Cyber Crime

In today’s digital world, people are trading convenience for privacy – which means they’re sharing more and more information about themselves. While we can all appreciate one-click checkouts and saved passwords, that mental “autopilot” can sometimes steer us wrong. While we were all once cautious of anyone asking for information about ourselves, now we assume that’s just the cost of participation – you ask for my favourite book, I give it to you. You show me my password has expired, I try to log in with the link you conveniently provided to me. You send me an email from my boss, you get my attention and response. But this autopilot is what cybercriminals and hackers are effortlessly turning into hundreds of millions of dollars every year from people like you and me all around the world. is defined as either a crime involving computing against a digital target or a crime in which a computing system is used to commit criminal offenses. As a broad category of crime, cybercrime includes such disparate sorts of activities as illegal access of data, use of computer communications to commit fraud, or the ransoming of systems via digital means.

It is the use of a computer as an instrument to further illegal ends, such as committing fraud , trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet , has grown in importance as the computer has become central to commerce, entertainment, and government. Cybercriminals are individuals or teams of people who use technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data, and generating profit.

Most common types of cyber crimes

Hacking – In simple words, hacking is an act committed by an intruder by accessing your computer system without your permission. Hackers are basically computer programmers, who have an advanced understanding of computers and commonly misuse this knowledge for devious reasons. They’re usually technology buffs who have expert-level skills in one particular software program or language. Some of the most famous computer geniuses were once hackers who went on to use their skills for constructive technological development.

Web Jacking – Web jacking derives its name from “hijacking”. Here, the hacker takes control of a web site fraudulently. He may change the content of the original site or even redirect the user to another fake similar looking page controlled by him. The owner of the web site has no more control and the attacker may use the web site for his own selfish interests. Cases have been reported where the attacker has asked for ransom, and even posted obscene material on the site.

Cyber stalking – Cyber stalking is a new form of internet crime in our society when a person is pursued or followed online. A cyber stalker doesn’t physically follow his victim; he does it virtually by following his online activity to harvest information about the stalkee and harass him or her and make threats using verbal intimidation. It’s an invasion of one’s online privacy.

Identity theft and credit card fraud – Identity theft occurs when someone steals your identity and pretends to be you to access resources such as credit cards, bank accounts and other benefits in your name. The imposter may also use your identity to commit other crimes. “Credit card fraud” is a wide ranging term for crimes involving identity theft where the criminal uses your credit card to fund his transactions.

Here are a few ways by which you can protect yourself from cyber crime

Keep software and operating system updated – Keeping your software system up to date ensures that you benefit from the latest security patches to protect your computer.

Use anti-virus software and keep it updated – Using anti-virus or a comprehensive internet security solution is a smart way to protect your system from attacks. Anti-virus software allows you to scan, detect and remove threats before they become a problem. Having this protection in place helps to protect your computer and your data from cybercrime, giving you piece of mind. If you use anti-virus software, make sure you keep it updated to get the best level of protection.

Use strong passwords – Be sure to use strong passwords that people will not guess and do not record them anywhere. Or use a reputable password manager to generate strong passwords randomly to make this easier.

Never open attachments in spam emails – A classic way that computers get infected by malware attacks and other forms of cybercrime is via email attachments in spam emails. Never open an attachment from a sender you do not know.

  • Do not click on links in spam emails or untrusted websites – Another way people become victims of cybercrime is by clicking on links in spam emails or other messages, or unfamiliar websites. Avoid doing this to stay safe online.

Do not give out personal information unless secure – Never give out personal data over the phone or via email unless you are completely sure the line or email is secure. Make certain that you are speaking to the person you think you are. Contact companies directly about suspicious requests If you get asked for data from a company who has called you, hang up. Call them back using the number on their official website to ensure you are speaking to them and not a cybercriminal. 

Be mindful of which website URLs you visit – Keep an eye on the URLs you are clicking on. Do they look legitimate? Avoid clicking on links with unfamiliar or spammy looking URLs. If your internet security product includes functionality to secure online transactions, ensure it is enabled before carrying out financial transactions online.

Keep an eye on your bank statements – Keep an eye on your bank statements and query any unfamiliar transactions with the bank. The bank can investigate whether they are fraudulent.

Let’s admit it. Our lives revolve around the internet – paying utility bills, booking movie tickets, shopping for anything and everything, getting married, finding love and even, making a social impact. But with cyber crimes like phishing and data theft on the rise, it pays to be safe than sorry. Though not all people are victims to cyber crimes, they are still at risk. Crimes by computer vary, and they don’t always occur behind the computer, but they executed by computer. The hacker’s identity is ranged between 12 years young to 67years old. The hacker could live three continents away from its victim, and they wouldn’t even know they were being hacked. Crimes done behind the computer are the 21st century’s problem. With the technology increasing, criminals don’t have to rob banks, nor do they have to be outside in order to commit any crime. They have everything they need on their lap. Their weapons aren’t guns anymore; they attack with mouse cursors and passwords.

Aishwarya Says:

I have always been against Glorifying Over Work and therefore, in the year 2021, I have decided to launch this campaign “Balancing Life”and talk about this wrong practice, that we have been following since last few years. I will be talking to and interviewing around 1 lakh people in the coming 2021 and publish their interview regarding their opinion on glamourising Over Work.

If you are interested in participating in the same, do let me know.

Do follow me on FacebookTwitter  Youtube and Instagram.

The copyright of this Article belongs exclusively to Ms. Aishwarya Sandeep. Reproduction of the same, without permission will amount to Copyright Infringement. Appropriate Legal Action under the Indian Laws will be taken.

If you would also like to contribute to my website, then do share your articles or poems at adv.aishwaryasandeep@gmail.com

We also have a Facebook Group Restarter Moms for Mothers or Women who would like to rejoin their careers post a career break or women who are enterpreneurs.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.