close

Would you like to switch to the app ?

Download Folkspaper App

BULLETIN

Write paid content? Upgrade to Premium!

What is Cyber Crime in India? Types of Cyber Crime How to Prevent from cyber crime?

  • tag_faces 0
    1. 0
    2. 0
    3. 0
    4. 0
  • 0
  • tag_facesReaction
  • Tip Bones

What is Cyber Crime in India? Types of Cyber Crime How to Prevent from cyber crime?

Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrime may threaten a person or a nation's security and financial health.

There are many privacy concerns surrounding cybercrime when confidential information is intercepted or disclosed, lawfully, or otherwise. Debarati Halder and K. Jaishankar further define cybercrime from the perspective of gender and defined 'cybercrime against women' as "Crimes targeted against women with a motive to intentionally harm the victim psychologically and physically, using modern telecommunication networks such as internet and mobile phones". Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Cybercrimes crossing international borders and involving the actions of at least one nation-state is sometimes referred to as cyberwarfare.

A report (by McAfee), published in 2014, estimated that the annual damage to the global economy was $445 billion. Approximately $1.5 billion was lost in 2012 to online credit and debit card fraud in the US. In 2018, a study by the Center for Strategic and International Studies (CSIS), in partnership with McAfee, concludes that close to $600 billion, nearly one percent of global GDP, is lost to cybercrime each year.

There are Multiple Types of Cyber Crime:

1. Phishing Attack

Phishing is a type of attack where actors attempt to trick unsuspecting users into doing something they wouldn’t ordinarily do, such as clicking on a malicious URL or email attachment. Actors usually leverage phishing attacks to steal users’ login credentials, details which they can then abuse to gain unauthorized access to their victims’ emails or financial accounts.

How to Protect against Phishing

Users can protect themselves against phishing by exercising caution around suspicious links or email attachments. They should also be on the lookout for other tell-tale signs of a phishing scam, like frequent grammar or spelling mistakes in what might seem to be an official piece of correspondence from a bank or other institution.

2. Ransomware Attack

Ransomware is a subset of crimeware that in most cases infects a victim’s computer via phishing attacks or an exploit kit campaign. Upon successful infection, the ransomware commonly encrypts the victim’s data. It then demands a ransom payment in exchange for the return of their data. But that’s not set in stone. There are no guarantee victims will ever get their data back.

In addition to following the anti-phishing steps laid out above, users should formulate a data recovery plan for their computers. Such a program will help ransomware victims recover their data for free if they ever experience an infection. As part of that plan, users should in the very least maintain two local backups to which they copy their data regularly.

For more:- https://www.factskamaza.online/2020/06/Cyber-Crime.html

Comments

Loading...