Internet and Mobile phone related Cybercrimes includes traditional activities such as fraud, theft or forgery, whenever a telecommunication system is involved .The word Cyber is derived from the Greek word Kubernetes meaning Steersman. It is used in the terms cybersex, cybernetics, cyberspace, cyberpunk, cyber homes and cyber hate, but has been largely surpassed by e- .It is used in the computer or electronic context to denote the control of the thing represented by the word it follows.
The various forms of Cyber crime are
1. Internet auction fraud– Making Fake auction through Internet
2. Internet service provider fraud– Fake websites
3. Fraudulent web designing – Designing Fake or Mocked websites
4. Multilevel marketing fraud– Fraudulent marketing of commercial items
5. Health care fraud-Fake advertisements about health care products
6. Mobile phone fraud– Use of mobile phones for fraudulent activities
2. Internet service provider fraud– Fake websites
3. Fraudulent web designing – Designing Fake or Mocked websites
4. Multilevel marketing fraud– Fraudulent marketing of commercial items
5. Health care fraud-Fake advertisements about health care products
6. Mobile phone fraud– Use of mobile phones for fraudulent activities
Computer and Mobile network intrusion
Hackers use programmes to intrude into the internet or mobile phone.
Various network intrusions are
1. Password Sniffer– Programmes that monitors and record the name and password of network users as they log in.
2. Spoofing– One computer is electronically’ looks like’ another computer to gain access.
3. Cyber fraud – Stock manipulation, fraudulent business opportunities, web auctions, credit card fraud.
4. Cyber stalking -Sending harassing or threatening e –mail or unwanted files and obscene messages or images. Stalkers generally lose interest if they don’t get the reactions they seek.
5.Cyber terrorism – Use of computers or mobile phones or programmes in attack against others. It is a form of ‘Info war”.
6.Computer sabotage – Use of internet to hinder the normal functioning of a computer through the introduction of worms, viruses logic bombs etc.
7.Mail Bombs – Software that will instruct a computer to do almost anything so that it will send mails for the tracker.
8.Credit card fraud – Hacking of credit card pin number to withdraw money.
9.Identity theft – Theft of one’s identity for criminal use.
10.Phishing – Introduction of Malicious codes into links .E.g. Spoofed Bank web sites
11.Pharming – Program that direct the user to another Mocked link.
12.Vishing – Vishing is a combination of Voice and Phishing that uses Voice over Internet Protocol VoIP technology wherein fraudsters feigning to represent real companies such as banks attempt to trick unsuspecting customers into providing their personal and financial details over the phone.
13.Skimming– Skimming is a method used by fraudsters to capture your personal or account information from your credit card. Your card is swiped through the skimmerand the information contained in the magnetic strip on the card is then read into and stored on the skimmer or an attached computer.
14.Money Mule – Once the fraudster has captured personal information using anyone of the ways mentioned above, they need an account to which they can transfer funds from the compromised account. This is where a “Money Mule” comes into picture. A Money Mule is an unwitting participant in the frauds who is recruited by fraudsters to launder stolen money across the globe.
2. Spoofing– One computer is electronically’ looks like’ another computer to gain access.
3. Cyber fraud – Stock manipulation, fraudulent business opportunities, web auctions, credit card fraud.
4. Cyber stalking -Sending harassing or threatening e –mail or unwanted files and obscene messages or images. Stalkers generally lose interest if they don’t get the reactions they seek.
5.Cyber terrorism – Use of computers or mobile phones or programmes in attack against others. It is a form of ‘Info war”.
6.Computer sabotage – Use of internet to hinder the normal functioning of a computer through the introduction of worms, viruses logic bombs etc.
7.Mail Bombs – Software that will instruct a computer to do almost anything so that it will send mails for the tracker.
8.Credit card fraud – Hacking of credit card pin number to withdraw money.
9.Identity theft – Theft of one’s identity for criminal use.
10.Phishing – Introduction of Malicious codes into links .E.g. Spoofed Bank web sites
11.Pharming – Program that direct the user to another Mocked link.
12.Vishing – Vishing is a combination of Voice and Phishing that uses Voice over Internet Protocol VoIP technology wherein fraudsters feigning to represent real companies such as banks attempt to trick unsuspecting customers into providing their personal and financial details over the phone.
13.Skimming– Skimming is a method used by fraudsters to capture your personal or account information from your credit card. Your card is swiped through the skimmerand the information contained in the magnetic strip on the card is then read into and stored on the skimmer or an attached computer.
14.Money Mule – Once the fraudster has captured personal information using anyone of the ways mentioned above, they need an account to which they can transfer funds from the compromised account. This is where a “Money Mule” comes into picture. A Money Mule is an unwitting participant in the frauds who is recruited by fraudsters to launder stolen money across the globe.
Internet Hacking
How to escape from these frauds
1. Stay anonymous- choose a genderless user name
2. Never give name or full address to strangers
3. Don’t respond to harassing or negative messages
4. Avoid uncomfortable situation quickly
5. Watch what you say- don’t flirt online
6. Learn more about internet privacy
7. Don’t give email ID to strangers
8. Frequently change your password and answer to the ‘secret question’ of email created.
9. Don’t disclose your password to any one, not even to your friends
10. Don’t hesitate in filing a complaint with the police if there is any cyber fraud
2. Never give name or full address to strangers
3. Don’t respond to harassing or negative messages
4. Avoid uncomfortable situation quickly
5. Watch what you say- don’t flirt online
6. Learn more about internet privacy
7. Don’t give email ID to strangers
8. Frequently change your password and answer to the ‘secret question’ of email created.
9. Don’t disclose your password to any one, not even to your friends
10. Don’t hesitate in filing a complaint with the police if there is any cyber fraud
IT Act 2008- India
Computer Related Offences
If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both.
If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both.
IT Act Section 66 A- India
Punishment for sending offensive messages through communication services such as internet and mobile phones. Any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages.
IT Act Section 66 E- India
Punishment for violation of privacy:
Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both
Punishment for violation of privacy:
Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both
IT Act Section 67- India
Punishment for publishing or transmitting obscene material in electronic form:
Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons.
Precautions
• Do not allow others to click photos without your permission
• Do not reply to sms(short messaging service) and mms(multimedia messaging service)from strangers
• Do not send obscene text or images though mms
• Do not give your numbers to strangers while chatting online
• Do not keep the Bluetooth open to all
• Do not give mobile to unauthorized service centre to avoid ‘Cloning”. They may multiply the images or video.
• Use security pin code of mobile phone to avoid misuse
• Do not share your photos to strangers to avoid misuse such as Morphing
• Do not reply to sms(short messaging service) and mms(multimedia messaging service)from strangers
• Do not send obscene text or images though mms
• Do not give your numbers to strangers while chatting online
• Do not keep the Bluetooth open to all
• Do not give mobile to unauthorized service centre to avoid ‘Cloning”. They may multiply the images or video.
• Use security pin code of mobile phone to avoid misuse
• Do not share your photos to strangers to avoid misuse such as Morphing
Chat Rooms
• Take extreme care during online chatting and browsing blogs and web pages. Hackers are waiting for you.
• Do not reply to anonymous messages and do not give mail ID or full address in such web pages
• Use a genderless login name
• Frequently change passwords
• Do not go to links if you feel it is fake
• Don’t reply to money offers through mails. They will hack your details.
• Do not reply to anonymous messages and do not give mail ID or full address in such web pages
• Use a genderless login name
• Frequently change passwords
• Do not go to links if you feel it is fake
• Don’t reply to money offers through mails. They will hack your details.
Filed Under: Electronic Projects
Questions related to this article?
👉Ask and discuss on EDAboard.com and Electro-Tech-Online.com forums.
Tell Us What You Think!!
You must be logged in to post a comment.