Social Networking and Cyber Crime

Share & spread the love

 Cybercrime is a crime where a computer is the object of the crime or is used as a tool to commit an offense. Cybercriminals may use computer technology to access personal information, business trade secrets or use the internet for exploitive or malicious purposes. Cybercrime may threaten a person or a nation’s security and financial health. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyber warfare. The “cyber” environment includes all forms of digital events, regardless of whether they are conducted through networks and without borders. The computer may have been used in the commission of a crime, or it may be the target. Issues surrounding these types of crimes have become high-profile, particularly those surrounding hacking, copyright infringement, unwarranted mass-surveillance, sextortion, child pornography and child grooming.

Introduction

 Social networking is an online service, forum or website focused on developing or representing social or social networks among individuals exchanging interest and/or activities, for example.

Social networking pages are the term used to define any platform that allows users to create public profiles on the website and to establish connections with people who view their profiles on the website. Social networking sites may be used to describe online group web sites, online channels of conversation, chat rooms and other social spaces. Websites for social networking are now being used to reach new people from all over the globe to socialize. Social networking platforms may be used to track our old mates when looking for their accounts on these websites.

Negative aspects of social networking

  1. Privacy issues
  2. Addiction
  3. Diminishing social skills

Privacy issues-: Providing a lot of details: people use apps, consumers have a lot of personal information to provide. Although this is real, many of the problems around privacy emerge when even more is required than standard biodata.

Because of the vast volume of knowledge that is important to personality, it encourages the destruction of any credibility on these social networking networks.

Social networking network

Addiction -: Despite statements of the advantage of maintaining regular interaction with mates, such a Slavic love of social networking sites will contribute to addiction quickly Despite statements of the advantage of maintaining regular interaction with mates, such a Slavic love of social networking sites will contribute to addiction quickly.

Diminishing social skills -:Health issues: individuals invest more time in a social network and feel fewer vis-à-vis contact, which contributes to social alienation which creates many physical and psychological problems.

Reduced social skills —: strong electronic media usage, such as e-mail social networking, has reduced social skills for children and adults. Critics assume that written communication contact with computers would erode the capacity of individuals to communicate peacefully and thoughtfully with each other.

Cyber crime

Infringements committed on individuals or groups of persons with criminal motivation, in the use of modern telecoms networks, such as internet network (network including chat rooms, e-mails, note boards and groups) and mobile phones (SMS/MMS) to intentionally harm victims’ reputations or cause physical or mental damage or loss to victims directly or indirectly.

Categories cyber crime

  1. Cyber-crimes against persons
  2. cyber-crimes against property
  3. cyber-crimes against government
Against persons

 Cyber offences against individuals include numerous offences such as child abuse transmission, intimidation of someone using a device, such as Facebook, and cyber stalking.

One of the most significant cyber-crimes that is currently recognized is the distribution, publishing, and diffusion of absent content like pornography and child pornography. The possible damage to society from such a crime can hardly be overestimated.

Against property

Cybercrime is a second type of cybercrime toward all types of property. These offences include illegal machine interference, cyberspace computer vandalism, dissemination of malicious applications and unauthorized possessions.

Against government

 Cyber-attacks against government were the third group. Under this category, cyber warfare is a specific form of criminality. The rise of the internet has demonstrated that people and organizations exploit cyberspace to threaten the residents of a country with foreign governments. This crime is evident in terrorism when a person “cracks” through a military-preserved regime.

Types of cyber attack

  1. Hacking
  2. Denial of service attack
  3. Virus dissemination
  4. Computer forgery
  5. Credit card fraud
  6. Phishing
  7. Spoofing
  8. Cyber stalking
  9. Threatening
  10. Salami attack                                           

 Hacking

 Hacking requires unauthorized device access and the modification of the device so as to enable continued access, as well as a change of the target machine set-up, purpose, or service, without awareness or consent of the system owners,

Denial of service attack

 A denial-of-service assault is a very primitive technology that overwhelms the target computer’s power, which contributes to server denial of access to other machines. There are numerous methods used by hackers to download a server.

Virus dissemination

This illegal activity type requires either direct or non-authorized entry to the operating system by installing new applications that are classified as ss bugs, worms, or logic bombs. The unauthorized removal or deletion of machine data or the Internet function, which prohibits regular device functions, is obviously an illegal offence and is generally referred to as computer sabotage.

Computer forgery

 This occurs as data is changed and processed in computerized records. However, machines may also be used as means to conduct forgery. The availability of computerized color laser copies created a new wave of dishonest modification or replication.

Credit card fraud

Modern companies easily exchange cash with computer machine stored cash, which causes computer theft. Credit card identification and personal and financial credit card details is often targeted for organized crime. Assets in data format also have a significantly higher value than historically economic assets which contribute to a potentially higher economic class.

Phishing

Modern companies easily exchange cash with computer machine stored cash, which causes computer theft. Credit card identification and personal and financial credit card details is often targeted for organized crime. Assets in data format also have a significantly higher value than historically economic assets which contribute to a potentially higher economic class.

 Spoofing 

Get one machine on a network to have a separate computer, typically a computer with unique access rights, such that the other machines are accessed throughout the network.

Cyber stalking

 Cyber stalking is a modern way of cyber-crime in our culture where a person is being pursued or monitored online. A cyber-stalker does not physically track his victim; after his online interaction he gathers details on stalks, harasses him and utilizes verbal threats to intimidate him. It is a violation of your anonymity online.

Threatening

The suspect sends abusive emails or contacts the survivor in chat rooms.

Salami attack

In such a fraud, the suspect performs subtle modifications in such a way the changes go unnoticed. Criminal deducts tiny sums as at 2.50 per month from all the bank’s customer’s account and deposit it into their account. In this situation, no account manager can approach the bank for too little, but fraudulent profits are massive.Cyber laws in India

Under The Information Technology Act,2000

Chapter XI- Offences- 66

Computer hacking framework.

(1) Someone planning to inflict or realize that they are going to trigger incorrect loss or harm to the public or anyone Removes Deletes or changes any resident data resource knowledge or diminishes its worth or usefulness or injures the resident computer resource in some way, commits a hack.

(2) The programmer shall be disciplined by incarceration for up to three years or by a fee of up to two lakh rupees or both.

S.66A –Criminality for sending offensive messages through contact, etc.

Anyone who sends through a machine resource or a contact device.

Any details which is grossly offensive or dangerous,

Any knowledge which, however, is known to be incorrect, to trigger pain, threat, interference, insult, harm, criminal coercion, enmity, hate, or ill will, is continually used by such a machine or communication device.

Each email or e-mail for irritation or distress or for the intent of deciphering or misleading the addressee or receiver of the origin of such messages.

  1. 66C* Anyone who uses the electronic signature, password, or any other unique identifying attribute of a person false or unethical shall be punishable by imprisonment for a period extending to three years, including a penalty which may extend to one-lakh of rupees.
  2. 66D-Criminality for cheating by person utilizing computer tools. ‘Whoever is punished for a duration of three years, by way of any contact system or electronic tools by a male, with the

imprisonment of any description and is also liable to a fine, which may extend to one lakh of rupees.

  1. 66E-Punishment for infringement of personal privacy. “Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of ​​any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both. “
  2. 67 A –Punishment for publishing or transmitting in electronic medium materials containing a sexually explicit act etc.” Whoever publishes or transmits or induces any materials containing a sexually explicit act or behavior to be published or transmitted electronically, shall be punished by first conviction for incarceration of a definition for a period that may stretch to five years.

 How to Tackle Such Activities?

A significant concern emerges as to how to deter such crimes. Day after day, a range of methods and ideas have been presented.

1) Antivirus and Anti Spyware Software:

Antivirus software provides computer applications that detect, prevent, and uninstall computer viruses and other harmful software. The backdoor software, trojans and other spy wares to be mounted on the device are used for restricting spy wares.

Firewalls:

A computer network firewall defends from unauthorized entry. Network firewalls can involve hardware, software, or a mixture of both. A network firewall usually blocks unauthorized access from outside the network in an internal computer network.

Cryptography:

Cryptography is the study of encrypted and decrypted documents Encryption is like delivering mail to another entity with an envelope lock code known only to the sender and the receiver. There have been a number of cryptographic approaches and several of them have yet to be solved.

Cyber ​​Ethics and Laws:

 Cyber ethics and cyber laws are often formulated to deter cyber criminals and it is the individual’s duty to abide by cyber ethics and cyber-laws in order to minimize the number of cybercrimes. In order to stay protected from Cyber Crimes Internet Service Providers, protection tools such as Anti viruses and Anti spy wares can now be built on all computers and have a high degree of protection on their websites and keep their clients secure from all sorts of malicious and viruses.

 Cyber-crime Prevention tips

Using Secure Passwords Use various variations of user IDs/passwords for different accounts to prevent writing them down. Passwords confuse further by combining and constantly changing letters, numbers, unique characters (at least 10 characters overall).

2) Secure your computer

Activate your firewalker security firewalls are the first line; they restrict access to obscure and fake domains, and they hold some kinds of viruses and hackers.

Use anti-virus / malware software Prevent viruses from infecting your device by downloading virus protection software and periodically upgrading it.

Block spyware attacks Prevent spyware from in fitting your device with anti-spyware download and updates.

 3) Be Social-Media Savvy

Making sure you have your social networking accounts on a private basis (e.g., Facebook, Twitter, YouTube, MSN, etc.). Test the setup for security. Make sure that you share material publicly. Be careful. When it is an Internet, it is still there.

4) Secure your mobile devices Be mindful of the susceptibility of your mobile computer to malware and hackers. Import apps from classified sources.

5) Install the latest operating system updates

Keep the software and operating system compatible with new system changes (e.g., Windows, Mac, Linux). Automatic upgrades are enabled to deter possible assaults on older software.

6) Protect your data Use coding on the most confidential files, including tax returns or financial reports, back up all of the critical data periodically and save it elsewhere.

7)Secure your wireless network WI-FI networks are vulnerable to attack at home if they are not protected appropriately. Check and change default configurations. Often insecure are public Wi-Fi, a.k.a. hot spots. Avoid financial or business transfers on the networks. Secure your electronic identification.

8) Be cautious Personal details such as your identity, location, telephone number or financial information on the Internet is revealed. Make sure websites are safe (e.g., when shopping online) or if you have enabled privacy controls (e.g., when accessing/using social networking websites).

How to prevent from cyber-crime ?

 Cyber forensics should be used for cyber proof identification.

  1. Making required improvements to Indian cyber-crime prevention rules.
  2. Any parts of the IT Act 2000 must be harmonized so as to curtail computer crime and persons in order to discourage cyber stalking from disclosure. It is as effective as exposing your name in a public location to strangers.
  3. Often avoid sending images online, particularly to strangers and chat mates, as misuse of pictures has happened.
  4. Always use the new and up-to-date virus anti-attack tools.
  5. Hold volumes back up to avoid data failure in case of virus infection.
  6. Never give your credit card number to a non-secured website to defend against theft.
  7. Always keep an eye on the places your children visit to avoid abuse or depravity of children.
  8. It is best to use a configured encryption that allows you control of cookies and returns details to the web as it can be fatal to leave the cookies unguarded.
  9. Owners of websites should track traffic and search for any website anomalies. This can be accomplished by installing host-based intrusion detection systems on servers.
  10. Public pages Database servers must be physically isolated from the existing business network.

Conclusion

The topic of network and internet protection has become more and more relevant as business and people become more and more linked. To escape hacker knowledge, we secretly use passwords and update passwords on a regular basis. We cannot use our names, initials as quickly monitored passwords. Some Executable Files from Unknown Source, Any Source Without Searching for Virus Details We must have an anti-virus certificate. Teams like Cert and First Assist in solving cyber-attacks and disseminating safety knowledge.

Today, computer fraud is close and a danger to all organizations. Cybercriminal, although concentrating mainly on the consumer and financial services industries for several years, undoubtedly allowed the move to the sector in 2010. They adapt their strategies and accomplish diversified goals in order to have better knowledge. As one organization has seen: it took Internet offenders just four hours to resolve a countermeasure that took four months to build Knowledge and Understanding of Possible Threats one of the most critical defenses. In 2010, we were able to witness numerous major arrests across the globe, directly attributed to improvement in international collaboration between law End as We Move Into 2011, These continuing efforts
will play an integrated role in the fight against cybers, the sharing of information amongst competitors and partners.

About the Author: Yuvraj Sharma is a student at School of Law, NMIMS, Hyderabad

Note: The views in this article are personal only.

References

  • Gordon, Sarah (July 25, 2006). “On the Definition and Classification of Cybercrime” (PDF). Retrieved January 14, 2018.
  • Ammar Yasir, S. N. (2012). “Cybercrime: A Threat to Network Security.” International Journal of Computer Science and Network Security.
  • Arpád, 1. (2013). “A Greater Involvement of Education in Fight Against Cybercrime.” Procedia Social and Behavioral Sciences% 3D.
  • Distributed Denial of Service Attack“. csa.gov.sg. Archived from the original on 6 August 2016. Retrieved 12 November 2014.
  • Identifying Phishing Attempts“. Case. Archived from the original on 13 September 2015.

Attention all law students and lawyers!

Are you tired of missing out on internship, job opportunities and law notes?

Well, fear no more! With 2+ lakhs students already on board, you don't want to be left behind. Be a part of the biggest legal community around!

Join our WhatsApp Groups (Click Here) and Telegram Channel (Click Here) and get instant notifications.

LawBhoomi
LawBhoomi
Articles: 2363

Leave a Reply

Your email address will not be published. Required fields are marked *

NALSAR IICA LLM 2026