CYBERCRIMEANDITSFORMS
CYBERCRIMEANDITSFORMS
net/publication/349256246
CITATIONS READS
0 1,027
1 author:
SEE PROFILE
All content following this page was uploaded by Naresh Kumar Maharjan on 13 February 2021.
ABSTRACT
Need for understanding the forms of cyber crimes has become imperative considering the
growing nature of cyber crime in Nepal and abroad. The present article briefly various
forms of cyber crimes, perpetrators of the cyber crime, and reasons for cyber crime and
preventive measures for cyber crimes.
Page 1
CYBER CRIME AND ITS FORMS
Page 2
CYBER CRIME AND ITS FORMS
Professional hackers
6. INTELLECTUAL PROPERTY Their work is motivated by
CRIMES the color of money. These kinds of
Intellectual property consists of a hacker are mostly employed to hack
bundle of rights. Any lawful act by the sites of the rival & get credible,
which the owner is deprives completely reliable & valuable information.
or partially of his rights is an offence.
The common form of IPR violation may Discontented employees
be said to be software piracy, copyright This group includes those people
infringement, trademark and service who have been either sacked by their
mark violation, theft of computer source employer or are dissatisfied with their
code etc. employer. To average, they normally hack
the system of their employee.
7. FRAUD & CHEATING
Online fraud & cheating is one of REASONS FOR CYBER CRIME
the most lucrative businesses that one “The concepts of law” has said
growing today in cyber space. It may ‘human beings are vulnerable so rule of
assume different forms. Some of the law is required to protect them’. Applying
cases of online fraud & cheating that this to the cyber space we may say that
have come to lights are those pertaining computer is vulnerable so rule of law is
to credit card crimes, contractual crimes, required to protect and safeguard them
offering jobs etc. against cyber crime. The reason for the
vulnerability of computer may be said to
Who commits cyber crime (cyber be.
criminals)
Children & adolescents between 1. CAPACITY TO STORE DATA IN
the age group 6-18 years. The simple COMPARATIVELY SMALL SPACE:
reason for this type of delinquent The computer has unique
behaviour pattern in children is seen characteristic of storing data in a very
mostly due to the inquisitiveness to small space. This affords to remove or
know & explore the things. Other reason derive information either through physical
may be to prove themselves to be or virtual medium makes it much more
outstanding amongst other children in easier.
their group. Further the reason may be
psychological ever. 2. EASY TO ACCESS:
The problem encountered in
Organized hacker guarding a computer system from
These kinds of hackers are unauthorized access is that there is every
mostly organized together to fulfil possibility of breach not due to human
certain objective the reason may be to error but due to the complex technology
fulfil their political bias, fundamentalism by secretly implanted logic bomb, key
etc. for example, the Pakistanis are said loggers that can steal access codes,
to be one of the best quality hackers in advanced voice recorders, retina imagers
the world. They mainly target the Indian etc. that cal fool bio-metric systems and y
government sites with the purpose of pass firewall can be utilised to get past
their fulfil their political objectives. many a security system.
Further NASA & MICROSOFT
sites are always under attack by the 3. COMPLEX:
hackers. The computer works on
operating systems and these operating
Page 3
CYBER CRIME AND ITS FORMS
Page 4