Cyber Crime, or computer-based crime, is a crime which includes computer and network. A Computer can be used in crime commission, or it may be targeted.

It can be described as Cyber Crime: “People or groups whom they are criminally victimized from the hacker. The hackers have criminal purposes or physical or mental harm, through the Internet, the new Telecommunication Network (Direct Or indirectly), including communication rooms, emails, notice boards and groups) and mobile phones (Bluetooth / SMS / MMM). Cyber crime can threaten a person or country’s security and also financial health. Problems surrounding these types of crime have become a high profile, especially hacking, copyright infringement, unwarranted mass-surveillance, sextortion, child’s harassment, and child grooming.

Gender and cyber crime

The cyber crime’s gender perspective has been described as ‘cyber crime’ against women, such as “deliberately psychologically and physically about crimes against women. Telecommunications network such as the Internet and mobile phones have been damaged. Internationally, both the government and non-state actors are engaged in cyber crime, including spying, financial stolen, and other cross-border crimes. Cyber crime crosses international borders and includes at least one nation’s actions of the state, sometimes referred to as cyber warfare.

A report (McAfee Sponsor), published in 2014 and the annual loss of $ 445 billion to the global economy. Further, US $ 1.5 billion lost in 2012 online cards in the US. However, in 2018, the Center for Strategic and International Studies (CSIS) concluded that in partnership with McAfee, approximately $ 600 billion, almost one percent of global GDP, lost every year in Cyber crime.

Black web

Darknet markets are using to buy and sell recreational drugs online. Some drug smugglers use encrypted messaging tools to communicate with drug sellers. The Black web, sites named as Silk road was an important online marketing for the drug before the law enforcement agencies were closed. Then re-opened under new management, and then closed by law enforcement did. Silk Road goes down after 2.0, the Silk Road 3 reloads. However, this Diabolus market was just an old market, which used more exhibitions for brand success.

Types of cyber crimes

1.  Financial fraud crimes

Computer frauds intend to make any mistake or refuse to make any mistake that it should be made a mistake. In this context, it will be the result of getting rid of fraud.

  • Unauthorized change requires some technical skills and before entering them or entering fake data, or entering unauthorized instructions or changing data using unauthorized functions. The common form of theft is by employees.
  • Usually, change destroy, press or steal to hide unauthorized transactions. It is difficult to detect it.
  • Other types of fraud can be facilitated through computer systems, including bank fraud, carding, identity theft, weapons, and stealing information.
cyber-crime

2.  Cyberterrorism

Internet officials and server scanners have increased significantly before the start of 2001, government officials and information technology security experts. But there is an increasing concern in government agencies such as Federal Bureau Investigation (FBI) and Central Intelligence Agency (CIA). Such interventions are part of an organization organized by cyberterrorist, foreign intelligence services, or other key groups to transform potential security holes into a major system.

Anyone who threatens or threatens or threatens information from a government or organization to advance their political or social goals by launching computer-based attacks against computer or network.

cyber crime Cyberterrorism

3.  Cyberextortion

The server, or computer system, has repeatedly published articles or articles with other attacks by hackers. These ask hackers to stop attacks and “make money for the promise to offer protection.” According to the Federal Bureau investigation, cyber crime extortionists are rapidly attacking corporate websites and networks, weakening their ability to run and repay their service to restore their service. Over 20 cases are reported to the FBI each month and many people are known to be considered as a victim of public domain fraud. Troubleshooting Usually Distributed Denying Services. However, other cyberextortion techniques exist as doxing extortion and problem-related disorders.

Report of Cyber Crime example cases

In 2018, online robbery for Pakistan by A Russian hacker, of millions of dollars.

Further, in May 2017, 74 countries called a ransomware cybercrime, called “WannaCry”.

On April 23, 2013, the Twitter account of the Associated Press Twitter accounts hacked– Hacker tweeted about fake attacks in the White House, claiming that Obama was injured while claiming this fraud, a short part of 130 points from the Dow Jones industrial average, $136 billion has been removed from the S&P 500 index, and temporary suspension of the AP’s Twitter account. Dow Jones later reinstated his session.

Author

1 Comment

Write A Comment