Cyber crime is criminal
activity done using computers and the Internet. This includes anything from
downloading illegal music files to stealing millions of dollars from online
bank accounts Cyber criminals may use
computer technology to access personal information, business trade secrets or
use the internet for exploitive or malicious purposes. In modern society it is
a curse. Cyber crimes have a great
impact on our society and personal life.
History of Cyber crime:
1. The first recorded cyber crime
took place in 1820.
2. The first spam email took place
in 1976 when it was send out over the ARPHNT.
3. The first virus was installed on an apple computer in
1982 when a high school student , Rich skrenta , developed the EIK cloner.
Different type of Cyber
Causes of Cybercrime:
Cyber criminals always opt an
easy way to make big money. They target rich people or rich organizations like
banks, casinos and financial firms where a huge amount of money flows daily and
hack sensitive information. Catching such criminals is difficult. We could list
following reasons for the vulnerability of computers:
Easy to access:
The problem behind
safeguarding a computer system from unauthorized access is that there are many
possibilities of breach due to the complex technology. Hackers can steal access
codes, retina images, advanced voice recorders etc. that can fool biometric
systems easily and bypass firewalls can be utilized to get past many security
Capacity to store data in
comparatively small space:
The computer has the unique
characteristic of storing data in a very small space. This makes it a lot
easier for the people to steal data from any other storage and use it for own
The computers run on
operating systems and these operating systems are programmed of millions of
codes. The human mind is imperfect, so they can do mistakes at any stage. The
cyber criminals take advantage of these gaps.
is one of the characteristics in human conduct. So, there may be a possibility
that protecting the computer system we may make any negligence which provides a
cyber-criminal the access and control over the computer system.
Loss of evidence:
The data related to the crime
can be easily destroyed. So, Loss of evidence has become a very common &
obvious problem which paralyzes the system behind the investigation of
How to Preventive
Use Strong Passwords:
Use the different password
and username combinations for different accounts and resist the temptation to
write them down.
Be social media savvy:
Be sure to keep your social
networking profiles (Facebook, Twitter, YouTube, etc.) are set to private. Be
sure to check your security settings. Be careful of what information you post
online. Once it is on the Internet it is there forever.
Secure your Mobile Devices:
Many people are not aware
that their mobile devices are also vulnerable to malicious software, such as
computer viruses and hackers. Be sure to download applications only from
trusted sources. It is also crucial that you keep your operating system
up-to-date. Be sure to install anti-virus software and to use a secure lock
screen as well. Otherwise, anyone can access all your personal information on
your phone if you misplace it or even set it down for a few moments.
Protect your data:
Protect your data by using
encryption for your most sensitive files such financial records and tax returns.
Protect your identity
When it comes to protecting
your identity online it is better to be too cautious than not cautious enough.
It is critical that you be cautious when giving out personal ID such as your
name, address, phone number and/or financial information on the Internet. Be
certain to make sure websites are secure when making online purchases, etc.
This includes enabling your privacy settings when using/accessing social
Protect your computer with
types of security software are necessary for basic online security. Security
software essentials include firewall and antivirus programs. A firewall is
usually your computer’s first line of defense. It controls who and what can
communicate with your computer online. You could think of a firewall as a sort
of “policeman” that watches all the data attempting to flow in and out of your
computer on the Internet, allowing communications that it knows are safe and
blocking “bad” traffic such as attacks from ever reaching your computer.
Software piracy means
unauthorized copying of software. It is one of the most prevalent computer
crimes in the world. Software piracy can
be done by copying, downloading, sharing, selling or installing multiple copies
of software onto personal or work computers.
Main Reason of Software
Softlifting is the act of
illegal copying of software and distributing it to friends, organi-sations or
duplication and resale in violation of the terms of the license agreement. Many
personal users and enterprises are doing it knowingly or unknowingly. Such activities lead software industry to lose
billions of dol-lars each year and shatter the profitability of large software
companies as well as small ones.
Nowadays, Internet piracy is
one of the fastest and easiest ways to receive pirated software. There are several websites that make software
available for free download in a number of ways. Many computer users download software from the Internet, which makes
their lives easy as they do not even need to visit stores or sending out copies
of software on a CD-ROM or floppy disk.
Hard-disk loading occurs when
an individual or company sells computers preloaded with illegal copies of
software into the hard disks to encourage the consumer to buy their products.
Software counterfeiting is
illegal duplication and sale of copyrighted software in such a way that it
appears to be authentic. Counterfeit software includes accompanying manuals
that the original legitimate software was sold and is usually sold at prices
well below that of the retail price of the legitimate software.
Lack of awareness in proper
use of software is considered to be the key point influenc-ing software piracy.
High price of software:
oftware products developed in
economically rich countries are generally not affordable in poorer countries.
The econ-omy of any country has a strong correlation with the piracy rates.
awareness and education:
Awareness and education have
always been key factors in promoting the value of software and its legal use.
Without any proper education and intervention, computer users might not
consider downloading or copying the software programs wrong.
Understanding proper use
of software and the law:
Understanding proper use of
software and the law In general, it is a true fact that an individual?s
attitudes towards piracy are directly related to the level of punishment.
Mostly, people think that when they purchase any
software product, they become the owner of the software and they can do
anything with the software such as making multiple copies and distributing it
to others. This behaviour is against the copyright act as they are only
purchasing the right to use the software under some restrictions imposed by the
software publisher. Misuse of software without any authorization from the
copyright holder is theft of intellectual property. Many international treaties
had been made to protect the software.
Copyright protection of
Software is protected under
the copyright law. The owner of the software determines the licenses for the
use and distribution of his/her resources. The licenses dictate the proper
uses, number of uses and the length of period until the licenses expire.
Software licensing is the
procedure that specifies the general terms and conditions, and allows an
individual or group to use any software with the agreement specified by
software publishers. There are different types of licenses that software
publishers or manufacturers use to distribute their software.
Cyber crime is curse in our
modern world. We should take step hurry up for this problem Otherwise our
modern world facing a great problem. . We should strong our all type of cyber
Security system for prevent cyber crime.
Public awareness should be
raised about bad effect of cyber crime.