Understanding Cyber Crime: Threats in the Digital Age:
Cybercrime is defined as a crime in which a computer is the medium of the crime or is used as a tool to commit an offence. Cybercrime uses computers to access personal information and business trade secrets.
A cybercriminal attacks a computer to reach other computers in order to damage data or services.
Types of cybercrimes :
Common types of cybercrime include unauthorized computer access, data information theft, and online crimes. More serious crimes like cyber terrorism are also a serious concern.
-Crimes that target a computer network or device. These types of crime include viruses and denial of service.
-Crimes that use computer networks to advance criminal activities. These types of crime include phishing, fraud, identity theft, cyberstalking, etc.
1.Phishing:
Phishing is an unlawful activity where a fake website or emails that look like originals are presented to people to fraudulently collect sensitive and personal details, usernames, passwords, and credit card details.
The most common phishing method is through email, where a fake email address is used to acquire personal details.
Measures to be followed against phishing:
-Never open a file from an uninvited email.
-keep your operating system updated
-Use an anti-virus program
-never click any suspicious link
2.Hacking
Hacking is the process of gaining unauthorised access to a computer device or a group of computer systems for some illegal purpose. This can be done through password cracking and any type of codes that give access to the system. There are two terms used: hacker and cracker. The difference between a hacker and a cracker is that a cracker breaks the security of a computer system, while a hacker is assumed to be more intelligent and highly skilled, who explores a computer system.
-Black hat hackers use their knowledge and skills for their personal gain through hunting others.
-White hat hackers are individuals who use their hacking skills for defence. White hat hacking involves the same tools, tricks, and techniques that hackers use, but they do it for the general welfare, and white hat hacking is legal.
-Grey hat hackers are individuals who work both legally and illegally at different times. Sometimes they use their skill for welfare, while at others they use them for personal gain.
3.Cyber bulling :
Cyberbullying is the attack upon an individual through the use of electronic means such as instant messaging, social media, email, and other forms of online communication with the intention of abuse, intimidation, or overpower.
The Following acts are considered cyberbullying :
-posting any kind of humiliating content about anybody
-hacking anybody's account
-sending any vulgar message online
-stalking by means of calls, messages, etc
-threatening to commit
different types of cyberbullying :
-doxing: revealing personal information about an individual online for the purpose of humiliating them.
-Harassment-posting a threatening, hurtful, or abusive message online, or sending a direct message to someone with the intention of harming that person.
-Cyberstalking is tracking and monitoring a person's online activity and using the internet to stalk an individual.
How to prevent cyberbullying :
-Be aware of the child's online activities
-Adults should teach children to recognize and be aware of the signs of cyberbullying themselves.
-Limit access to technology
-to help your child be a positive role model
Comments
Post a Comment