Effects Of Cyber Crime Essay

Improved Essays
[W]e live in a society exquisitely dependent on science and technology, in which hardly anyone knows anything about science and technology.
The convergence of computer networks and telecommunications facilitated by the digital technologies has given birth to a common space called ‘cyberspace’. This cyberspace has become a platform for major human activities which converge on the Internet 21st Century . The cyberspace has, in fact, become the most happening place today. Internet is increasingly being used for communication, commerce, advertising, banking, education, research and entertainment. There is hardly any human activity that is not touched by the Internet. Internet has something to offer to everybody and in the process it only increases
…show more content…
As a result, a cyber-crime may invite the application of not the cyber-crime specific legislation, which is the IT Act, but also general criminal legislation, which is the Indian Penal Code, 1860. Other laws will also be applicable depending on the nature of the crime, for example, the Prevention of Money Laundering Act, 2002 will be applicable to a case of online money laundering.
Cyber-crime has a widespread adverse impact, especially in view of the indispensability of the Internet in everyday life. The targets of cyber-crime include any device which can access the Internet, like a computer, Smartphone or laptop, any activity that is conducted using IT. Cyber-crimes like phishing, spamming, credit card frauds and identity theft now affect between 1-17% of the population, as compared to less than 5% for traditional crimes like burglary, robbery and car
…show more content…
Apart from isolated individuals committing cyber-crime, the realm of cyber criminals has expanded to include organised and professional hackers and crackers, the ‘cyber mafia’ , and the conduct of cyber war ,cyber terrorism and cyber espionage by governments against each other. It is estimated that up to 80% of cyber-crimes today, which are involved in malware creation, botnet management, harvesting of personal and financial data, data sale, etc., are a result of organised activity. The Europol has warned of the huge potential of increase in the volume of organised cyber-crime, especially with respect to the possibility of creation of botnets of mobile phones and the vulnerability of the corporate world due to the number of private devices (individual mobile phones, laptops, etc.)

Related Documents

  • Superior Essays

    The internet is providing us with plenty of resources, such as learning and sharing information, high academic research, and more opportunity for people to find deeper topics for further information. As the internet becomes increasingly involved into our daily lifestyles,…

    • 1718 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    This article provides insight into the sphere of CyberFraud and its effect internationally and nationally (United States of America), it explores statistics on who the criminals target, why they target their victims, the information that is stolen during the attack(s) and the economic effect the attacks hold. The source focusses on the most common aspects of CyberFraud and has valuable statistics of being affected and becoming a victim of the crime. The source explores the major types of CyberFraud; Phishing, Pharming and Identity Theft. The article concludes with how corporations can prevent the attacks and shows the damage (economically) that CyberFraud generates.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Annotated Bibliography: Mobile Telecommunications in the U.S. Kenny Anyikude March 16, 2017 Bowie State University In the area of mobile telecommunications, I’ve discovered growth trends, which will have an impact on the development of the telecommunications industry. These trends will impact the present and future development of mobile telecommunications. Security threats have become a growing trend; cybercriminals have evolved into new and dangerous forms to stay relevant (Olavsrud, 2015). Another trend I have come across is power line networking, which is wired network with hidden wires (Evans, 2014).…

    • 559 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Cyberstalking differs from the traditional form of physical stalking, and can be defined as the repetitive use of electronic communications to harass someone. In today’s technologically focused world, cyberstalking has become an increasingly serious concern. One of the main differences between physical stalking and cyberstalking is the physical proximity of the stalker. Cyberstalkers have several different ways to harass their victims, including e-mails, instant messaging, and social media sites, which give the attacker more opportunities to harass their victims, as well as the ability to do so undetected.…

    • 221 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Internet Security/Cyber criminal 1. Explain how Internet security measures can actually create opportunities for criminals to steal, rather than prevent them. The onslaught of security breaches on the internet make the threats to e-commerce very real for business, consumers, and government, and politician. There are individuals that hack into computers as well as the networks of businesses and government agencies.…

    • 606 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    White Collar Crime Paper

    • 1009 Words
    • 5 Pages

    For instance, in 2015, researchers estimated that 43 percent of the world population are using the Internet. A year later, the number increased from 43 percent to 47 percent (Taylor, 2016). The fact that more people are using the Internet, the more technocrimes, and other form of white-collar crimes would be committed. As it is stated on the text (Trusted Criminals), “Computers and other forms of modern technology play an increasingly central role in many white-collar crimes, and this role will surely expand in the future” (Friedrichs, 2010). With that say, certain form of white-collar crimes will continue to be increasing as world population getting to involve more on the…

    • 1009 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In recent years, Cyber-attacks have become a more common form of terrorism used against the United States. Cyber-terrorist have the ability to access bank accounts, shut down systems, and send malicious viruses to ordinary citizens from the comfort of their home. It may be possible for terrorist to hack into States and Federal systems, which would be catastrophic on a global level; cyber-attacks are happening more and more often than they should. This type of cybercriminals has cost the US 580,000 jobs and $100 billion, with the global cost as much as $400 billion (2013). The legal field have been targeted by cybercriminals, the sensitive data about their clients have created a gold mine for the cybercriminals, and in an effort…

    • 1394 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Police Technology

    • 1272 Words
    • 6 Pages

    Technological advances can be a huge advantage to the law enforcement community, but may also be a disadvantage as well. Technology. As the use of the Internet and other computer networks has grown rapidly in recent years, so has the opportunity for electronic crime. Unlawful activity can be committed or facilitated online. Criminals can trade and share information, mask their identity, identify and gather information on victims, and communicate with co-conspirators.…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    In the earliest communities, people were “Hunter-Gatherers”. This means, in most instances, men would hunt animals to eat, and women would gather fruits and vegetables. During this time people Nomads; they moved to new locations based upon the flocking patterns of the animals they hunted. After this, they learned that they could capture and breed the animals we ate. This is when the hunter-gatherer phases ended and the horticultural phase end.…

    • 1383 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    The Department of Homeland Security 2014 Quadrennial Homeland Security Review outlines six major challenges that America is facing and will face over the next few years. Those six challenges include: the terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards (DHS, 2014, 28). The focus of this paper is to address the nature of cyber threats and cyber terrorism in America. When Americans think of the word “terrorism”, most think of the public acts that are carried out against American citizens and broadcasted worldwide. A few that come to mind are the attacks in New York on September 11th and the Boston Marathon bombing in 2012.…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    discusses the importance of cybersecurity in relation to finances of the US. The statement claims that cyber criminals will target the larger entities that have the potential to significantly threaten the finances and reputations of the US most significant businesses and institutions. The most common way for cyber criminals to threaten the US financially is through exploit financial and market systems, counterfeiting of stored value cards, fraudulent monetary transfers, and corporate account takeovers. As discussed in the previous article, the cyber criminals use fake files, attachments, folders, documents, etc. to access the accounts of people all across the…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Internet access should be considered a human right since over a third of the world’s population, more than 2.8 million people, use it (Internet World Stats, 2014). This number proves that the Internet plays many important roles in our everyday life. Moreover, not only computers, but also mobile phones, tablets, and other devices now connect to the Internet, therefore the Internet is attainable to everyone anywhere. Unlike other devices such as radio or television, the Internet does not provide only information, but it also allows people to exchange their expression, opinion, education, and connection. This means that the Internet is a revolutionary device that helps people to achieve the goal of human…

    • 1148 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The Internet is global network that allows you to connect to the world. In 2006, Dr. Leonard Kleinrock had given speech on Internet at Infocom. It includes – the situation before Internet was invented, how internet was invented, brief overview on Arpanet (beginning and growth), what all barriers had been removed after using internet, early pioneers, implementers contributions, some good and some dark sides of Internet, his future vision about internet and five golden guidelines to research. He has defined Internet by using example of Larry Garwood and his father.…

    • 1354 Words
    • 6 Pages
    Improved Essays