Cybercrime

Various Types of Cyber Crimes and threats : Denial of Services (DoS) Attacks, Botnets and Cyber Crime in India with Statistics & Facts.

Cybercrime, also called computer crime, is a type of crime which involves a network and a computer. It has the potential to harm someone’s financial strength and security by accessing the user’s personal information, and confidential data, stealing identities, committing fraud or deactivating the device. Due to the early adoption of the internet and computers in the United States, most of the people committing cybercrimes were from there. 

Cyber Crime

  • Cybercrime is an offence committed using a computer as the goal of the crime or as a tool for committing the offence
  • Cybercriminals may utilise a device to access a user’s personal information, confidential corporate data, or government data or deactivate a device
  • Selling or eliciting the information above online is also considered a cybercrime

Types of Cyber Threats and Cybercrimes

Cybercrime is exploding in the digital age. Cybercriminals on the World Wide Web profit off the personal information of internet users. They go into the dark web to purchase and sell unlawful goods and services. They even get access to top-secret government data.

  • Cybercrime is at an all-time high, costing businesses and consumers billions of dollars each year
  • Due to the growth of technology and the rising accessibility of smart technology, hackers may exploit many entry points inside consumers’ houses
  • While law enforcement organisations address expanding problems, criminal activity continues to rise, taking advantage of the internet’s anonymity

Types of Cyber Crimes

1. Denial of Services (DoS) Attacks

  • These are used to temporarily disable an online service and bring the network down by flooding the site with traffic from various sources
  • By installing malware on users’ PCs, large networks of compromised machines known as Botnets are built
  • Once the network is down, the hacker then gets access to the system

2. Botnets

  • Botnets are networks of infected computers that remote hackers control externally
  • Remote hackers then use these botnets to spread spam or attack other systems
  • Additionally, botnets may be utilised to behave like malware and carry out destructive actions

3. Identity Theft

  • Identity theft in cybercrime happens when a criminal obtains access to a user’s personal information with the intent of stealing money or committing tax or health insurance fraud
  • Additionally, they may register a phone/internet account in your identity, organise a criminal activity in your name, and claim government benefits in your name
  • They may do this via breaking into individuals’ accounts, obtaining personal information through social media, or sending phishing emails

4. Cyberstalking

  • Cyberstalking is a kind of online harassment in which the person is bombarded with online messages and emails
  • Criminals use social media platforms, websites, and search engines to frighten and terrify users
  • Typically, the Cyberstalker is acquainted with their target and instils fear or anxiety in them

5. Social Engineering

  • Criminals use social engineering to make direct contact with you, often through phone or email
  • They seek to acquire your trust and often masquerade as a customer support representative to get the essential information
  • Usually, this is a password, the firm for which you work, or bank details
  • Cybercriminals will gather as much information about you as possible on the internet and then seek to add you as a friend on social media platforms
  • They may sell your information or open accounts in your name after they acquire access to an account

6. PUPs

  • PUPS, or Potentially Unwanted Programs, are less dangerous than other types of cybercrime, but they are nonetheless classified as malware
  • They remove important software from your systems, such as search engines and pre-installed applications
  • They may include malware or adware, and running antivirus software will help you avoid hazardous downloads

7. Phishing

  • Phishing is a sort of attack in which hackers send malicious emails or URLs to victims to gain access to their accounts or computers
  • Users are duped into responding to emails suggesting they need to update their password or billing information, granting thieves access

8. Prohibited/Illegal Content

  • It entails criminals exchanging and disseminating improper material that is very unpleasant and offensive
  • Offensive material may include but is not limited to adult sexual activities, violent films, and footage of criminal conduct
  • Illegal content includes materials calling for terrorist activities and material promoting child abuse

9. Online Scams

  • These are often in the form of advertisements or spam emails
  • It may contain promises of awards or offers of large sums of money
  • They include attractive offers that are “too good to be true” and, when opened, may install malware and expose personal information

Cybercrime in India – Statistics & facts

  • According to a survey from the industry, Indian customers have lost more than 18 billion dollars to cybercrime
  • In 2018, the nation registered over 27 thousand occurrences of cybercrime, a rise of more than 121 per cent over the previous two years
  • While crimes vary from small internet fraud to lottery scams and sexual harassment, the banking and financial industry seems to be the most targeted
  • Along with economic losses, cyberbullying and exploitation negatively influence public safety, particularly for children and vulnerable segments of society
  • In 2018, India registered over 2,000 cybercrime incidents, including sexual harassment and over 700 instances of cyberbullying directed at women and kids

Conclusion 

Cybercrime, an offence related to the internet, is the most prevalent crime in today’s scenario. It causes severe loss to the victim. In order to prevent oneself from being a victim of cybercrime, one should always shop at reliable websites, develop string passwords on their accounts and make sure that their social networking profiles are private. 

faq

Frequently asked questions

Get answers to the most common queries related to the UPSC Examination Preparation.

What is phishing?

Ans. It is a process of social engineering through which attackers send sceptical messages and email with the view t...Read full

How cyber stalking differs from only stalking?

Ans. Stalking is a behaviour or conduct of a person who follows or monitors the actions of the other individual with...Read full

What is ATM Jackpotting in cyber-crimes?

Ans. It is one of the cyber -crimes tactics used by the cyber criminals in which criminals targets the cash dispense...Read full

What is the name of the regulatory body in the case of cyber –crimes?

Ans. The government of India has established a nodal agency at the national level with the name of “CERT- In”, which is responsible for the qui...Read full

What does cyber extortion stand for?

Ans. Cyber extortion is a kind of offence in which criminal blackmails the target individual through online means li...Read full