Preview

Cyber Crime

Powerful Essays
Open Document
Open Document
2134 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Crime
The Endless Fight with Cyber Crime

By Rahul Tyagi

About Author

Rahul Tyagi is one of the top computer security experts available in
India, Brand Ambassador of TCIL-IT Chandigarh, Vice- President of
Cyber Security and Anti-Hacking Org, India, and Technical Head of
News Paper Association of India.
Website:- www.rahultyagi.net Mail:- officialrahultyagi@gmail.com

My Self Rahul Tyagi and like others, I love the internet and yes it’s true, think about everything it brought to us, think about all the applications – services we use, all the technology like Smart Phones like iPhone 4 with internet, which help us to grab the world in our palm, and I feel good that it’s happening during my and your lifetime. Internet exists from era in the world but few years will be remembered as the years that got online (2008-11), in these years we build something truly global. Think once again about Facebook,
Twitter, PayPal, Google and many more, these services are like breath to us today and we cannot really survive without them.
But it also true that along with these facilities our cyber world have problems, very serious problems, problems with security, problem with privacy and information. I am spending my carrier by awareing people from these threats. In this paper i am not going to show Big
Defacements, A Customized Crypter coding etc or something else, because I don’t think so that it is my job. My job is to show something which really affects the cyber society and I think this paper will help you to gain knowledge about the global crime and criminal strategies.

So to understand the crime scenario lets go back to 1986. This below is a picture of a famous virus called Brain.A. This virus was the first

PC virus we have ever incurred for the PC.

What was

Funny part in that actually we know where it came from because it said so. If you see the boot sector of the virus carefully. It says
“Welcome to the Dungeon, 1986 Basit-Amjad (pvt)

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NOT: If you look and sound professional while working, you are more likely to be taken seriously and promoted.…

    • 6000 Words
    • 24 Pages
    Satisfactory Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Look, no one is perfect. In actuality, our biology has rendered us suboptimal; at best. Yet, for the first time in history we have the opportunity to change that. We can steal fire from the gods. Technology and biology combine to form a singularity- a deviation from the meandering path of evolution. But in doing so, will we be fundamentally changing what it means to be human? Many people elicit fear, even outrage when asked if genetically altering who we are is ethical. Biomedical enhancements are already here, so just saying no isn't an answer.…

    • 322 Words
    • 2 Pages
    Good Essays
  • Good Essays

    English 101 Notes

    • 794 Words
    • 4 Pages

    Show, NOT tell! Showing uses more words. Use action verbs and not adjectives or adverbs.…

    • 794 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    1. Computers can be used in a variety of roles in crimes. Each of these roles can raise novel investigative and prosecutorial issues because of the unique attributes of computers…

    • 238 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Crime in America

    • 624 Words
    • 3 Pages

    Some of the crimes whose primary target is the computer or devices within the computer include computing or creating viruses, malicious and malware codes and denial of service attacks. On the other hand activities that would fall under the second category include identity theft, cyber stalking, information warfare and fraud (Siegel, 2008).…

    • 624 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cyber Crime in America

    • 2352 Words
    • 7 Pages

    Cyber-crime is becoming a massive problem for citizens and businesses. Every day there is a hacker that gets into a computer system and causes trouble. It’s all due to businesses and individuals being careless with their computer security. People need to start realizing this is a serious issue and can affect anybody. There are numerous steps that need to be taken in order to protect individuals and businesses security. Hackers are getting smarter and want to find new ways to infiltrate your computer system. They want to find ways to get to your files and your credit card information. Hackers find new ways to get into our computers every day and know the ins and outs of computers. These hackers have the ability to shut down a national company that specializes in computer security. There are so many terrible things that these hackers can do to your computer. We need to take the proper steps to protect ourselves and to ensure that the hackers do not harm us or our computers.…

    • 2352 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Law It Act

    • 13677 Words
    • 55 Pages

    New communication systems and digital technology have made dramatic changes in the way we live and the need to transact our daily business. There is a remarkable change in the way people transact business. Businessmen are increasingly using computers to create, transcript and store information in electronic form instead of traditional paper documents. It is cheaper, easier to store and retrieve and speedier to communicate. Although people are aware o the advantages which the electronic form of business provides, people are reluctant to conduct business or conclude and transact in the electronic form due to lack of appropriate legal framework. Electronic commerce eliminates need for paper based transaction. The two principle hurdles which stand in the way of facilitating electronic commerce and electronic governance are the requirements of writing and signature for legal recognition. At present many legal provisions assume the existence of paper based records and documents which should bear signatures. The Law of Evidence is traditionally based upon paper based records and oral testimony. Hence, to facilitate e-commerce, the need for legal changes has become an urgent necessity. International trade through the medium of e-commerce is growing…

    • 13677 Words
    • 55 Pages
    Powerful Essays
  • Satisfactory Essays

    Cyber Crime

    • 368 Words
    • 2 Pages

    Crime is global issue and for years researchers and law enforcement agencies have tried to determine why people choose the lifestyle of crime. They have theorized it down to social economics. But not all criminals commit crimes because of life disadvantages. Some criminals are adventure seekers and they seek the thrill and adventure of committing crimes and getting away without detection. Crime causation theories can vary. Some people believe that concentrated poverty is the cause of crime. Others tend to believe that criminal behaviors manifest it due to negative reactions to ordinary human characteristics. They even go as far using substance abuse and mental health issues as a large determining factor for criminal activity.…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cyber Crimes in India

    • 7056 Words
    • 29 Pages

    THIS IS TO CERTIFICATE THAT Sarvansh Sharma HAS WORKED UNDER MY SUPERVISION FOR THE PREPARATION OF HIS PROJECT REPORT ON Internet & Cyber Crime –Evidence handling & Retention.…

    • 7056 Words
    • 29 Pages
    Better Essays
  • Good Essays

    Hacking and Cybercrime

    • 730 Words
    • 3 Pages

    The Symantec Global Internet Security Threat Report noted a shift in malicious activity to be emerging. The growing level of malicious code activity has also resulted in the proposal of a new cybercrime bill. Malicious activity tends to increase in rapid growth in broadband infrastructure and connectivity. In January 2010, reports emerged that dozens of large companies had been compromised by attackers using the Hydra Trojan. Typically, this type of attack begins with some reconnaissance on the part of attackers. Typically, this type of attack begins with some reconnaissance on the part of attackers. This can include publicly available information about the company and its employees, such as from social networking sites. This information is then used to create specifically crafted phishing email messages, often referred to as spear phishing, that target the company or even specific staff members. These email messages often contain attachments that exploit vulnerabilities in client-side application or links to websites that exploit vulnerabilities in web browsers or browser plug-ins. In 2009, 60 percent of identities exposed were compromised by hacking attacks. Which are another form of targeted attack. The hackers gained access to the company payment processing network using an SQL injection attack. The attackers then installed malicious code design to gather sensitive information from the network, which allowed them to easily access the network at their convenience. The attacks resulted in the theft of approximately 130 million credit card numbers. Web-based attacks have replaced the mass mailing worm in this position. Attackers may use social engineering, such as in spam messages, to lure a user to a website that exploit browser and plug-in vulnerabilities. These attacks are then used to install malicious code or other applications such as rogue security software on the victim’s computer. Four of the top five…

    • 730 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Electronic Gadgets

    • 451 Words
    • 2 Pages

    Television and Internet has brought the world together. We all are citizens of a large global village. Computers and laptops are now part of commercial life at all levels. Corporate offices, business houses, railways, banks, post offices are dependent on computers. Work, which used to take hours to complete are just done with a click of mouse. And you can carry your office with you where ever you go that is if your spouse has no objection.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Internet Crimes

    • 975 Words
    • 4 Pages

    | The approach that an organization takes to providing service and addressing the needs of customers.…

    • 975 Words
    • 4 Pages
    Good Essays