Cybercrime - Types and Prevention

Cybercrime is becoming one of the world's most important concerns in the world. This involves illegal access to and breach of security such as data privacy, password, etc. It denotes stealing using computers or the Internet. Cyber theft is part of cybercrime.

Identity theft, password theft, theft of information, and internet time theft are the most prevalent kinds of cyber theft.

Identity Theft

Theft of identity refers to the illicit collection of personal data that determine your identity for financial advantage. Cyber robbery is the most prevalent kind. Whether the fraud victim is living or deceased, identity robbery can take place. 

Sending a false account or a fake person by creating several email messages has become commonplace, leading to fraud to get information that cybercriminals may use for seizing the identity of the victims to conduct countless crimes. 

It is considerably easier to monitor the person who impersonates Internet and internet transactions since technological advances have made things easier.

Data theft may be performed and personal information can be obtained from electronic devices in several ways. The following are: -

• Hacking

People known as hackers breach the information of any other computer system unscrupulously. Section 66 addresses the violation and defines non-authorized computer access as "Anyone who intends to cause or destroy, erase or change information in a public or a computer of a given person for the purpose and/or intention of doing so. 

Decrease its usefulness, values or damage it by any means by committing hacking." 
The crime of hacking is a breach of a constitutionally established basic right to privacy.

This approach is used to distribute data from another computer system via viruses or worms like malware to the hackers, who either use it for themselves or provide it to others after acquiring information, to commit fraud utilizing this information.

  • Phishing

It utilizes false email messages or virus-containing websites.
These infected websites encourage individuals to input their personal information, such as login and account information.

  • E-Mail/SMS Spoofing

The spoofed e-mail indicates a different origin than the origin of the e- Mail. When you spoof SMS, you steal another person's identity via the telephone number and send text messages through the Internet and the receptionist takes the text from the victim's mobile number.

  • Carding

cyber thieves use debit and credit cards illegally to take money from an individual's bank accounts.

  • Vishing

The cyber-criminal phones the victim by acting as a bank representative or call center representative and thereby fools them into disclosing important personally identifying information.

Theft of Internet Time

It refers to the theft of internet hours payable by another individual by an unauthorized person. You obtain access either by hacking or illegally without the knowledge of that individual to an ISP user ID and password of another person.

Intellectual Property Theft

Theft of intellectual property is described as theft of copyrighted content, robbery of commercial secrets and trade-mark infringements, etc. Falsified products and piracy are one of the best recognized and most dangerously known consequences of IP theft.

Identity Laws rob Indian People

There are two phases to the crime of identity theft:

• False compilation of an individual's identification
• False use of such information to legally harm such data

Identity theft includes theft as well as fraud, and therefore, in conjunction with the information technology act, 2000, the laws relating to forgery as provided for under the Indian Penal Code of 1860 (IPC) are commonly used. 

Certain IPC sections such as falsification (Section 464), fake documents (Section 366), fake documents (Section 468), reputation (Section 479), and the possession of a document known to be forged and intended to use as a genuine document (Section 474) can also be combined with those contained in the IT Act. IPC's Sections include forgery, faked forgery (Section 572)

The IT Act of 2000 (IT Act) is the key act dealing with cyber offenses law in India. Some of the sections dealing with cyber theft are: -

Section 43 

Where someone is obliged to pay compensation to the person concerned without the owner's authorization, computer damages, etc.

Section 66 

In the event of any conduct referred to in section 43 being carried out by someone, dishonestly or fraudulently, he or she shall punish him or her with imprisonment for three years or a fine of up to five or both lakh rupees.

Section 66B

The penalty of getting a robbed computer resources or communication equipment dishonestly is imprisonment for a time extendable to three years or fined extending to one lakh or both of the lakh rupees.

Section 66C Punishes for Identity Theft 

anybody who uses an electronic signature, password or any other unique identification feature of a person fraudulent or dishonest is penalized by imprisonment for a time that can extend to 3 years and is subject to fines of one lakh of rupees.

On the other hand, Section 66 D was introduced to penalize cheating utilising computer resources

As fraud and cyber-related crimes rise, the government is developing improved rules that defend the people's interests and shield them from Internet mishaps. 

Furthermore, tougher legislation has been established in the hands of intermediaries and service providers (business entities) to safeguard 'sensitive personal data,' therefore assuring data protection and privacy.

Written By - Riduvarshini
Edited By - Akash Verma

Post a Comment