading any of your mail IDs and any information on social media, you can be in danger at any time. At what time, where are you going, and why are you going, do not share any such post on your social media account so that you can avoid cybercrime.

 
Also Read: How To Secure Your WhatsApp Chat                 

Cyber Law in India

Offenses 

Section Applicable

Tampering with computer source documents

Sec.65

Hacking with computer systems, Data Alteration

Sec.66

Sending offensive messages through communication service, etc.

Sec.66A

Dishonestly receiving stolen computer resource or communication device

Sec.66B

Identity theft

Sec.66C

Cheating by personation by using computer resource

Sec.66D

Violation of privacy

Sec.66E

Cyber terrorism

Sec.66F

Publishing or transmitting obscene material in electronic form

Sec.67

Publishing or transmitting of material containing sexually explicit act, etc. in electronic form

Sec.67A

Punishment for publishing or transmitting of material depicting children in the sexually explicit act, etc. in electronic form

Sec.67B

Preservation and Retention of information by intermediaries

Sec.67C

Powers to issue directions for interception or monitoring or the decryption of any information through any computer resource

Sec.69

Power to issue directions for blocking for public access of any information through any computer resource

Sec.69A

Power to authorize to monitor and collect traffic data or information through any computer resource for Cyber Security

Sec.69B

Unauthorized access to the protected system

Sec.70

Penalty for misrepresentation

Sec.71

Breach of confidentiality and privacy

Sec.72

Publishing False digital signature certificates

Sec.73

Publication for the fraudulent purpose

Sec.74

Act to apply for offence or contraventions committed outside India

Sec.75

Compensation, penalties, or confiscation not to interfere with other punishment

Sec.77

Compounding of Offences

Sec.77A

Offences with three-year imprisonment to be cognizable

Sec.77B

Exemption from liability of intermediary in certain cases

Sec.79

Punishment for abetment of offences

Sec.84B

Punishment for attempt to commit offences

Sec.84C

Offences by Companies

Sec.85


Note: Sec.78 of I.T. Act empowers Police Inspector to investigate cases falling under this Act

 

Sending threatening messages by e-mail

Sec.503 IPC

Word, gesture, or act intended to insult the modesty of a woman

Sec.509 IPC

Sending defamatory messages by e-mail

Sec.499 IPC

Bogus websites, Cyber Frauds

Sec.420 IPC

E-mail Spoofing

Sec.463 IPC

Making a false document

Sec.464 IPC

Forgery for purpose of cheating

Sec.468 IPC

Forgery for purpose of harming reputation

Sec.469 IPC

Web-Jacking

Sec.383 IPC

E-mail Abuse

Sec.500 IPC

Punishment for criminal intimidation

Sec.506 IPC

Criminal intimidation by an anonymous communication

Sec.507 IPC

When copyright infringed:- Copyright in a work shall be deemed to be infringed

Sec.51

Offence of infringement of copyright or other rights conferred by this Act. Any person who knowingly infringes or abets the infringement of

Sec.63

Enhanced penalty on second and subsequent convictions

Sec.63A

Knowing the use of an infringing copy of the computer program to be an offence

Sec.63B

Obscenity

Sec.292 IPC

Printing etc. of grossly indecent or scurrilous matter or matter intended for blackmail

Sec.292A IPC

Sale, etc., of obscene objects to a young person

Sec.293 IPC

Obscene acts and songs

Sec.294 IPC

Theft of Computer Hardware

Sec.378

Punishment for theft

          Online Sale of Drugs NDPS Act

           Online Sale of Arms Arms Act

Sec.379





Image by Tumisu from Pixabay

 

No comments:

Post a Comment

Please do not enter any spam link in the comment box