For many years, it has been standard practice to treat diabetic foot ulcers with a combination of any of the following: appropriate wound dressing; offloading; antibiotics; and improving the blood supply. The best way of offloading the foot is, however, uncertain. In addition, whilst there are widely respected guidelines available on treating infection, the choice of antibiotics is also hotly debated, and relies on local sensitivities, the availability of antimicrobial agents and frequently, local microbiologist preferences. Revascularization is dependent on local availability; non-invasive techniques such as angioplasty are often only available in specialist centers, meaning that many units in low-resource environments do not have access to this procedure, let alone a vascular surgeon. Even after effective treatment, relapse probability is 70%, which frequently leads to amputation.
Get original essayWith this background, newer aspects of the care and management of the diabetic foot are emerging. Martha Clokie and Alice Greenway discuss the impact of newer technologies on the identification of the organisms present in an ulcer, as well as novel approaches to treating infections. Keith Harding and Nia Jones also discuss newer technologies, in particular, various uses of remote sensing, that may help in the early detection of tissue damage, thus allowing more timely intervention to prevent ulceration developing. (Jan aw, Khan H; 2016)
The diagnosis of most diabetic foot ulcers is based on the presence of clinical signs and symptoms. Most frequently, tissue biopsy and ulcer fluid aspirates are sent for culture-based identification. Less invasive swabbing from the base of the ulcer is also used to detect surface-associated bacteria but does not detect bacteria associated with deeper structures. The use of non-culture-based molecular microbiological techniques to characterize foot infection microbiota could significantly enhance our understanding of the composition and abundance of the infection and guide effective antimicrobial selection. These techniques have the advantage over culture-based approaches because they are not dependent on the cultivability of the bacteria. This is particularly pertinent for diabetic foot ulcers, which are typically colonized by anaerobes that are notoriously difficult to isolate. (Jan aw, Khan H; 2016)
The diagnosis of the infection with deep tissue swabs, selection of the wrong antibiotic can lead to chronic ‘superbug’ infections. Bacteriophages One of the key problems associated with diabetes is peripheral vascular disease and wound ischemia. Poor antibiotic penetration into tissues because of a lack of blood flow is another reason why antibiotics are so unsuccessful. Both the lack of effective penetration of antibiotics and problems with antibiotic resistance means that novel approaches to treating infection are needed. One promising alternative to standard antibiotics is the use of bacteriophages, or phages, which are viruses that target and kill bacteria. (Clokie1, A. L. Greenway, 2017)
It is generally accepted that early diagnosis of risk factors associated with diabetic foot ulcers is a prerequisite for the maintenance of lower limb health. In comparison to current clinical assessment methods, the evolution of innovative technologies provides new opportunities for remotely detecting and monitoring diabetic neuropathy and angiopathy earlier in the disease progression.
Measuring skin temperature is considered one of the most reliable indicators of cutaneous perfusion, and evidence suggests that infrared thermographic monitoring may be an effective method of predicting tissue viability complications in the diabetic foot. Dermal thermography is currently used in routine clinical practice to detect temperature differences between the ipsilateral and contralateral foot in Charcot neuroarthropathy, but emerging evidence suggests that this technology could be adapted to support self-monitoring of diabetic foot disease. (Clokie1, A. L. Greenway, 2017)
Hyperspectral imaging is currently a laboratory-based assessment method used to determine oxygen saturation in human tissue and to detect early microcirculatory changes in the diabetic foot. Hyperspectral imaging technology has also been evaluated as a tool for predicting the healing potential of a foot ulcer with a reported sensitivity and specificity of 80% and 74%, respectively. (Tsai FW, Tulsyan N; 2000)
Skin perfusion pressure, in contrast to hyperspectral imaging, is a portable tool used in routine clinical practice to diagnose small vessel disease in high-risk populations and assess the healing potential of chronic wounds in the lower limb. Skin perfusion pressure is not affected by diffuse vascular calcification and was superior in the diagnosis of peripheral arterial disease in people with diabetes when compared with ankle and toe brachial pressure indices and transcutaneous partial pressure of oxygen (TcPO 2). The one major drawback is that the application of these technologies is driven by the clinician and not the person with diabetes. (Castronuovo JJ, Adera HM; 1997)
Wearable technology is another evolving field in the monitoring and treatment of diabetic foot disease because sensory and motor complications associated with peripheral neuropathy often result in altered proprioception and ataxic gait patterns. Human exoskeleton robots are in early development, but some of these devices have remote body sensors which consist of shoe-embedded force sensors and walking canes to aid with gait difficulties and alert people to the risk of falls when standing from a sitting position (Iqbal MH, Aydin A; 2016). One simple and inexpensive method of adopting wearable technology into practice would be to encourage patients to wear pedometers to monitor their physical activity levels and visually inspect their feet daily for evidence of tissue trauma. This intervention would enable the person to recognize when they need to limit their activity levels and seek advice from their podiatrist. Pulse Flow DFTM is an offloading device which has taken the concept of monitoring physical activity to another level. It has built-in monitoring software that enables the clinician to capture data on the use of the offloading device.
Web of Things and Big Data Is Coming into the Rooms The ornamentations from the earlier year turned into a fundamental necessity in 2017 – free and secure wi-fi, top notch TV, and so on. Be that as it may, as time has advanced, so have the visitors' requests. Furthermore, keen hoteliers are progressively depending on innovation to help them here, gathering information and permitting the conveyance of an exceptionally customized benefit. This is Internet of Things (IoT) at its exceptionally essential, and something we will see significantly more of from 2018. Information is the most valuable resource each cutting edge mark has, and present day innovation is empowering organizations to assemble and decipher this information for more significant customer ventures. For example visitor administration frameworks envisioning visitors' needs previously they even arrive!
Get original essayHome-Sharing Continues to Reshape an Entire Industry Airbnb has reshaped the friendliness and innovation industry until the end of time. As Airbnb infringes upon the properties' space, lodging networks, for example, Accor, Hyatt and Wyndham Hotels and Resorts are beginning to put resources into home sharing organizations. Together, as a group, they would like to offer more choices to visitors and oblige a more extensive gathering of people.
Offer a Story, Not Just a Room Your property has more to offer than a bed. Educate individuals regarding it. Offer them the story – an ordeal, the character, what makes it special, individuals who serve. These accounts will get you the appointments.
Virtual Reality Becoming More of a Reality So you have the story. Presently you have to disclose to it all around ok to get the appointments. That is the place virtual reality comes in – helping visitors encounter the place through intelligent innovation like 360 and getting the client 'in the room'.
The Era of the Bots Chatbots speak to a route for inn administrators to effectively cooperate with groups of onlookers in conversational ways that don't include genuine individuals. Rather, the bots are set up to react to usually made inquiries and to communicate with crowds as though controlled by genuine individuals. Facebook is driving the route with its Messenger around there, yet Google and Amazon are not a long ways behind.
Making Unique and Local Experiences Voyagers today search for local encounters when they travel. From investigating the nearby culture to ticking off the can list they need to encounter everything except for in an unexpected way. It is imperative for properties to collaborate with nearby merchants and travel organizations to address this issue. Consider out-of-the-crate thoughts to lure your visitors and keep them locked in.
A Continuing Shift in Focus to Mobile This isn't completely new, however something worth specifying as it will proceed with well into and maybe past 2018. It comes into more noteworthy concentration in the coming year and versatile stages (counting a high-performing portable site) will be enter in expanding income and benefits. The utilization of portable innovation stretches out past effective obtaining of visitors to conveying a magnificent client encounter. For instance keyless section or registration utilizing versatile application, more prominent utilization of close field innovation to nourish more data to visitors on-start, more noteworthy personalisation utilizing data accumulated by means of cell phones, and so forth.
An Increased Focus on Direct Bookings Properties will mean to drive more prominent gainfulness by concentrating on coordinate appointments. Organizations will invest more energy and exertion in building brand review and devotion to this impact by utilizing sites and other possessed stages, for example, Facebook, TripAdvisor, Yelp and comparable business pages. Don't for a second trust you can wipe out OTAs from your appropriation lattice – they stay basic for reach.
More noteworthy Efficiency being used of Data Entrepreneurs are immersed with a wide range of information these days. While it is altogether expected to educate brilliant business choices, it is similarly critical to see how to slice through information to make everything justifiable. Instruments, for example, income administration frameworks will be less an extravagance and increasingly a prerequisite to end up information proficient.
The business opportunity we identified was in the restaurant industry. We concluded on this as we saw a lot of unmet needs. However, we focused on customer convenience. We will be supplying foods for people with special diets; those sick e.g. diabetic and those with cancer. Therefore we will require our customers to make orders with the kind of food they want, where to deliver and by what time. Orders will be made online or through a text message. There is not restaurant we know that have been doing this and that’s why we chose to focus on it. For the longest time most restaurants in the food industry have been proving food for the healthy people.
Get original essayTo meet the needs of these people we will focus more on traditional and natural foods rather than processed ones. Some of the ingredients we will buy include vegetables, fruits, natural spices, yams, sweet potatoes, millet, maize, and potatoes among others. Most of the sick people cannot prepare food for themselves and therefore we think we could help much. We will prepare food on order as people are sick differently and therefore their diets are different. With all that we will have met their needs.
Of course we will use targeting and segmentation so that we can focus better in our population of interest. The segmentation variables we will focus on are gender, age and the specific chronic disease the customer is suffering from. Men need foods with much energy compared to men and therefore we will help them in choosing the best foods. Most of the people with chronic diseases are old and different ages have different needs.
Finally diseases are different and therefore each has a diet for example foods taken by a diabetic are not similar to that of a person with high blood pressure.We do not expect already existing competition as there is no restaurant offering the same services as ours to the old and the sick. However, as soon as we start it people will copy our idea and start offering the same services as ours. We intend to make our customers loyal by offering quality foods as per their prescribed diets, we will include a nutritionist in our staff for advices and offering our services at fair pieces. By creating customer loyalty we will not lose our customers.We plan to differentiate our services in different ways as mentioned earlier.
First many restaurants are offering food their main focus being entertainment while for us we are focused on health. For this reason we will be focusing on natural and organic foods. Another way to differentiate us from the rest is that most focus on youths and those with families while ours will be the old and the sick a segment that no one focuses on. We also have a plan to employ a nutritionist who will be advising us on what kind of diet one is subject to take considering their special needs. Most of the restaurants have chefs but no nutritionist this therefore will give us an upper hand.
Finally we will provide our services at fair pieces considering our customers are the sick and the old who may not be earning a living. Our positioning statement will be; the only restaurant that offers healthy and organic foods for the old and the sick who want to be stronger and improve their health in this age of junks. We choose this as it communicates what we do, to whom and why and therefore will market our brand enabling us to get more sales and greater profits.
Cybercrime is emerging as a very serious threat in today’s world. The internet brings happiness to our lives but at the same time, it has some negative sides too. The cybercriminal is always in a search to find out the new ways to attack the possible internet victims. The new generation is growing up with computers and most important is that all the monetary transactions are moving onto the internet.
Get original essaySo, it has become very important for us to be aware of the various cyber crimes being committed with the help of computers. Cybercrime is defined as the “illegal activity done using the computer system and the internet” which is punishable by law. With increasing internet penetration, cyber crimes have also increased in the last few years. Between 2011 and 2015, the number of cyber-crimes registered in the country has gone up to 5 times. Maharashtra and Uttar Pradesh alone encountered 1/3rd of these crimes.
Cyber-crime in India is registered under three broadheads, the IT Act, Indian Penal Code(IPC) and other State Level Legislations(SLL). With increasing mobile and internet penetration in the country, cyber-crimes have also increased proportionately. Between 2011 and 2015, more than 32,000 cyber-crimes were reported across the country. More than 24,000 cases were registered under IT act and the remaining under the various sections of IPC and other State Level Legislations. Any criminal activity that uses a computer either as a tool, target or means for perpetuating crimes comes within the range of cyber-crimes. The first cyber-crime was recorded in 1820 in France. The cyber-crime has been a problem as early as the late 1970s. The first spam e-mail took place in 1978 and the first virus was installed on the Apple computer in 1982. In 2006, about 2000 complaints relating to cyber-crime were received and the major reasons for such complaints were financial fraud, viruses, and hackers. It has also been found that there has been a constant increase in the number of children being exposed to unwanted pornography, internet harassment and bullying.
Cybercrime also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, child pornography, stealing identities, violating privacy. Cybercrime, especially through the internet, has grown in importance as the computer has become central to commerce, entertainment, and government. Cybercrime mainly consists of unauthorized access to computer systems, data alterations, data destruction, theft of intellectual property. Most cybercrime is an attack on information about individuals, corporations or governments. Although the attacks do not take place on a physical body, they do take place on the personal or corporate virtual body, which is the set of information attributes that define people and institutions on the internet. Cybercrime also includes non-monetary offenses such as creating and distributing viruses on other computers or posting confidential business information on the internet.
When any crime is committed over the internet it is referred to as a cybercrime. There are many types of cyber crimes and the most common ones are: HackingThis is a type of cybercrime wherein a persons computer is broken into so that his personal or sensitive information can be accessed. In India, hacking is classified as a felony and is punishable. This is different from ethical hacking, which many organizations use to check their internet security protection. In hacking, the criminal uses a variety of software to enter a persons computer and the person may not aware that his computer is being accessed from a remote location. Theft This crime occurs when a person violates copyrights and downloads music, videos, movies, and games. There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the government.
Cyber StalkingThis is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the internet to stalk. Identity TheftThis has become a major problem for people using internet for cash transactions and banking services. In this cybercrime, the criminal accesses data about a persons bank account, credit cards, social security, debit card and other sensitive information to get money or to buy things online in the victim's name. It can result in major financial losses for the victim and even spoil the victim's credit history. Malicious SoftwareThese is internet based software or programs that are used to disrupt a network. The software is used to gain access to a computer system to steal sensitive information or data or causing damage to software present in the system. Child Soliciting and AbuseThis is also a type of cybercrime wherein criminals solicit minors via chat rooms for the purpose of child pornography. The government has been spending a lot of time monitoring chat rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting. Spam and PhishingSpamming and Phishing are two very common forms of cyber crimes. It is not much you can do to control them. Spam is basically unwanted emails and messages. Phishing is a method where cybercriminals offer a bait so that you take it and give out information they want. The bait can be in the form of a business proposal, the announcement of a lottery to which you never subscribed and anything that promises you money for nothing or a small favor.
Social Engineering is a method where the cybercriminals make a direct contact with you using emails or phones- mostly the latter. They try to gain your confidence and once they succeed at it, they get the information they need. This information can be about you, your money, your company where u work or anything that can be of interest to the cybercriminals. Characteristics of Cyber Crime Physical presence is required No territorial boundaries Wider outcome Low risk- high rewards Anonymity and openness Lack of awareness among victims Victims refrain from reporting cases No violence is involved Lack of tangible evidence Lack of high technical skills. Duties of Cyber Expert Identifying the peculiarity of cyber evidence Understanding of cyber evidence Discovery of cyber evidence Preservation of cyber evidence Search, seizure, and collection of cyber evidence Protection of cyber evidence Electronic surveillance General Awareness Don’t delete harmful communications(emails, chat logs, posts).
These may help provide vital information about the identity of the person.l Remember that all other internet users are strangers. You do not know who you are chatting with.l Be extremely careful about how you share personal information about yourself online.l Be aware of all e-mails and SMS from any stranger regarding lottery prize, jobs in the UK and huge wealth.l Be sure that your WIFI network is secured, use a strong password.l Never share your passwords with anyone. Change the password frequently using a combination of letters, numerical and special characters.l Do n’t forget to sign out of your e-mail or any other account.l Never reveal your personal information to any stranger in online chatting.l Never make online transactions in unsecured sites.l Never follow links to your banking websites from another website or e-mail, type it by yourself in the address bar.l Never open spam emails as they contain either virus or spyware. Enable spam filters in your mailboxes.l Never post sensitive information in social networking and marriage sites.l Don’t reply to calls that ask credit card details. Suggestions For Better Security Use strong passwords. Choose passwords that are difficult or impossible to guess.give different passwords to all other accounts.l Make a regular backup of critical data. Back up must be made at least once each day. At least once a month, the backup media should be verified.l Use antivirus software and update regularly.
l Use a firewall. Firewalls are usually software products. They are essential for those who keep their computers online through the popular broadband and cable modem connections.l Do not keep computers online when not in use. Either shut them off or physically disconnect them from the internet. Prevention of Cyber Crime Children should not give their identifying information such as their name, home address, school name, phone number in the chat room. They should also be advised not to give their photographs to anyone, not to respond to the messages which are obscene, threatening or suggestive. l Parents should use content filtering software on their computers so that their child is protected from the pornography, gambling drugs, and alcohol. The software can also be installed to establish time records i.e. blocking usage after a particular time. Parents should also visit the sites visited by their children. l Keep backup volumes so that one may not suffer data loss in case of virus contamination. l Always use latest and update anti-virus software to guard against virus attacks. l Never send your credit card number to any site which is not secured. l Do not panic if you find something harmful. If you feel any immediate physical danger, contact your local police. Moreover, avoid getting into huge arguments online during chat and discussions with other users. l Be cautious about meeting the online introduced person. If you choose to meet, do so in a public place along with a friend. Try to keep a record of all your communication for evidence.
Organizations should implement access control system using firewalls, which allow only authorized communications between the internal and external network. l The use of a password is most common for the security of network system. Mostly all the systems are programmed to ask for username and password to access the computer system. The password should be changed after regular interval of time and should be alphanumeric and should be difficult to judge. l System managers should track down the holes, bugs, and weaknesses in the network before the intruders do.
The literature review is the information found in the selected area of study. This review of literature contains aim of the study, authors of that study, what is the study about and factors related to that study. The related study can be extracted from newspaper, internet, articles or any other media.
Ritu Dhanoa has conducted a study on “Cyber Crime Awareness” which was published in Shiv Shakti International Journal in Multidisciplinary and academic Research (SSIJMAR) Vol. 2, No. 2, March-April. The study focuses to provide a glimpse of various types of cyber-crime prevalent in modern technological society and what steps can be taken to protect ourselves from these cybercrimes.
A study was conducted on “Cyber Crime Awareness amongst Students of Government Law College, Trivandrum- A Legal Survey” by Bijoy Saima. The study aims to examine the level of ethical and security awareness among law students. A questionnaire-based survey method on cyber-crime was used among students of government law college, Trivandrum in the state of Kerala. The study was completed by 89 respondents from 10 classes. The sample was obtained from random selection. The questionnaire was designed in such a manner that the respondents can complete the questionnaire in an average minimum time of 4 minutes. There is no gender differentiation in this survey. The overall findings indicate satisfactory awareness all the students, only 40 percent of the students were able to exhibit a firm theoretical knowledge of the common types of cyber-crimes enlisted under section 43 of the Information Technology Act, 2000. The findings of this study could be useful for the college management to understand the mentality of the students while setting up policies and regulations to effectively reduce the instances of cyber-crime in the student community.
“Cyber Crime and Security – A Study on Awareness among Young Netizens of Anand” (Gujarat State, India) conducted by Dr. Archana Chanuvai Narahari and Vrajesh Shah, which was published in International Journal of Advanced Research and Innovative Ideas in Education(IJARIIE), Vol 2, Issue 6 2016. The study is focused on a conceptual model explaining how to uphold and implement the awareness programmes among internet users regarding cybercrimes. The study is based on both qualitative and quantitative research analysis. In the first stage, In-depth Interviews are conducted with two ethical hackers. The purposive sampling method was selected. For interviewing structured open-ended schedule was adopted. In the second stage, a survey is conducted on 100 young internet users of Anand. The age of the respondents falls between 17 to 35 years. The simple random sampling method was adopted. The study proves that internet users in Anand are not thoroughly aware of cyber crimes and cyber security that are prevailing.
A study on “Perception and Awareness of Young Internet Users towards Cybercrime: Evidence from Malaysia” was conducted by Md Shamimul Hasan et al, published in Journal of Social Sciences 2015. The study examines the relationship between perception and gender, age, and knowledge as well as the relationship between awareness and gender, age, and knowledge towards cybercrime. The study was conducted among 342 students in the faculty of accountancy of Universiti Teknologi MARA (UiTM) with a structured questionnaire. This study concludes that gender, age, and knowledge have significant influences on the level of perception and awareness of cybercrime.
Keep in mind:
This is only a sample.
Get a custom paper now from our expert writers.
Get custom essayAnil Kumar and Jane Shah conducted the study on “The Threat of Advancing Cyber Crimes in Organizations: Awareness and Preventions” published in International Journal of Advanced Research in Computer Science Volume 5, No. 8, Nov-Dec 2014. This study focuses on awareness and prevention of cyber crimes in organizations. The study provides development of proper mitigation strategies.
It took a considerable amount of time for people to realise what are the different forms of stalking and a lot more to gauge and understand its effects. Its impact, especially on young minds, has long-lasting effects. Laws and punishments were successful in curtailing it to an extent, but they have failed to act as a deterrent in most cases.
Get original essayThe Internet has brought exciting benefits by providing oceans of knowledge to its users and various opportunities of sharing information and connecting across borders. However, every coin has two sides. The technology that helped change the world inadvertently offered a plethora of tools to perpetrators who could now easily carry out their dark deeds behind computer screens.
The unfortunate part is that the victims, in the case of cyberstalking, unknowingly facilitate and aid the stalker by posting their personal information online. A victim of cyberstalking can report it to the concerned authorities, however, the solution lies in prevention and awareness. It’s the people themselves who need to be mindful of their activities on the Internet.
Cyber law in general refers to a law that regulates how people use the Internet. It applies to people using the Internet, World Wide Web and related technologies. It can be mainly categorised into civil and criminal. It encompasses all the different ways through which people communicate digitally using computers, mobiles, tablets, etc. over emails, social media, websites, blogs, personal or private forums, etc.
As defined by the Merriam-Webster website, cybercrime refers to any criminal activity (such as fraud, theft or distribution of child pornography) committed using a computer especially to illegally access, transmit or manipulate data. Cybercrime is an offence that may be committed against people by using computers, the Internet or mobile technology with the intention to cause damage directly or indirectly. There are three major categories that cybercrime falls into: individual, property and government.
Cyberstalking, also referred to as Internet stalking, e-stalking or online stalking, is a criminal practice where an individual uses the Internet to systematically harass or threaten someone. This crime can be perpetrated through email, social media, chat rooms, instant messaging clients and any other online medium. Cyberstalking can also occur in conjunction with the more traditional form of stalking, where the offender harasses the victim offline.
Stalking, as defined on the website oxforddictionaries.com, means to harass or persecute (someone) with unwanted and obsessive attention. While legal definitions of stalking vary from one jurisdiction to another, a good working definition of stalking is a course of conduct directed at a specific person that would cause a reasonable person to feel fear. Stalking is serious, often violent, and can escalate over time.
Cybercrime is a fast-growing area of crime. More and more criminals are exploiting the speed, convenience and anonymity of the Internet to commit a diverse range of criminal activities that know no borders, either physical or virtual, cause serious harm and pose very real threats to victims worldwide. Society has taken cognizance of stalking but has somehow been unable to identify stalking over the Internet and its ramifications.
According to a research conducted by Matthew J. Breiding et al (2011) quoted on the website www.victimsofcrime.org, 7.5 million people are stalked in one year in the United States, of which over 85% of stalking victims are stalked by someone they know. The research also found out that persons between the age group 18 to 24 years’ experience the highest rate of stalking.
The Organization for Security and Co-operation in Europe (OSCE) published a report in March 2019 based on a survey which revealed that 70% of women, or an estimated number of 16 million women, have experienced some form of sexual harassment, stalking, intimate partner violence or non-partner violence since the age of 15, and 45% of women, or approximately 10.2 million women, have experienced sexual harassment, including harassment via the Internet.
The scenario in India is not much different. In the year 2013, the Justice J.S. Verma panel had said, 'Offences such as stalking, voyeurism and eve-teasing are perceived as minor offences, but if not checked, these lead to a growing culture towards serious offences like rape.' Section 354D of the Indian Penal Code defines the act of stalking as:
Any man who:
According to a survey conducted by a global cyber security firm Norton by Symantec in 2017, as reported by The Indian Express, online harassment is increasing in India. The report points out that every eight out of ten people surveyed have encountered some form of cyberstalking, online harassment and cyberbullying.
The research also shows that more serious forms of online harassment, including threats of physical violence (45%), cyberbullying (44%) and cyberstalking (45%), are very high. The study found out that over 40% of incidences of cyberbullying and nearly half of all cases of cyberstalking had a stranger as a perpetrator and that one in four women found their experience frightening. As reported by The Times of India in 2018, several women and minor girls are falling prey to cyberstalking, as Hyderabad police receives nearly 50 complaints every month.
The same news report also mentioned that merely 20% victims prefer to file FIR against accused. According to the annual report published by Indian Computer Emergency Response Team (CERT-In), over 53,000 cases of cyber security incidents were reported in 2017 in India (annual report of 2011 shows over 13,000 cases).
Alexis A. Moore, a renowned author who has authored multiple books on cyberstalking and who is a well-established practising advocate in California, believes that the ease with which someone can perpetuate a cyberstalking crime has made potential victims of us all. In her article dated 27th August, 2018 on the website www.thoughtco.com, she said that individuals have been cyberstalked for the most minor reasons by people they've angered in the past.
The ease of causing someone trouble through technology, without having to leave the house, makes cyberstalkers out of people who would have normally fumed in silence. We have all grown so complacent about our information and how it is stored and managed; we have no idea how easy it is to access essential personal data that would unlock the safeguards to our finances, our personal and economic safety and our lives.
According to a survey conducted in the year 2015 by Emma Short et al, National Centre for Cyberstalking Research, University of Bedfordshire, UK, 32.7% of respondents who reported harassment were indicated to have symptoms of PTSD according to the PCL-C (Weathers et al., 1994). Post-traumatic stress disorder (PTSD) is a mental health condition that's triggered by a terrifying event - either experiencing it or witnessing it. These symptoms cause significant problems in social or work situations and in relationships. They can also interfere with your ability to go about your normal daily tasks. PTSD symptoms are generally grouped into four types:
Keep in mind:
This is only a sample.
Get a custom paper now from our expert writers.
Get custom essayCyberstalking is such a new phenomenon to the public at large that most are unaware of it even if it has happened with them, but it is on the rise. However, cyberstalking can be as frightening and real as being followed and watched in your home or neighbourhood. Even the innocent act of posting personal photos online or announcing where you are on social media can provide fodder to perpetrators. Although there are laws put in place and security software available, it is the people who need to be cautious and mindful of their activities online.
Constant technological development in the 21st century has brought about new national security concerns for many countries, with cyber warfare and espionage becoming extremely common. Recent attacks on the US election, Estonia and other countries have highlighted this growing problem. Cyber espionage being covert and completely untraceable has encouraged many countries to survey and gain information from other countries. This information can then be used to cause political damage like the US elections, economic damage like that in Estonia, or even physical military damage such as the stuxnet virus deployed in Iran. We've seen cyber-attacks move from enthusiasts to financial thieves to now governments around the world.
Get original essayAlarmingly however has been the increase in cyber-attacks by non-state actors and terrorist groups. With cyber-attacks requiring less capital, people and military might, this is proving to be an effective way for terrorist organizations to wreak havoc in the modern world. Despite some countries boasting a very large cyber defense squad, virtually every country is susceptible to a cyber-attack. Furthermore organizations like ISIS use media to post gruesome images of killing in order to spread fear among the world. Moreover they use the dark web to secretly recruit people for their organization. The primary problem with cyber warfare is its vagueness. Firstly the never ending cyberspace poses problems for any government due to its vastness. The definition of cyber warfare and cyber espionage is not yet universally agreed upon and this hence creates problems for countries when determining the severity of an attack and its consequences.
Countries build their cyber-attack arsenal in the name of peace and security and then end up using this on smaller or more vulnerable nations to disrupt that peace. Larger countries such as USA and Russia have done this on numerous occasions thereby breaking their allies trust. An example of this is the Edward Snowden leaks that revealed the extent to USA’s spying on neighboring and allied countries. This created a sense of distrust for the USA; however more importantly highlighted the imminent danger of these attacks. Countries now have to live in fear and hope that they are not attacked. This situation can cause disharmony between many previously allied countries. Overall Cyber-crime is a problem that could result in chaos and destruction unless prevented. Ironically man’s biggest accomplishment of the 21st century, the internet, may now prove to be its biggest weakness.
Slovenia is a country that believes in freedom of its people and hence doesn’t impose any harsh internet regulations. With more than 6 times as many cyber- attacks than in 2008 Slovenia recognizes the growing need of a well-developed cyber security network to prevent attacks by regular hackers, states or non-state groups. Slovenia has recently developed and been part of many organizations to spread awareness and to find solutions to this problem. As a less powerful country we are concerned of our lack of preparedness if any powerful cyber-attack were to occur on our economy. We believe in alliances and support from larger countries such as the USA and agree that to solve these problem first concrete definitions need to be set out. Our limited resources however are preventing us from rapid progress in this field hence we encourage the UN to find a solution. We condemn Russia for its attacks on the less powerful and are wary of the development of the Baltic States.
Solutions
“India absorbs and outlasts its conquerors Indian's say. But...I wonder whether intellectually for a thousand years, India had not always retreated before the conquerors and whether in its periods of apparent revival, India had not only been making itself archaic again, intellectually smaller, always vulnerable"
Get original essayIn centuries gone by, tiger ruled the jungle; today it is the "mouse", which wears the crown and canons the cyberspace. Mao's dictum, "Power flows from the barrel of the gun," is en passé; instead power pours from the clicks of the mouse in bits and bytes; later when optical and quantum computing augur presence, it will be in "photons" and "qubits" respectively; or still later, in "cogs" of, yet to philosophically expound, cognitive computing.
The cyber canvas is wide, the pieces galore, and the moves astoundingly complex and varied, wreaking checks, striving for checkmate. The most significant paradigm shift that has occurred is the transition of ICT from a support function to the core of military affairs and control of economy and critical national endeavours. Likewise, the pertinent example in warfare is from force multiplier, to weapon of mass disruption, leading to widespread and split-second destruction of opponent's sinews of power.
There are cyber attacks "ahoy", the variety of weaponry overshoots count and the styles rupture limits of propriety and ethics ad nauseam. Affordable and Mobile Technology with high speeds facilitated these attacks due to its easy access to the people across the world see figures 1.1 and 1.2 respectively.
They target national governments, militaries, critical infrastructures, economies and social edifice by disrupting or destroying networks, software, hardware, mobiles, user interfaces and even "wetware". The latest in the series are operations Shady RAT, Nitro and Red October, authentically or allegedly, originated from the Chinese soil, and "game-changing" malware of the kind; Ransomware, Stuxnet, Duqu, and Flame-widely believed to be state-sponsored with conjectures, real or make-believe-pointing to Israel and the U.S.
These are supplemented by CHAMP that targets enemy electronic systems with NNEMP; HERF gun, e-bombs. photonic weapon systems, EMR Weapons like DRDO’s ‘Kali’, Laser weapons, inter alia Energy Beam Weapons and revitalised DEW of last century's covert research.
In the above context, on 16 April 2010, while addressing the senior officers of the Defence Services and the Ministry of Defence, the then Defence Minister A. K. Antony called upon the top brass of the Armed Forces to coordinate closely with various national cyber agencies and prepare action plan to counter cyber attacks and cyber terrorism. He repeated this counsel in diverse forums, the latest being the 14th Asian Conference on "Non Traditional Security Threats – Today and Tomorrow" held on 13-15 March 2012 under the aegis of the Institute for Defence Studies and Analyses, His apprehensions about the prevailing cyber insecurity are timely and decidedly sought-after.
He opines, "Cyber security is a critical area of concern. With digitisation of the world and various services, the world is becoming increasingly dependent on Internet and information technology. However, security of networks has become a serious concern, as enormous, vital and critical data passes through every day. Any breach of cyber networks can cause untold damage to the security of any society and country. Nations must take serious and prompt note and cooperate with each other to strengthen seamless cyber security" .
It is not that Defence Services were oblivious of the importance of cyber combat, but their involvement had not been to the liking of "agencies" for fear of take over. Further, geeks and lays alike, harbour widespread impression that cyber infractions are more in the nature of fraud, seeding malware, spoofing, spamming and phishing, all in the domain of law and order.
These oddities, coupled with the indifference of the erstwhile establishment, have kept the Defence Services comatose, still worse, out for the count. Nonetheless, each Service, on its own initiative, has set up a modicum of cyber soirée just to keep abreast of what is happening in the world. Splintered, cut-priced and self-initiated as the effort is, it can hardly match non-state actors from abroad and home-grown terrorists within, let alone our avowed and aggressive adversaries and their proxies in the garb of insiders.
Time has come to shed corporate-tainted cost-benefit platitudes and take cyber war seriously in the light of prevailing chary and challenging milieu, which call for armed-forces-specific synchrony of defensive and offensive capability development in the cyber arena.
IDSA released a Task Force Report titled, India's cyber Security Challenges , in 2012, which is stimulating and timely, but somewhat aggregative reconciling of diverse viewpoints of stakeholders. It astutely portrays "Regional Security Scenario 2020", stressing on challenges of asymmetry, anonymity, non-attributable proclivity and deniability as the characteristics of cyber warfare, but discreetly defers specifics of attacks hitherto targeted on India, their perpetrators, the cyber weapons used, or in the offing. Yet in "Back to the Future 1997 to 2012" and "Events of 30 June 2020" the report wisely postures and purveys the "said unsaid," the "known unknown" to make the point.
There has been an exponential growth of computing. Not a day passes when technology does not throw up surprises, or ICANN proposes new measures for governance of Internet. In 2011, the successful trials of new Internet Protocol "IPV6" and new "Domain Names Suffixes" are the cases of instance, both, for elation and apprehension.
Whereas the aforesaid IDSA report purveys "top-down" approach, this exposition highlights a "bottom-up" analytical viewpoint. In this context, we need to also deliberate on raising cyber units down the chain, training warriors and conducting exercises in delivering multifarious weapon-loads from fighting platforms, both, real and virtual, manned and unmanned. It would be prudent to take cue from what others are up to, lest we are left out from the futuristic cybernetic, psychotronic, scalar, or DEW club or for that matter the Internet governance - as is the pertinent example of isolation from the Nuclear Club.
India's cyber security and warfare policy paradigms are dated, clichéd and unimaginative with glaring exceptions, that too, the modicum is restrained and confined to the coffers of top echelons of hierarchy. If cyber intrusion, techno-spying, netspionage, infrastructure-sabotage and electromagnetic attack are recognised as warfare, then "offensive action", is of vital essence to any strategic or tactical plan. Combat, be it real or virtual, is a lawful concern of man-in-uniform and, that too, "exclusive" and "elitist" in design and rationale.
The dictum Secure or Perish given as a title to an earlier published work based on the project "Emerging Global and National Infrastructure and their Security Implications: an Analysis" assigned by the USI of India under DRDO, Dr. Kothari Fellowship in 1998, begs a switch to Pre-erupt or Repent, more consistent with the emerging risks and challenges; albeit the hitherto prevailing penchant to "secure" continues to bear reckonable, if not, imperative virtues.
The first word, pre-empt, underplays widespread proclivity to post attack "patches" and after-thought "parries"; instead, laying significant emphasis on preventative intelligence and constant 24/7 surveillance. Further, it does not, per se, exclude knock-out "punches". The second word, repent, emphasises inevitable regrets for not taking timely action, including retribution or threat thereof. Further, unlike the dicta and doctrine of "Cold Start" or "Two Front War", the action plan cannot and must not be country specific, as cyberspace defies boundaries; besides, the abominable acts hide inimical source, initiated as they maybe, by a fair-weather friend or time-tested foe,
It is widely known, though not acknowledged, that many amongst the decision-makers would not have heard of the MVTW, botnets, zombies, logic bombs, trap doors, EMR, EMP, and scalar weapons, or of ostentatious strategy and multiplicity of devices in the form of ingress, anonymity, autonomy, self-replication and intelligent traits of the malware.
PLA of China and Pakistan Army through ISI control hackers, crackers and Whackerz ; whereas we in India keep our armed forces, scholars and scientists cut-off from sharing intelligence and surveillance, let alone be privy to assessment on simmering threats and unambiguous doctrine with a view to training for offensive options.
This research work is not a primer either for so-called ethical-hacking or for counter-hacking. However, its rationale and thrust would be lost if malware technologies, both, currently ground-breaking and futuristically insightful, are not deliberated and their impact on policy dynamics ignored. Cyber warfare mandates creation of dedicated training establishments and deployment of units of cyber warriors in the learning and practice of its art.
Unlike kinetic warfare the involvement of these units is not confined to active hostilities only, but also during peacetime; not only within the geographical boundaries of a state, but also in outer-space, water-space and airspace friendly, hostile or neutral or commons beyond. Cyber warriors are disciplined in art and scientific academics of ICT, electromagnetic propagation, next generation networks, software programming, cognitive radio, and exploiting the intricacies of computer networks, robotics, cryptography and a host of other legacy and emerging skills and know-how of attacks.
The focus of this research is, both, on conceptual and practical aspects of technological parlance and cyber idiom, such as bandwidth, packet-switched networks, grid topologies, malware almanac, system analysis and database management vis., archiving and mining; besides commonplace tactical terms, associated and prefixed by `cyber', such as reconnaissance, surveillance, convergence, situational awareness, and asymmetric doctrine.
The findings and recommendations herein are designed to illuminate risks and challenges, project futuristic techno-coups; be cautious of war-defined outlook abroad, foster real-world deliberations; and stimulate appropriate policy solutions to the challenges identified zero-day ones somehow and somewhat predicted.
This work evokes a basic orientation to India-centric policy dynamics of cyber security and warfare. It addresses several fundamental perspectives, vis.:
“It always seems impossible, until it’s done”.
- Nelson Mandela
Broad philosophy, on which this thesis anchors, is that cyber warfare is fallout of cyber power, a subset of information or what Chinese term as informationisation warfare and of intimate kinship to "Network Centric", "Sub Rosa", "No contact", "Unrestricted", "Electromagnetic Spectrum", "mimetic" "scalar", "Cognitive", "psychological", and "Psychotronic" Warfare; besides many, indeed many, emerging variants, cross breeds, and hybrids of the so-called irregular, or non-traditional warfare.
The technology of virtual battle arena has turned up bit-by-bit and critically, but the consequences, thereof, have surfaced at an enormous and revolutionary scale and, that too, imperceptibly.
The security and warfare paradigms, though unique, are transiting ad nauseam - technologically complex in conduct, and demanding nano-second responses. Therefore, the policy perspective and action plan must follow the maxim, "Prevent or Repent". This calls for an understanding of world-wide overt and covert initiatives, and at home, synchrony of security, proactive defensive and preventive offensive strategies. A comprehensive, joint and Ludo-centric "policy initiative", is the need of the hour.
It would embrace all the stakeholders in its fold, identifying threats, vulnerabilities and challenges, exploring schema and stratagems and positioning structures to overcome them, Obviously, some aspects, which are in the domain of the armed forces, research and development establishments, and intelligence agencies would be classified.
The way we conduct our conflicts is a reflection of our society. This is not a unique observation. In their book War and Antiwar, Heidi and Alvin Toffler observed that the way warfare is conducted is a reflection of the period in history. They divided human history and their corresponding conflicts into three waves, namely Agrarian, Industrial and Information age. Today, we are in an information age.
In this age the increasing flow of information, rapid flow of data, the evolution of global economy, creation of internet, ever increasing dependence on information network in day to day business have definitely made things convenient, fast, encompassing, inclusive and reaching to everyone but at the same time increased vulnerabilities have also been created in cyberspace. These vulnerabilities have given possibilities of offence and defence in the cyberspace giving rise of a new warfare namely Cyber Warfare.
Keep in mind:
This is only a sample.
Get a custom paper now from our expert writers.
Get custom essayIndia being an emerging economy and poised to be one of the Global powers, definitely has to have serious concern to ensure that her cyberspace, her information infrastructure, network, portals of several institutions, department and transactions on nets or internet remain safe and adequately protected from the offensive tools of perpetrators of cyber crime/war. It is equally important to know and practice offensive tools in use or likely to be developed and used by perpetrators to keep defence, safeguards up to date and seek information dominance.
The evolution of technology has increased the dependency of humans on it in all spheres of life. In addition to the opportunities, benefits, accuracy provided by these inventions, it however increased the probability of getting trapped in cybercrimes. Undoubtedly, cybercrimes are frequent these days and financial sectors are majorly targeted by hackers or criminals. Most of the organizations rely on the digital networks for their business operations which increases the risk of becoming a victim of cybercrime. We can define Cybercrime as in illegal activity on internet through which hackers invade into financial or private accounts of users with wrong intention without their authorization. ‘Banks in order to enhance their customer base introduced many platforms through which transactions could be done without much effort’. Computers and network are used for cybercrimes which include credit card frauds, phishing, spams, blackmail, forgery and many other frauds.
Get original essayIn this research paper, I am going to discuss that why banks are targeting more by criminals than any other sources? How hackers can invade into accounts of users means what credentials are required to invade into user’s accounts? What they can get from this? Why banks are inefficient to properly prevent these crimes. What types of strategies they use to persuade users to give all their financial information? How they can be stopped and crimes can be eradicated?
It has been always seen that Cybercrimes are directly proportional to less security measures taken by people on their computers and revealing of their passwords, PINs, card number, SIN and CVV number of their credit and debit cards. Criminals are dependent upon these numbers to commit a crime. These numbers actually represent a customer’s authorization to operate an account. Without these it is difficult to penetrate the security.
The significance of this study is make aware the users of online banking and make them some recommendations to improve the security on their electronic systems. Through the research, we get to know about how it can be minimized or eradicated. We will come to know about to which level, criminals can go to commit crimes. In which ways, criminals can approach you or persuade you to access your confidential information. What are the adverse effects of cybercrimes? What are the security measures that we need to adopt to prevent these crimes? The purpose of this research paper is to make people understand the seriousness of these cybercrimes.
Cybercrime is illegal activity which is carried out through computers and information technology without the authorization of user. Literatures on Cybercrimes seem to suggest that cybercrime is on upward trend in all over the world. In the banking sector, the crimes which are committed using online technologies to illegally remove or transfer money to different accounts are tagged as banking frauds. There are many categories of Cybercrimes i.e. cyber-deceptions, cyber-pornography, cyber-violence and cyber-trespass. The bank frauds comes under cyber-deception .Undoubtedly, there is not even a single day goes without an organization suffering from breaching security. It is difficult to assess the impact of cybercrimes, and both financial and intangible losses are acknowledged.
According to PwC’s Global Economic Crime Survey 2016, revealed that cybercrime is the second most reported crime globally and 54% organizations are the victims of cybercrime in the last two years. There are some organizations which are more on the top list of hackers. Without any doubts, we all know that these are banks, because Cyber criminals go where the money is.
According to a financial website of the UK, Cyber-Criminals hack the system of Tesco Bank and stole 2.5 million pounds from the current account of 9,000 customers. The Financial Fraud Action UK reported that online fraud losses reached 40 million pounds and has increased up to 12% as compared to 2011. There are different ways in which criminals can do this cyber offense which are explained below.
Cybercrimes can be done in two ways. First is Direct and another one is indirect. Direct fraud includes credit and debit card frauds, money laundering and internet banking fraud. Indirect fraud includes phishing, pharming, hacking, virus, spam and malware. Lottery scams, romance scams, charity, pyramid schemes and advance fee frauds are also frequently used. According to York (2010) residents of Sanford, received phone calls that claimed calling from Sanford institute of Savings (SIS), informing them that their accounts had been frozen or inactive and they have to give their full details of accounts in order to maintain their accounts. Actually they were cybercriminals looking for people into giving their financial details.
These frauds happen due to lack of awareness and knowledge among people. Sometimes hackers call you, ask for your PIN, security code and claim that they are calling from banking security team. So, if the person has lack of knowledge, then one can trap in their scam because bank never ask for customer’s confidential information. Financial Fraud action UK says that British loses from internet and telephone banking fraud about 35.9 million pounds in the six months if the year 2014 (Arnold, 2014).
On 15 August, 2012, in Saudi Aramco, computer networks are struck with self-replicating virus that infected 30,000 window based machines. It takes two weeks to recover the damage and affecting Saudi Arabia’s national oil and gas firm. This virus attacked the business processes of the company and some drilling and production data were lost (Bronk & Tikk-Ringas, 2013).
Banks say that there are continuously making efforts to combating cybercrimes. The Bank of England and US Federal Reserve have pushing banks to identify threats with different programs. This bank is expecting to spend $250 million on cyber security and trained 1000 specialist staff to work in this area (Arnold, 2014).
In Nigeria, Banks have audit committees in cyber security. The main issue for audit committee is technology concern (Ojeka, Ben-Caleb, & Ekpe 2017). It is the duty of audit committee to collaborate with management to increase efforts about threat awareness, timely discovery of incidents, risk assessments, and coordination with regulators that how cyber security risks are being identified and managed (Ojeka et al., 2017). It is also the role of audit committee to oversee accountability of management to the overall process of risk management. It requires the audit committee to have accounting knowledge to understand the financial implications in depth (Ojeka et al., 2017). Financial literacy can reduce the crimes.
The literature review indicates that several researchers have investigated cybercrime by considering several factors, but in my opinion in order to understand the fraud system in banking industries, we have to understand attackers and defenders. These frauds happen because hackers want to make rich in one night or without any efforts. The other reason is hackers want to use these money for antisocial and terrorist activities. Banks are required to put their regular efforts to combat these crimes as done by Nigerian banks. It helps the Banking industry make aware of the prevailing threats, to make their technical facilities better.
To study the impact of cybercrime, I used two methods to identify how much strong the system of cyber attackers are.
I used qualitative analysis as well as content analysis. In qualitative analysis, I interviewed 200 people from different countries including India, Canada, Zimbabwe, Ecuador, Pakistan and Nepal. I asked them about their awareness about the cyber threats in banking industry. I found that some of them are less aware about these crimes, some are victims and some are aware and conscious about these threats.
The most common fraud that I found these days in Canada is Vishing. Vishing is an offence that can commit through voice calls. In vishing, criminals, pretend to be calling from an official source of their country and threatens the consumers in order to gaining access to their personal information. Most vishing attempts try to convince victims to give up their PIN, Card number, SIN number, banking accounts passwords and their personal details.
Consumer loss through cybercrime worldwide in 2017, by victim country (in billion U.S dollars). From the above figure, we can easily measure that cybercrimes affected major world in 2017. China has experienced a loss of 66.3 billion dollars in 2017 which is the highest. Globally, the average cybercrime victim lost 142 U.S dollars (The Statistics Portal, 2017).
In the Analysis, I find out that cybercrime is a big concern all over the world. All types of crimes like ATM crimes, phishing, Vishing, hacking is prevalent in all countries. Banks can prevent these crimes to some extent, but only they can prevent it completely, because they cannot stop users to use their online banking and cannot check their computers whether they are free from malware or not. Banks frauds also shows that customers engage in internet banking are not alert and not have sufficient knowledge on cyber threats. It is bank’s responsibility to aware and educate consumers time to time about the prevailing threats in market. Recurrence of these incidents will affect the economy. Negligence by customers and IT sector is the another reason for cybercrime. Other institutions can also do a favor. They can make people aware of the prevailing scams, for example, government organizations, schools and colleges.
Keep in mind:
This is only a sample.
Get a custom paper now from our expert writers.
Get custom essayThis paper gives a brief overview of cybercrime in banking industry and its impacts on banking industry globally. It is a great concern at this moment. The main frauds are credit card frauds and vishing. Presently the measures taken by banks according to me are not sufficient. The rapid growth of technology requires bank to review their policies and make their system stronger. Banks can aware customers through their websites about banking frauds and what measures should be taken to prevent these crimes. Banks should have audit committee to supervise the fraudulent actions in banks. Banks should be taken sufficient measures to combat these crimes and hire employees with strong IT background with proper training and knowledge. Banks should work in cooperation with other banks across the world to prevent cybercrimes.
Cybercrime is defined as crimes committed on the internet using the computer as either a tool or a targeted victim by hacker or cracker. while we growth on fast data manipulating system in this technology era, Unfortunately, some of the skilled professionals use this ability in a bad way by harming society, by finding the vulnerabilities in the companies systems and tacking them, creating and distributing virus-containing codes. Here the term ‘cyber crime’ is a misnomer. Mainly the concept of cyber crime is notradically different from the concept of conventional crime. In recent year privacy and ethical behavior play important role in our lives .it is especially important in the security related areas.
Get original essayCyber crime is the recent and perhaps the most knowing problem in the cyber world. “Cyber crime may be said to be those species, of which, genus is the common crime, and where either the computer is an subject of the behaviour forming crime” “Any criminal activity that uses a computer either as an instrumentality, target or a means for maintaining further crimes comes within the curcuit of cyber crime”. A definition of cyber crime may be “illegal acts wherein the computer is either a tool or target or both” The computer may be used as a tool in the following financial crimes, sale of unlawful articles, pornography, intellectual property crime, e-mail spoofing, cyber stalking, forgery, cyber defamation.
The computer may however be target for illegal acts in the following cases- unrightful access to computer system/ computer networks, theft of information contained in the electronic form,so e-mail bombing, data didling, salami attacks, logic bombs, Trojan attacks, internet time thefts,web jacking, theft of computer system, physically damaging the computer system.
There are hundreds definitions of “hackers” on the Web. Combining it all together we get a computer enthusiast, who enjoys learning programming languages and/or computer systems and can often be considered an expert on the subject, So who had good skill at the art and science of making computers and software do much more than the original designers intended. “Hackers are computer experts. Hackers built the Internet. So Hackers made the Unix operating system what it is today. So Hackers run Usenet . Hackers make the World Wide Web work. So If you are part of this culture, if you have contributed to it and other people in it know who you are and call you a hacker, you are a hacker. Real hackers consider crackers lazy, irresponsible, and not very bright and want nothing to do with them. Unfortunately, many journalists and writers have been fooled into using the word “hacker” to describe “crackers”, which is a obviously upsets real hackers
A person who breaks into other people's computer systems to get a kick and out of it or who intent to cause harm is a “cracker”. A hacker is a very talented programmer, respected by his peers. On the other hand A true hacker can find plenty of useful projects to work on definityly breaking things is more a characteristic of children of any age. Denifitely The basic difference is this: hackers build things; crackers break them.
Now “The Concept of Law” has said ‘human beings are vulnerable so rule of law is required to protect them’. So, Applying this to the cyberspace we may say that computers are vulnerable so rule of law is required to protect and safeguard them against cyber crime. The reasons for the vulnerability of computers may be said to be:
Capacity to store data in comparatively small space: In the The computer has unique characteristic of storing data in a very small space. This affords to remove or derive information either through physical or virtual medium makes it much easier.
Easy to access: Also The problem encountered in guarding a computer system from unauthorised access is that there is every possibility of breach not due to human error but due to the complex technology. By secretly implanted logic bomb, key loggers that can steal access codes, advanced voice recorders; retina imagers etc. that can fool biometric systems and bypass firewalls can be utilized to get past many a security system.
Complex: In the The computers work on operating systems and these operating systems in turn are composed of millions of codes. Human mind is fallible and it is not possible that there might not be a lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate into the computer system .
Negligence: So, Negligence is very closely connected with human conduct. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber criminal to gain access and control over the computer system.
Loss of evidence: The Loss of evidence is a very common & obvious problem as all the data are routinely destroyed. Further collection of data outside the territorial extent also paralyses this system of crime investigation.
Types Of Cyber Crime : Email bombing: In This kind of activity refers to sending large numbers of mail to the victim, which may be an individual or a company or even mail servers there by ultimately resulting into crashing. Data diddling: In This kind of an attack involves altering raw data just before a computer processes it and then changing it back after the processing is completed. The electricity board faced similar problem of data diddling while the department was being computerized . Salami attacks: So, This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes.
An important feature of this type of offence is that the alteration is so small that it would normally gounnoticed. E.g. the Ziegler case wherein a logic bomb was introduced in the bank’s system, which deducted 10 cents from every account and deposited it in a particular account. Denial of Service attack: The computer of the victim is flooded more requests than it can handle which cause it to crash. Distributed Denial of Service (DDoss) attack is also a type of denial of service attack, in which the offenders are wide in number and widespread.
Trojan attacks: Oviously, This term has its origin in the word ‘Trojan horse’. In software field this means an unauthorized programme, which passively gains control over another’s system by representing itself as an authorised programme. The most common form of installing a Trojan is through e- mail. E.g. a Trojan was installed in the computer of a lady film director in the U.S. while chatting. The cyber criminal through the web cam installed in the computer obtained her nude photographs. He further harassed this lady.
Internet time thefts: In these kinds of thefts the Internet surfing hours of the victim are used up by another person. This is done by gaining access to the login ID and the password. E.g. Colonel Bajwa’s case- the Internet hours were used up by any other person. This was perhaps one of the first reported cases related to cyber crime in India. However this case made the police infamous as to their lack of understanding of the nature of cyber crime .
Web jacking: So,In This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the web site of another. He may even mutilate or change the information on the site. This may be done for fulfilling political objectives or for money. E.g. recently the site of MIT (Ministry of Information Technology) was hacked by the Pakistani hackers and some obscene matter was placed therein.
Further the site of Bombay crime branch was also web jacked. Another case of web jacking is that of the ‘gold fish’ case. In this case the site was hacked and the information pertaining to gold fish was changed. Further a ransom of US $ 1 million was demanded as ransom. Thus web jacking is a process whereby control over the site of another is made backed by some consideration for it.
So, Hacking and its subcategory cyber-terrorism, is a growing problem that must be addressed accordingly. Dr. Les Labuschagne from the California Berkley University suggests two approaches: proactive and reactive. Most organizations adopt a reactive approach to information security. The vulnerability of systems is usually evaluated after an attack takes place, result in money spent on fixing the security holes and recovering from the data and business loss. This is the least effective, and more expensive approach. The proactive approach said to demonstrate organizations that try to locate security holes before the hackers do. The proactive approach is sometimes called “ethical hacking”.
Keep in mind:
This is only a sample.
Get a custom paper now from our expert writers.
Get custom essayIn this capacity of human mind is unfathomable. It is not possible to eliminate cyber crime from the cyber space. It is quite possible to check them. History is the witness that no legislation has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties.
Internet has revolutionized this generation completely, from sharing information, images, communicating through messages, studying , sending emails and shopping online; it has become an integral part of life. Internet is used immensely these days therefore securing the data has become very essential. A computer should have a high-end security system to secure the data of a person otherwise it can be accessed by hackers.
Get original essayThere are many web pages and websites that can be seen every day that infects our systems and allows hackers to gain data from our computer system. Hacking of important data and other related threats can affect the lives of people in serious ways. Such type of incidents can occur due to negligence and vulnerabilities. Mostly the main objectives of hackers are to steal data and use it illegally for making money ,or to take revenge and destroy the data. But there are also ethical hackers which help in protection and security of data.
There are many ways in which data can be stolen nowadays, like by downloading dangerous programs, clicking on infected links and websites. Nowadays as users using the internet are increasing significantly and there are various platforms to get connected ,security of data is essential otherwise information of many people would be leaked and hackers can steal their data and their money. This types of issues highlight the need for cybersecurity and it’s used for protecting and preventing data from being used inappropriately.
In simple words, cybersecurity means the protection of data from unauthorized access. It includes all the processes, mechanisms and tools that are required for the protection of data from unauthorized access. In today’s world cybersecurity has become vital for various organizations like government, business firms that store a large amount of confidential data. Internet has provided us with many facilities, but there are risks too.
All the personal information we share on social networking sites like Instagram, Snapchat, Facebook can be used inappropriately by others and may lead to life-threatening situations. Therefore all the individuals should know the techniques to protect their data and difference between the real and virtual world . They should not share all their data online in order to eliminate chances of cyber threats and create safer online environment. Therefore to know how to protect our data we should first know what is cybercrime.
Cybercrime is a criminal activity that uses a computer as an object over a network to commit a crime. Cybercriminals may include professional hackers, employees, children etc. BAL bharti case is an example of cybercrime committed by a juvenile. Harassment of friends was the reason. Email bombing is a technique of cybercrime. Therefore it is essential to understand the risks and infirmity that exist in the Internet world. It is important for every person to think before connecting to someone using an online medium. By using appropriate technologies and proper coordination from the user’s cybercrime can be reduced to a great extent. Therefore cybersecurity is very essential in today’s world.