Todays world has become a parallel form
of life and living.Here Public are now capable of doing things which were not
imaginable few years ago. Internet has enabled the use of website communication
and a lot of anytime anywhere the IT solutions for the betterment of human
kind. Cyber crime is a very serious threat. Governments, police departments and
intelligence units have started to react cyber threats. In this paper, we will
try to discuss about cybercrime in detail including the types, methods,
technical reasons and adverse impact of cyber crimes on a network as well as
the behavior , psychology behind this crime & some effective solutions .

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

 Introduction :

Crime  have been associated with mans  fall.1 This Crime remains elusive and ever
strives to hide  in the face of
improvement. Different nations have different strategies to contend with crime
depending on their nature and extent. It has leaves a negative social and
economic consequence. Cybercrime is a crimes committed on the internet using
the computer as either a tool or a targeted victim. It is very difficult to
classify crimes in general into distinct groups as many crimes involves on a
daily basis.  In the real world, crimes
like hacking, murder or theft need not  necessarily
be separate.  All cybercrimes involve
both the computer and the person behind it as victims. For example, hacking
involves attacking the computer’s data . It is important to take note that
cyber crime occurs in many cases and it is not possible to classified a
appropriate classification system.

Cyber Crime :

Cyber crime
is the latest  the most complicated
problem in the cyber world. “Cyber crime  said to be those species, of which, genus is
the daily crime, and where either the computer is a subject of the conduct
conventional crime”. “Any criminal operation that uses a computer  target or a means for enternalize further
crimes comes within the of cyber crime” . The computer may be used as a
instrument in the following kinds of activity- financial crimes, pornography,
online gambling,hacking, computer information hacking crime, email spoofing,  cyber defamation, cyber stalking. The computer
may however be  act the following cases-
unauthorized access to  computer
networks,and the information contained in the electronic form, data didling,
salami attacks,  web jacking, theft of
computer system, physically damaging the computer system.

for Cyber Crime :


are many technical reasons behind these crimes. The threats of cybercrime to the
network security are not only for several organizations, but can be observed
all over the world in

different countries Some technical reasons behind cyber crimes are as follows:

Lack of reporting and standards3

Tough to identify3

Limited media coverage.3

Least marginal cost of online activity due to global  reach.3

A very few rate of Official investigation and criminal

Capability of computer to store data in comparatively small

Easy to access4

Complexities in operating systems code4

Lake of evidence4


Loopholes in systems5


Criminals :

  The cyber criminals constitute of various groups/ category.
This division may be justified on the basis of the object that they have in
their mind. The following are the category of cyber criminals

1. Children and adolescents between the age group of 6 –
18 years :The simple reason for this type of offender behaviour pattern in
children is seen mostly due to the curiousity to know and search the
things.  Other akin reason may be to
prove themselves to be outstanding amongst other children in their group.

2. Organised hacker: These kinds of hackers are mostly
organic together to fulfil certain objective. The reason may be to fulfil their
political bias, superstition, etc. The Russian are said to be one of the best
quality hackers in the world..  The NASA
as well as the Microsoft sites is always under attack by the hackers.

3. Professional hackers / crackers  Their work is inspires  by the colour of money. These kinds of hackers
are mostly employed to hack the site of the competing and get credible,
reliable and valuable information. Further they are ven employed to damage the
system of the employer basically as a measure to make it safer by discover the

Different types of
cyber crime:

Fraud and
financial criminal:

Computer fraud is any dishonest misrepresentation of fact intended
to let another to do or refrain from doing something which causes loss. In this
context, the fraud will result in obtaining a benefit by:

Altering in an
unauthorized way. This requires little technical expertise and is common form
of theft by employees altering the data before entry or entering false data, or
by entering unauthorized instructions or using unauthorized processes;

destroying, suppressing, or stealing output, usually to conceal unauthorized
transactions. This is difficult to detect;

Altering  stored data;



This kind of
an attack entangle altering raw data just before a computer processes it and
then changing it back after the processing is completed. The electricity board
faced similar problem of information diddling while the department was being


of Service attack: The computer of the oblation is
flooded with more requests than it can handle which cause it to crunch.
Distributed Denial of Service

attack is also a type of denial of service attack, in which the criminals are
wide in number and widespread. E.g. Amazon, Yahoo.


 This term Web jacking is derived from the term
hi jacking. In these kinds of crime the hacker gains access and control over
the web site of another. The hacker may even mutilate or change the information
on the site.8  This  occurs  political objectives or for money. Here
recently the site of MIT (Ministry of Information Technology) was hacked by the
Pakistani hackers and some obscene matter was placed therein.25 After that
the site of Bombay crime branch was also web jacked.5 There are Another case
of web jacking is that of the ‘gold fish’ case. In this web jacking case the
site was hacked and the data pertaining to gold fish was changed. Thus the web
jacking is a process whereby control over the site of another is made backed by
some consideration for it.2


As technology advances huge people rely on the internet to
store sensitive information such as banking or credit card information,
criminals are going to attempt to steal that information. Cyber-crime is a
great threat to people across the world. Raising awareness about how
information is being protected and the tactics criminals use to steal that
information is very important today. According to the FBI’s Internet Crime
Complaint Center occurs in 2014 there were 269,422 complaints filed.4 With
all the claims combined there were a reported total loss of $800,492,073.6But
yet cyber-crime never seem to be on the average person’s radar. There are more
than 1.5 million cyber-attacks annually, that means that there are over 4,000
attacks a day, 170 attacks every hour, or nearly three attacks every minute,
with studies showing us that only 16% of victims were carrying out the attacks
to stop.5 Anyperson who uses the internet for any reason can be a
victim,  it is important to be aware of
how one is being fully protected while online.7


Prevention of Cyber

We know
that  Prevention is always better than
cure.  We should keep in mind the
following things.

For prevent cyber stalking avoid disclosing any information pertaining to
one self. This is as good as disclosing anyones identity to strangers in public

It is urgent to avoid sending any photograph online particularly to
strangers and chat friends as there have been incidents of misuse of the

Everyone must use latest and update antivirus software to guard against
virus attacks.

 It is necessary always keep back
up volumes so that one may not suffer data loss in case of virus contamination

 Never send someones credit card
number to any site that is not secured, to guard against frauds.

 Always keep a watch on the sites
that  children are accessing to prevent
any kind of harassment  of children.

At last  It is better to use a
security programme that gives control over the cookies and send information
back to  the site as leaving the cookies


Human minds
capacity is ambigious.It’s also true that It is not possible to extract cyber
crime . But It is quite possible to check them. Technology acting to make this
crime more effective to battle cyber crime.  We can not think our daily life without
computer as well as internet. The advantages of internet and computer can not
be explained in one word. But they have also some fault as like cyber crimes.
Its also became a part of our life. Criminals and victims both are the part of
our society. Now, the rate of various types of cyber crimes increases rapidly.
It must be reduced by keeping proper steps that’s are already discussed in this
paper for keeping safe our personal and private data and information ,ensure
the security of all types of websites and making our  society clean & peaceful.

Written by

I'm Colleen!

Would you like to get a custom essay? How about receiving a customized one?

Check it out