Friday, 18 December 2015

CYBER CRIME

CYBER CRIMES ITS TYPES AND PROTECTIONS

There is no internationally unanimous single definition of “cyber crime.” Generally speaking, it refers to illegal internet-mediated activities that often take place in global electronic networks. Cyber crime can be “domestic” or “international”
 Halder and Jaishankar (2011) defines Cybercrimes as:
                                                 “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS).”
TYPES:
  • The computer as a target – attacking other computers (e.g. infecting viruses & spreading malware, etc.).
  • The computer as a weapon – using a computer to commit “traditional crime
  • The computer as an accessory – using a computer as cabinet to store illegal or stolen information or data
FACTS:
In the world there are: 
Ø  18 cyber crime victims per second
Ø  1.5 milllion per day
Ø  556 million per years
Ø  Identities exposed 232.4 millions
Ø  600000 facebook accounts are compromised everyday due to cyber crime
Ø  1 in 10 social network users said they have been fallen victims to a scam or fake link on social network platform
Ø  Botnets have been using as many as 120000 infected computers each day to send send out spams each day
(_a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of zombie computers are often used to spread e-mail spam and launch denial-of-service attacks. Most owners of zombie computers are unaware that their system is being used in this way)
59% of companies employees have been steeling the data of that company afer leaving that company
                             



Source of Attack
Number of Attacks
Russia
2,402,722
Taiwan
907,102
Germany
780,425
Ukraine
566,531
Hungary
367,966
USA
355,341
Romania
350,948
Brazil
337,977
Italy
288,607
Australia
255,777
Argentina
185,720
China
168,146
Poland
162,235
Israel
143,943
Japan
133,908
Top of Form
Bottom of Form


PROTECT YOURSELF FROM CYBER CRIME!!!!!!
Ø  . Install an authentic and legitimate antivirus and antispyware TODAY.
Ø  No matter how attractive an unprotected WiFi connection may look, never trust or connect your computer to unprotected hotspots.       
Ø  Scams are not new to anyone. These programs may appear to be a legitimate link or attachment from a ‘trustable’ source. But it too late once you click it. Therefore always, always think twice and double-check before clicking on any email you don’t recognize or links that don’t look familiar
Ø  According to a recent report, less than half of the Internet users have or know about and can control the privacy settings of their social media and the content that they post. More than a third half tend to accept friend requests from strangers and people that they’ve never met in person
Ø  It is advised that you should become familiar with the security setting of your social media to enable security of your account or profile from predators.
Ø  Passwords are the first-line defence to your computer’s security. The stronger the password, the lesser the likelihood of viruses and hackers breaching your computer
Ø  Children access the Internet via PCs, laptops, smartphones, game consoles. They use it for homework, social networking, blogging, emailing or chatting. Undoubtedly children can gain a lot from the Internet as it offers an infinite source of information. But at the same time, it’s essential that we ensure the security of our children to protect them of online threats posed by the Internet.

Ø  Carefully consider whether to allow geo-tagging on not. If you have children, it is advised to disable the feature completely as children may post information without even guessing the potential danger.

No comments:

Post a Comment