Computer Assignment
Computer Assignment
ROLL NO : 20 & 2
ONLINE CRIME OR COMPUTER CRIME OR CYBER
CRIME
COMPUTER CRIME ,CYBERCRIME, E-CRIME, HI-TECH
CRIME OR ELECTRONIC CRIME IS A CRIMINAL
ACTIVITY WHERE A COMPUTER OR NETWORK IS
AFFECTED BY SOME OTHER COMPUTER OR
NETWORK .AS THE USE OF COMPUTERS IS GROWING
,THE COMPUTER CRIME IS ALSO SPREADING
CYBERCRIME ENCOMPASSES A WIDE RANGE OF
CRIMINAL ACTIVITIES THAT ARE CARRIED OUT
USING DIGITAL DEVICES AND/OR NETWORKS. THESE
CRIMES INVOLVE THE USE OF TECHNOLOGY TO
COMMIT FRAUD, IDENTITY THEFT, DATA BREACHES,
COMPUTER VIRUSES, SCAMS, AND EXPANDED UPON
IN OTHER MALICIOUS ACTS
SOME OF THE SPECIFIC CYBER CRIME ARE
1. SPAMMING
IN CYBER SECURITY, SPAMMING MEANS SENDING UNWANTED
MESSAGES TO MANY PEOPLE, OFTEN FOR BUSINESS OR MALICIOUS
REASONS. YOU CAN USE EMAILS, TEXTS, OR INSTANT MESSAGES TO
DO THIS. SPAMMING CAN BE USED TO SHARE HARMFUL SOFTWARE,
TAKE PERSONAL INFO, OR TRICK PEOPLE WITH SCAMS AND FAKE
MESSAGES. IT CAN ALSO SLOW DOWN OR BREAK NETWORKS AND
SERVERS. IT'S IMPORTANT TO BE CAREFUL WHEN YOU GET EMAILS OR
MESSAGES FROM PEOPLE YOU DON'T KNOW, AND DON'T CLICK ON
UNKNOWN LINKS OR SHARE PERSONAL INFO.
2. FRAUD
COMPUTER FRAUD IS A DISHONEST ACT WHERE THE USER MAY
BECOME THE VICTIM OF FRAUD AND CAUSES BIG LOSS.THE FRAUD
WILL RESULT IN OBTAINING A BENEFIT BY: ALTERING COMPUTER INPUT
IN AN UNAUTHORIZED WAY, ALTERING ,DESTROYING, SUPPRESSING ,
OR STEALING OUTPUT , DOING UNAUTHORIZED TRANSACTIONS ,
DELETING DATA STORED PERMANENTLY , MISUSING EXISTING SYSTEM
3. CYBER STALKING
CYBERSTALKING IS A CRIME COMMITTED WHEN SOMEONE USES
THE INTERNET AND OTHER TECHNOLOGIES TO HARASS OR STALK
ANOTHER PERSON ONLINE. CYBERSTALKING IS THE USE OF
THE INTERNET OR OTHER ELECTRONIC MEANS TO STALK OR
HARASS AN INDIVIDUAL, GROUP, OR ORGANIZATION. IT MAY
INCLUDE FALSE ACCUSATIONS, DEFAMATION, MONITORING,
IDENTITY THEFT, THREATS, OR BLACKMAIL.[1] THESE UNWANTED
BEHAVIORS ARE PERPETRATED ONLINE AND CAUSE INTRUSION
INTO AN INDIVIDUAL'S DIGITAL LIFE AS WELL AS NEGATIVELY
IMPACT A VICTIM'S MENTAL AND EMOTIONAL WELL-BEING, AS
WELL AS THEIR SENSE OF SAFETY AND SECURITY ONLINE.
4. CYBER HARRASEMENT
6. PLAGIARISM
CYBER PLAGIARISM IS THE ACT OF COPYING OR DOWNLOADING
SOMEONE ELSE'S WORK FROM THE INTERNET AND CLAIMING IT AS
YOUR OWN WITHOUT GIVING PROPER CREDIT. THIS INCLUDES COPYING
AND SELLING SOMEONE ELSE'S WORK ONLINE WITHOUT THEIR
PERMISSION. PLAGIARISM IS THE REPRESENTATION OF ANOTHER
PERSON'S LANGUAGE, THOUGHTS, IDEAS, OR EXPRESSIONS AS ONE'S
OWN ORIGINAL WORK.THE WORK MAY BE AN IDEA , PROJECT ,
DOCUMENT , ACADEMIC WORK , ETC
7. CHILD SOLICITING AND ABUSE
THIS CYBER CRIME INCLUDE SOLICIT
MINORS VIA CHAT ROOMS FOR THE
PURPOSE OF CHILD ABUSE AND
HARASSMENT BY CRIMINALS.
8. MALICIOUS SOFTWARE
THESE ARE THE INTERNET-BASED
SOFTWARE OR PROGRAMS THAT ARE USED
TO DISRUPT A NETWORK. THE SOFTWARE
IS USED TO GAIN ACCESS TO A SYSTEM TO
STEAL SENSITIVE INFORMATION OR DATA
OR CAUSING DAMAGE TO SOFTWARE
PRESENT IN THE SYSTEM.
9. PHISHING
PHISHING IS A TYPE OF ONLINE SCAM WHERE CRIMINALS
TRICK PEOPLE INTO GIVING AWAY PERSONAL
INFORMATION, SUCH AS PASSWORDS, BANK DETAILS, OR
CREDIT CARD NUMBERS. THE GOAL IS TO STEAL MONEY
OR IDENTITY. PHISHING IS A FORM OF
SOCIAL ENGINEERING AND A SCAM WHERE ATTACKERS
DECEIVE PEOPLE INTO REVEALING
SENSITIVE INFORMATION [1] OR INSTALLING MALWARE
SUCH AS VIRUSES, WORMS . PHISHING ATTACKS HAVE
BECOME INCREASINGLY SOPHISTICATED AND OFTEN
TRANSPARENTLY MIRROR THE SITE BEING TARGETED,
ALLOWING THE ATTACKER TO OBSERVE EVERYTHING
WHILE THE VICTIM NAVIGATES THE SITE, AND
TRANSVERSES ANY ADDITIONAL SECURITY BOUNDARIES
WITH THE VICTIM
.
1. SOFTWARE UPDATES
REGULARLY UPDATE YOUR SOFTWARE AND MOBILE APPS TO FIX
VULNERABILITIES AND PREVENT MALWARE.
2. ANTIVIRUS SOFTWARE
INSTALL ANTIVIRUS SOFTWARE TO PROTECT YOUR COMPUTER
AND NETWORK FROM MALWARE, PHISHING ATTEMPTS, AND
OTHER MALICIOUS ATTACKS.
3. STRONG PASSWORDS
USE STRONG, UNIQUE PASSWORDS FOR ALL ONLINE ACCOUNTS
AND USE MULTI-FACTOR AUTHENTICATION WHEN POSSIBLE.
4. AUTHENTICATION
USE AUTHENTICATION SYSTEMS TO VERIFY THE IDENTITY OF
USERS BEFORE GRANTING THEM ACCESS TO SECURE
NETWORKS OR SYSTEMS
5. BE CAUTIOUS WITH EMAILS AND ATTACHMENTS
BE CAREFUL WHEN OPENING EMAILS OR ATTACHMENTS FROM UNKNOWN OR
UNTRUSTED SOURCES.
6. AVOID DOWNLOADING MALICIOUS CODE
AVOID DOWNLOADING FILES FROM UNSECURE OR PUBLIC WI-FI NETWORKS, AND
VERIFY THE LEGITIMACY OF DOWNLOAD SOURCES.
7. AVOID SUSPICIOUS LINKS
AVOID CLICKING ON LINKS IN EMAILS, POP-UPS, OR WEBSITES THAT APPEAR
SUSPICIOUS OR REDIRECT TO UNFAMILIAR DOMAINS.
8. ENDPOINT PROTECTION
USE ENDPOINT PROTECTION SOLUTIONS TO PROTECT CORPORATE DEVICES FROM
MALWARE AND MALICIOUS APPLICATIONS.
9. BLOCK POP-UP ADVERTISEMENTS.
POP-UP BLOCKERS DISABLE WINDOWS THAT COULD POTENTIALLY CONTAIN
MALICIOUS CODE. MOST BROWSERS HAVE A FREE FEATURE THAT CAN BE ENABLED TO
BLOCK POP-UP ADVERTISEMENTS.
10. AVOID USING PUBLIC WI-FI.
UNSECURED PUBLIC WI-FI MAY ALLOW AN ATTACKER TO INTERCEPT YOUR DEVICE'S
NETWORK TRAFFIC AND GAIN ACCESS TO YOUR PERSONAL INFORMATION.
NETIQUETTE
NETIQUETTE, OR INTERNET ETIQUETTE, IS A SET OF
GUIDELINES FOR ACCEPTABLE ONLINE BEHAVIOR. IT'S
IMPORTANT TO PRACTICE NETIQUETTE TO ENSURE
THAT YOUR ONLINE INTERACTIONS ARE RESPECTFUL
AND CONSIDERATE. THE TERM “N” MEANS NET OR
INTERNET AND “ETIQUETTE” MEANS CODE OF
CONDUCT. THE RULES OR PROTOCAL THAT GOVERN
THE USERS BEHAVIOUR WHEN INTERACTING ON THE
INTERNET WITH OTHERS CAN BE TERMED AS
NETIQUETTE. THE PROTOCOL OR CODE OF CONDUCT
FOR ACCEPTABLE ONLINE COMMUNICATION AND
BEHAVIOUR IS KNOWN AS NETIQUETTE. THE E-MAIL ,
ONLINE CHATTING AND NEWSGROUPS ARE THREE
RULES OR CODE OF CONDUCT OF
•
NETIQUETTE
BE RESPECTFUL: RESPECT OTHER PEOPLE'S PRIVACY AND TIME, AND DON'T
SHARE ANYTHING EMBARRASSING OR ILLEGAL.