Identification of the issues
Discuss About The Forensic Dependencies Barriers To Justice.
Cybercrime or a crime done by making use of a computer mainly includes a computer and a network. In this type of crimes a computer might be used for the purpose of commissioning a crime or to target a computer. So cyber-crime can be defined as “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including but not limited to Chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)” [1]. Cybercrime is associated with threatening a particular person or the security of a total nation or any other type of vital information stored online. The individuals associated with cybercrime are known as cyber criminals and they generally makes use of the computer technology in order to get access to the personal information or secrets related to business or trade. They might also make use of the internet in order to perform malicious and exploitive activities. Cybercriminals are often called hackers.
Cybercrime can be of different types like online theft of banks, theft of identity, online predatory crime and many more. One of the major cybercrime is cyber terrorism which is a significant concern. A wide range of activities are encompassed by the cybercrime. The major issues includes the hacking which is the process of cracking into a system followed by gaining or unauthorized access to the data which are stored in the system. Cyber-squatting is another issue related to cybercrime. Cyber-squatting can be defined as an act by the cybercriminals where they register a famous domain name and then they sale it later. This is a severe issue which has not been tackled even by the IT Act 2000. Phishing is another issue where the cyber criminals try to fool the common people and make them pay for something. Cyber Stalking is another issues where the internet or other electronic devices are used for the purpose of stalking someone [2]. This generally involves harassing or threatening behaviors. The next issue is the Vising. This is an issues where the criminals are associated with practicing the use of social engineering and the voice over IP in order to gain access of the important information from the public in for various type of financial rewards. Other major issues includes the Trojan horse (this is an unauthorized function which is associated with functioning from inside and seems to be an authorized program), internet time theft (this means the hackers use the internet and someone else has to pay for that usage), web jacking (this happens when a website is forcefully taken by someone else), click jacking (this is a form of cyber-attack where the attacker is associated with the usage of an invisible layer over any embedded layer) and many more.
Systematic analysis
Cyber-crime includes various type of activities. Once the crimes only included the fundamental breaches of the private or the corporate privacy which mainly included the assaults on the integrity of information which are stored in different digital storage facilities along with the use of eth information which are obtained illegally in order to blackmail a firm or a particular individual. Cybercrime is generally broken down into two categories and this mainly includes the “crimes which targets a computer network or a device” and “crimes which uses the computer network to make advances in the various criminal activities”. The crimes related to the targeting of the computer network or devices mainly includes the use of virus and Denial-of-service attacks [3]. Whereas in the crime related to the usage of the computer network mainly includes the cyber stalking, phishing and fraud and many more. Another part of this type of crime involves individuals within corporations or government bureaucracies’ deliberately altering data for either profit or political objectives. At the other end of the spectrum are those crimes that involve attempts to disrupt the actual workings of the Internet.
Form the research it can be concluded that there exists several type of cybercrime and the types have been listed below:
Hacking: This is process by which the unauthorized person known as the hackers attempts to gain an access to the information system. This is considered as a crime because it includes intrusion to the system without any kind of authorization [12].
Cyber-Stalking: This is the crime which is associated with harassing someone by making use of the internet. The main behaviors included in this type of crime are false accusations, threats and many more. This type of crime involves the following of someone’s movement across the internet which is mainly doe by posting of messages on the bulletin boards which are frequently used by the victim and many more places [4].
Spamming: This can be considered as another form of cybercrime which is associated with sending of bulk unsolicited ad commercial messages over the internet. This is very irritating but this is not illegal unless and until it causes any type of damage such as overloading of the network, disruptive service and many more [11].
Cyber-Pornography: This is crime where the main victims are the women and the children. In this type of crime the pedophiles are associated with sending of illegal photos of child pornography to targeted children in order to attract them towards all this [5].
Research finding and recommendations
Phishing: This is the process which mainly involves the acquiring of sensitive information that mainly includes the username, password and many more. This is mainly done by the hackers by disguising themselves as the authorized and trustworthy entity in communications which are performed by means of electrical medium [10].
Software Piracy: This mainly includes the delivering of illegal software for personal as well as for business use. The original software’s are copies which results in the violation of the copy right and the license agreement [6].
Money Laundering: This is the crime which involves the moving of the illegally acquired cash by financial as well as other systems in order to make it look like a legal transaction [9].
Corporate Espionage: This is the crime that involves the theft of the trade related secrets by adaptation of illegal ways like the wire taps, illegal intrusions and many more [7].
Besides the above mentioned categories there also exists other type of cybercrimes like the sniffing of passwords, spoofing, money frauds, web jacking and more. But there exists certain ways by which all this type of crimes can be mitigate [8]. There is one famous saying which stated that prevention is much better than cure. Adaptation of certain preventive measures while using the internet is very much necessary. The recommended steps in order to mitigate the risks have been listed below:
- Cybercrime like cyber stalking can be prevented if the user makes it sure that none of the private information is being disclosed.
- Avoidance of sending of pictures and videos online particularly to someone who is totally unknown as well as to online friends can be a good preventive measure against misuse of information.
- Use of latest as well as updated antivirus can help in guarding against threats related to the virus attack.
- Sending of credit card details should not be done to prevent against any kind of frauds.
- The sites should be watched that are being used by the children’s in order to prevent any kind of harassments and depravations of the children.
- Security programs should be used which helps in providing control over the cookies and is also associated with sending of information back to the site. This is to be done because leaving of cookies unguarded might lead to fatal effects.
- Traffics should be watched by the website owners along with checking for any type irregularity. Putting host-based intrusion detection devices on servers can be very much helpful.
- Use of firewall is very much beneficial.
Conclusion:
The above disused topics helps in concluding to the fact the cybercrime is increasing day by day. It is not possible to eliminate the cybercrime from cyber space. It is quite possible to take preventive measures and keep a check on it. From the past, it is evident that no regulation has ever succeeded in eliminating crime completely from the world. The only possible step is to make people aware of cybercrime. We would conclude with that the fact that the users should be cautioned regarding the use of cyber space and should keep in mind that the provisions of the cyber law are not so rigorous that they may control the growth of the IT industry and prove to be detrimental. The government still has an important role to play, but most of the prevention needs to be done by commercial entities producing software and those with the ability to stop fraud.
References:
Taylor RW, Fritsch EJ, Liederbach J. Digital crime and digital terrorism. Prentice Hall Press; 2014 Mar 8.
Halder D, Jaishankar K, Jaishankar K. Cyber crime and the victimization of women: laws, rights and regulations. Information Science Reference; 2012.
Broadhurst R, Grabosky P, Alazab M, Bouhours B, Chon S. An analysis of the nature of groups engaged in cyber crime.
McGuire M, Dowling S. Cyber crime: A review of the evidence. Summary of key findings and implications. Home Office Research report. 2013 Oct 9;75.
Hassan AB, Lass FD, Makinde J. Cybercrime in Nigeria: Causes, effects and the way out. ARPN Journal of Science and Technology. 2012 Aug;2(7):626-31.
Sindhu KK, Meshram BB. Digital forensics and cyber crime datamining. Journal of Information Security. 2012 Jul 25;3(03):196.
Brown CS. Investigating and prosecuting cyber crime: Forensic dependencies and barriers to justice. International Journal of Cyber Criminology. 2015 Jan 1;9(1):55.
Lagazio M, Sherif N, Cushman M. A multi-level approach to understanding the impact of cyber crime on the financial sector. Computers & Security. 2014 Sep 1;45:58-74.
Saini H, Rao YS, Panda TC. Cyber-crimes and their impacts: A review. International Journal of Engineering Research and Applications. 2012 Mar;2(2):202-9.
Weissbrodt D. Cyber-conflict, Cyber-crime, and Cyber-espionage. Minn. J. Int’l L.. 2013;22:347.
Aggarwal P, Arora P, Ghai R. Review on cyber crime and security. International Journal of Research in Engineering and Applied Sciences. 2014;2(1):48-51.
Anderson R, Barton C, Böhme R, Clayton R, Van Eeten MJ, Levi M, Moore T, Savage S. Measuring the cost of cybercrime. InThe economics of information security and privacy 2013 (pp. 265-300). Springer, Berlin, Heidelberg.