Thursday, March 7, 2019
Cybercrime â⬠computer crime Essay
1.1BackgroundCyber offensive practiseivity is also c entirelyed calculator plague. The use of computers as an instrument to further illegal ends, such as committing fraud, trafficking in peasant pornography and intellectual property, stealing identities, or violating covert is cyber discourtesy. Cybercrime, especially by means of the lucre, has grown in importance as the computer has become primal to commerce, envisiontainment, and government.1 New technologies creates new criminal opportunities because of the early and widespread adoption of computers and the earnings, these geezerhood computer crime has been a growing issue even present in Nepal.1.2 Statement of ProblemThe development on information engine room and cyberspace made the demesne as a small orbiculate village. People mint get access right finished the world from their home with internet. The trends of global terrorism ar also changed by exploitation such IT. Cyber crime as a new weapon becomes a cap ableness threat in planetary peace. In particular, this paper is pore on cyber crime, its effects, challenges and impact of cyber crime on global guarantor.1.3Objectives of the Studya. To whap how far cybercrimes ar occurring in Nepalb. Cyber crime in Nepal and the police force into pull upc. To learn close to cyber surety1.4Importance of the StudyThe research work is fundamentally useful for all researchers and learners who are willing to study about cyber crime. It is equally beneficial to armed and police forces, the students of strategic studies, political science, history and international relationship. Cyber crime, at present is being a great challenge in each and each development sector. So, it will be useful for the planners and polity makers too.1.5Limitation of the StudyIt is because of duration constrains the research is limited in studying on cyber crime, its effects and cyber security only. However, broaden concept of cyber crime has been drawn in the stud y. Field visit was very costly in terms of prison term and resources, so only secondary sources (data) have been utilize to complete the study. It is specifically focused on identifying the causes, objectives, and impacts of cyber crime, the development in cyber space and information warfare, and potential threat in international peace. At last various measures for combating it and recommendations.1.6MethodologyIn this study, descriptive and analytical method has been chosen. Because of the time constrains, the data has been used in the research work are based on secondary sources. They were obtained through books, and World Wide Web sites.CHAPTER IIHISTORY OF CYBER villainyThe prototypal recorded cyber crime took place in the year 1820. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a serial of steps in the weaving of special fabrics. This resulted in a vexation amongst Jacquards employees that their handed-down employment and livelihood were being threatened. They committed acts of antagonise to discourage Jacquard from further use of the new applied science. This is the first recorded cyber crime. In Nepal, business houses, organizations started using electronic materials and computers where government was lacking in electronic rules and regulations. There is no exact date recorded for the first cyber crime in Nepal till date. But we spate see legion(predicate) spate being the victim of cybercrime. Especially in Nepal, many re instantlyned companies are receiving emails from proxy mailing address demanding for money. Beside this, hacking websites of banks, newspaper and face book accounts, embarrassing girls and uploading images in porn sites, sales of pirated CDS and DVDS are the most commonly full cybercrime in Nepal.CHAPTER IIICATEGORIES OF CYBERCRIMEBasically we can categories cybercrime into two types(a) The computer as Target using of computer to attack a nonher computer same(p) hacking, virus/ worms attacks.(b) The computer as a weapon using a computer to commit real world crime uniform cyber terrorism, citation card fraud and pornography, DoS attack and many more.2CHAPTER IV cause OF CYBERCRIMEAs the world goes mobile, cybercrime follows. Criminal withdraws advantage of technologies and internet in many ways to commit crime which is very hard to control by solo effort. Some of the effects of cybercrime that is frequently occurring in Nepal are as follows (a) HackingThis is a type of crime wherein a soulfulnesss computer is broken into so that his personalised or sensitive information can be accessed. This is different from ethical hacking, which many organizations use to check their Internet security protection. In hacking, the criminal uses a variety of software to enter a persons computer and the person may not be aware that his computer is being accessed from a remote location.(b) thieving This crime occurs when a person violate s copyrights and downloads music, movies, games and software. There are even couple sharing websites which encourage software piracy and many of these websites are now being targeted by the FBI. Today, the justice system is addressing this cyber crime and thither are laws that prevent people from illegal downloading.(c) Cyber Stalking This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking on with cyber stalking to make the victims lives more miserable.(d) Identity Theft This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber crime, a criminal accesses data about a persons bank account, belief cards, Social Security, debit card and a n some some other(prenominal) sensitive information to siphon money or to buy things online in the victims name. It can result in major financial losses for the victim and even spoil the victims credit history.(e) Malicious Software These are Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system.(f) Child soliciting and affront This is also a type of cyber crime wherein criminals solicit minors via yack away rooms for the purpose of child pornography. The FBI has been spending a lot of time monitoring chat rooms frequented by children with the hopes of reducing and preventing child contumely and soliciting.CHAPTER VCYBER SECURITY AND ITS ADVANTAGES5.1Cyber securityCyber Security involves protection of sensitive personal and business information through prevention, detention and response to different online attacks. The mea sures of applying cyber security are as follows (a) Privacy Policy Before submitting your name, e-mail address, on a website look for the sites privacy policy.(b) Keep Software Up to go steady If the seller reduces patches for the software operating system your devices install them as before long as possible. Installing them will prevent attackers from being able to take advantages. Dont choose options that will allow your computer to mobilize your passwords. (c) Disable remote connectivity Some devices are equipped with wireless technologies like Bluetooth that can be used to connect to other devices.You should disable these features when they are not in use.5.2Advantages of Cyber SecurityThe advantages of cyber security are mentioned on a lower floor (a) The cyber security will defend us from critical attacks. (b) It will defend us from hacks and virus.(c) Internet Security processes all the incoming and outgoing data on your computer. (d) Application of cyber security used in our PC needs modify every week. (e) It helps us to browse the site, website.CHAPTER VICYBER LAW IN NEPALNepal has go a step further in the information and communication technology (ICT) as the government has promulgated Electronic motion Act-2063 and Regulations, legalizing all electronic transactions and digital signatures. 4 Cyber law or Electronic Transaction Act earnly defines the rights, duties and authorities of the subscribers, network service provider, etc. The act had provision of separate bodies, IT Tribunal and Appellate Tribunal. The both look into all cases related to computer crime and the cyber crime. The IT tribunal is headed by the District hail Judge and has 3 members. The main purpose of this act (law) is to legalize the electronic transactions and digital signatures for both private and public transactions, protecting the electronic documents from the unauthorized access and to control the illegal activities or the cyber crimes. This act has 12 sections and 79 clauses. Electronic Transaction Act 2006 is here to fore intercommunicate in the capacity of cyber law. The Cyber law 2006 dictates the limitation for complaint within 35 days of first knowhow of crime and breaching of the cyber law. The punishment varies from Rs. 50000 to Rs. 300000 penalty and 6 months to 5 years imprisonment as the attempts to discourage the cyber crime.CHAPTER VIICHALLENGES IN CYBER CRIMEThough there is cyber law in Nepal, but yet there are many challenges in investigating Cybercrime due to a. Internet and the computers as the Sceneof Crime there are many types of computer crime that exist, as well as the legal and technical challenges that face law enforcement and prosecutors in their efforts to combat this crime. b. Investigators skills (not trained) to combat cyber terrorism. c. knowhow of cyber securityd. high tech crimes and confusionse. Low participation of tech groups and less co-operation of resource groups f. Imitation of traditional perspective for defining cyber crime. A challenging aspect of cybercrime is its nonlocal character actions can occur in jurisdictions separated by vast distances. g. Creating a Safer reading Society by Improving the Security of Information Infrastructures.CHAPTER VIII passMany people has become the victim of cybercrime especially girls, celebrities, politicians and many other renowned personalities. Its a well known saying that bar is always better than cure, Therefore, it is always better to take legitimate precaution beforehand rather than regretting afterwards. Whosoever is accessing the net should take Safety and privacy activation on companionable net working site. Some of the safety measures are mentioned below a. Stay informed, pay attention to news sources to learn about upstart threats and websites that have been attacked. b. Be careful, to never enter private or financial data into websites that gullt show proof of security. c. Clean and clear your internet cache, lost fragments, o rphaned registry keys, temporary files, deleted email messages, and other temporary files on your computer often. d. Google yourself and make sure there is slide fastener out there that gives out too many details about you. e. Never provide your credit card number as a prooff. Report abuse, if you are stalked or harassed online, dont respond to the attacker. Instead keep a record of the communication theory and report the abuse to the websites administrator.CHAPTER IXCONCLUSIONThere are book investigative law enforcement agencies, District Police Offices of Police Headquarters or Local Police office, Metropolitan Crime Division who are working against cybercrime and the criminals. Cybercrime is indeed getting the recognition it deserves. However, it is not going to be dependant that easily. In fact, it is highly likely that cybercrime and its hackers will continue developing and upgrading to plosive consonant ahead of the law. So, to make us a safer we must need cyber security. Moreover, every individual most apply the possible way to stay alert.ACRONYMSFBI- federal official Bureau of InvestigationDoS- Denial-of-ServicePC- Personal ComputerIT- Information engineeringCD-Compact criminal recordDVD-Digital Versatile Disc / Digital Video DiscICT-Information and Communication TechnologyBIBLIOGRAPHYa. http//www.britannica.com/EBchecked/topic/130595/cybercrime b. http//www.bezaspeaks.com/cybercrime/history.htmc. http//www.slideshare.net/aemankhan/cybercrimeppt-27376284 d. http//www.slideshare.net/aemankhan/cybercrimeppt-27376284 e. http//egovernancenepal.blogspot.com/2007/03/cyber-law-electronic- transaction-act.html f. http//www.crossdomainsolutions.com/cyber-crime/g. http//www.spotlightnepal.com/News/Article/-Cyber-Law-And-Its-Challenge- h. http//www.ekantipur.com/2014/05/25/oped/cybercrime-without-cyber-rules/390001.html i. http//www.thehimalayantimes.com/fullNews.php?headline=Journo+charged+with+cyber+crime&NewsID=38http//setopati.net/politics/1775/0963 j. http//mybhaktapur.com/2011/12/20/nepal-police-arrests-facebook-mis-user-for-cyber-crime/ k. http//www.thehimalayantimes.com/fullNews.php?headline=Cyber+criminals+to+target+mobile%26sbquo%3B+social+in+2014&NewsID=401622 l. http//surendraphuyalnepal.wordpress.com/m. Kantipur Dailyn. Nagarik Dainiko. A Guide to Computer Crime from legal.practitioner.comp. international Journal of Cyber Criminologyq. Cybercrime Nepalese Prospective by Nepal Policer. Moore, R. (2005) Cyber crime examine High-Technology Computer Crime, Cleveland, Mississippi Anderson Publishing.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment