0% found this document useful (0 votes)
103 views3 pages

Research On Cybercrime and Its Policing

Being one among the foremost rapidly expanding sector, internet has become one among the most vital part of our life from work to entertainment there is no other way now but it comes with a price of our privacy and data. Cyber Crime in India has been rapidly evolving since the beginning of the technological era. Cybercrime are often defined as a criminal offense or an unlawful act where the pc is employed either as a tool, a target or both. Cyber-attacks have already caused considerable damage a

Uploaded by

Dhaval Chudasama
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views3 pages

Research On Cybercrime and Its Policing

Being one among the foremost rapidly expanding sector, internet has become one among the most vital part of our life from work to entertainment there is no other way now but it comes with a price of our privacy and data. Cyber Crime in India has been rapidly evolving since the beginning of the technological era. Cybercrime are often defined as a criminal offense or an unlawful act where the pc is employed either as a tool, a target or both. Cyber-attacks have already caused considerable damage a

Uploaded by

Dhaval Chudasama
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Review Article

iMedPub Journals American Journal of Computer Science and


2020
http://www.imedpub.com Engineering Survey Vol. 8 No.3:14

Research on Cybercrime and its Policing Dhaval Chudasama*, Darsh


Patel, Abhishek Shah and
Nihal Shaikh
Abstract
Being one among the foremost rapidly expanding sector, internet has become one
among the most vital part of our life from work to entertainment there is no other
way now but it comes with a price of our privacy and data. Cyber Crime in India has Computer Science Department, Indrashil
been rapidly evolving since the beginning of the technological era. Cybercrime are University, Mehsana, Gujarat, India
often defined as a criminal offense or an unlawful act where the pc is employed
either as a tool, a target or both. Cyber-attacks have already caused considerable
damage and amount to detail-retail banking, mainly through MasterCard and *Corresponding author: Dhaval
payment scams. Cybercrimes are affected by way of illegal access into another Chudasama, Computer Science Department,
data base, illegal interception, data interference, and system interference, misuse Indrashil University, Mehsana, Gujarat,
of devices, forgery and electronic scams. India, E-mail: Dhaval.chudasama@
indrshiluniversity.edu.in
Keywords: Cybercrime; Cybercrime and policy

Received: November 09, 2020; Accepted: November 23, 2020; Published:


November 30, 2020 Citation: Chudasama D, Patel D, Shah A,
Shaikh N (2020) Research on Cybercrime and
Introduction its Policing. Am J Comput Sci Eng Surv Vol. 8
No. 3: 14.
“Neither the internet nor Cyberspace will ever be a secure haven
for people that attempt this type of cyber-crime. The Secret
Service in conjunction with our enforcement partners, will hunt
you down, keystroke to keystroke.” comprehensive, secure and a safer approach. Given that technical
– Brian Marr measures alone cannot prevent any crime, it is important that
Now a day’s people cannot live without internet, smartphones or enforcement agencies are allowed to research and prosecute
the modern technologies and due to this cybercrime has grown cybercrime effectively [1].
substantially. Hackers develop methods which can breach into Cyber crime
the devices through vulnerabilities and take advantage of this
by stealing the data to use it for their own benefits. There are Cybercrime is criminal activity that either targets or uses a
multiple ways by which people are getting scammed and lose computer, a network or a networked device which can be hacked.
their money or sensitive data and this causes serious harm in Most, but not all, cybercrime is committed by cybercriminals or
India and around the world. hackers who want to make money. Cybercrime is carried out
by individuals or organizations. Few of the cybercriminals are
It was noted that in India, the IT act isn't intrusive, but Internet organized, use advanced techniques and are highly technically
service providers (ISPs) are statutorily sure to provide adjacent skilled. Others are novice hackers [2].
space for intelligence agencies. Canada, the UK, and Germany
were introduced laws that might restrict the liberty of the web. Rarely, cybercrime aims to wreck computers for reasons
The question of the adequacy of technical methods to police the aside from profit. These could be political or personal. It looks
web was raised, and whether a particular level of compulsion is legitimate-but with one click on a link, or one download of an
often introduced, since companies were most reluctant to move attachment, one wrong message, most are locked out of your
in this direction. The 2014 National Crime Records Bureau (NCRB) network. That link downloaded or opened software that holds
Statistics Report registered an entire of 9,322 cyber-crime related your data of the hostage. That’s a ransom ware attack. The
acts in 29 states and 300 such cases even in Union Territories attackers invite money or crypto currency, but albeit you pay, you
(UTs). These digits mark a 69.2 surge in States and 62.2 % increase don’t know if the cybercriminals will keep your data or destroy
in seven UTs from the previous year. The bulk of the cases have your files. Meanwhile, the knowledge you would like to run your
been registered under the IT Act, (Indian Penal Code) IPC and business and sensitive details about your customers, employees,
Special and Local Laws (SLL). and company are now in criminal hands. Ransom ware can take a
serious toll on your business. As day by day technology is playing
Making the online safer and secure (and protecting Internet in major role during a person’s life the cybercrimes also will
users) has become integral to the event of latest services also increase alongside the technological advances.
as governmental policy. The battle against cybercrime needs a

© Under License of Creative Commons Attribution 3.0 License | This article is available in: https://www.imedpub.com/computer-science-and-engineering-survey/ 1
American Journal of Computer Science and Engineering
ARCHIVOS Survey
DE MEDICINA 2020
ISSN 1698-9465 Vol. 8 No.3:14

Rate of cybercrime cases recorded (per 1 lakh population) in social media scams are on the rise. Cyberbullying is one among
2018 by states/UTs is shown in Figure 1 where Karnataka has the the most important social media fraud to which many teenagers
highest cyber-crime rate [3]. have fallen prey. Under cyberbullying social media sites are wont
to bully people. Also, there are many other social media frauds
sort of a Facebook friend fraud.
Online shopping frauds: It is one among the most important
internet frauds since the past few years. Under this, fraudsters
found out fake online shopping portals with the intention of
cheating innocent people of their hard-earned money. In the
website, they display attractive product at a really cheap rate.
But, after the acquisition is formed by paying the cash, either the
fake product is delivered or the merchandise isn't delivered in the
least. These websites won't have any return or refund policies
and also there'll be no customer support team to contact.
Figure 1: Rate of cybercrime cases recorded (per 1 lakh population) The role of police in fighting cybercrime
in 2018 by states/UTs.
It is very hard for police units to start out investigations due to the
Techniques cybercriminals use low visibility of such crimes and therefore the lack of reporting that
could happen due to different reasons: from the unwillingness
Internet Fraudsters are everywhere and that they come up with of commercial entities, especially financial companies to report
innovative tricks to cheat people and wipe out money from their to the police on account of reputational questions and negative
checking account. There are many techniques which hackers use publicity to the lack of knowledge that such a criminal activity
for committing crime but here we will discuss the most common could be reported or lack of trust in the police department (CSI
ways they use. and FBI, 2004, 19; Wall, 2007, 193). Because of the low reporting
Phishing or email scam: It is a way employed by fraudsters to rate, lack of resources and under-reporting law-enforcement
steal your personal information. Under this fraud, fraudsters send agencies haven't any possibility to research and prosecute quite
you send you emails by posting as a genuine or reputed company. a ‘tiny fraction’ (Vogel, 2007) of what is happening in cyberspace.
The primary intention of sending those emails is to steal your Moreover, it is very hard for police units to justify the impact on
bank details. These emails are to steal your bank details. These public interest of initiating an investigation, especially in the case
emails will usually have a link or attachment. If you click on those of a low impact, single crime with the one victim (Wall, 2007,
links, you'll be taken to a fake website. The fake website will ask p. 191). Since use of internet and ICT technologies provides
you to supply your sensitive information like card details, UPI offenders with the chance to make aggregated revenue with low
code and other bank details. Also, clicking on such links will cause impact on one victim (e.g. stealing 1 euro millions of times rather
an epidemic attack on your computer. than millions of euros only once), one of the most important
Lottery fraud: Lottery fraud is one of the highest three internet challenges for the police is the justification of a public order
frauds in India. Under lottery fraud, fraudsters call you or send breach and the initiation of investigatory procedures.
emails and messages stating you have won lottery money, you will Taking into consideration the demand for new skills to investigate
be asked to transfer money online in the name of tax. Sometimes crimes in cyberspace, the necessity to review policing concepts,
you'll be asked to pay money by visiting fake websites. When you such as the justification of a breach of public order, the
attempt to make payment using those websites, all of your card applicability of techniques in policing the important world to
details are going to be stolen. the upkeep of order in virtual space, implementation of those
Identity theft: Under fraud, your personal information is stolen instruments during a practical environment remains the very best
by fraudsters through the web and wont to apply for a private priority. And for this in Karnataka two stages training program
loan, two-wheeler loan or a MasterCard with a bank. When loans on how to deal with hacking, online harassment, credit/debit
are availed in your name, you'll be liable for its repayment. Banks card fraud, data theft etc., for ranks till the level of constable.
will send you the notice for repayment. If the loan isn't repaid it'll Though training Personnel remains the challenge when it comes
have a nasty impact on your credit score and you'll be marked a to dealing with the digital crime.
loan defaulter [4]. A number of police agencies have formed partnerships with
Also, the stolen information of yours is often wont to create fake computing departments at local universities. These partnerships
social media accounts. not only provide an opportunity to expertise the police, but also
function as a recruiting tool for college kids who have an interest
Social media scam: with the number of people using social media,

2 This article is available in: https://www.imedpub.com/computer-science-and-engineering-survey/


American Journal of Computer Science and Engineering
ARCHIVOS Survey
DE MEDICINA 2020
ISSN 1698-9465 Vol. 8 No.3:14

in cybercrime and policing. A knowledge hub thus are often using biometric scanning. Biometric scanning can be a good way
established which may also attract students to pursue a career in opening a new dimension for securing our data. There are
as cyber investigators. Also, for enforcement agencies at the multiple biometric scanners available, for instance IRIS scanner,
national, state, and native level, there should be a central referral fingerprint scanner and face recognition which can be helpful
mechanism for complaints involving cybercrime. In many cases, because currently we use PIN and Mobile Numbers for money
private corporations and special branches have more experience transactions and security. This convectional way can be breached
with cybercrime investigations than local police agencies easily and so we can use such biometric scanners to make digital
and henceforth, the Police can seek cooperation with private signatures which can be unique and cannot be replicate easily
corporations without compromising the security [5]. and so our privacy will increase, thus resulting in prevention of
cybercrime.
How ‘We’ as a citizen can prevent cybercrime
Government payment portals: Generally, payments are done
Cybercrime is not just Governments responsibility, we as a citizen using third party applications which attackers use as their
should also have to stay aware and try to defend ourselves from advantage by manipulating people to transfer money to them
cybercriminals. And we can achieve that by following some and are scammed easily. Although there are many government
simple steps: portals for money transactions people usually use easier ways,
• Use strong passwords: Use the various password and and so if government takeovers these third party applications by
username combinations for various accounts and resist the keeping records and also by monitoring the transactions which
temptation to write down them down [6]. can lead to more transparency and will ultimately result in less
crime.
• Keep your social media accounts private: Make certain that
you simply keep your social networking profiles (Facebook, Using AI (Artificial Intelligence) for the identifying threats: AI
Twitter, YouTube, etc.) private. Be sure to check your security can be a very powerful defender from the cyber criminals as it
settings. Be careful of what information you post online. can detect the problem in the vulnerability by analyzing its every
Once it's on the web it's there forever [6]. aspect millions of time within seconds. AI can help checking
emails before a person clicks on it by check its link on a fake
• Secure your mobile devices: Many of us aren't aware
server and if it a scam emails it can directly go to the spam folder
that their mobile devices also are susceptible to malicious
without the user even knowing it. Similarly, an AI can scan the
software, like computer viruses and hackers [6].
loopholes and identify all the vulnerabilities and if someone tries
• Protect your data: Protect your data by using encryption to attack that vulnerability it can automatically block it before the
for your most sensitive files such financial records, and tax attacker can breach it.
returns [6].
• Protect your identity online: When it involves protecting
Conclusion
your identity online it's better to be too cautious than not Computer security may be a vast topic that's becoming more
cautious enough. It is critical that you simply take care when important because the planet is becoming highly interconnected,
giving out personal ID like your name, address, telephone with networks getting used to hold out critical transactions. It is a
number and/or financial information on the web [6]. well-known incontrovertible fact that terrorists are using the web
to speak, extort, intimidate, raise funds and coordinate operations.
To report cybercrime in India, the first step is to file a complaint
The degree of our preparedness within the face of these potential
at the cybercrime cell in a police station of the city where the
threats does leave much to be desired. The Government should
crime has taken place, or where the device is located which was
also note of this slow but worrying development and put in situ a
affected or attacked by cyber criminals. You can go to the police
correct mechanism to curb the misuse.
station of your state or send a mail to the Police as they will
forward your complaint to the Cyber Cell or you can directly mail References
the complaint to cyber cell.
1. Biden JE (2011) Cybercrimes. SSRN Electron J: 1-14.
Innovations in cyber security 2. Tips on how to protect yourself against cybercrime.
As technology is advancing rapidly, the IT sector and computer Kaspersky.co.in, 2018.
security are getting more fragile and susceptible to risks 3. Kancharla B (2020) Almost 45% of the cyber-crimes reported
and threats. Going much beyond their regular activities, the in 2018 are from UP & Karnataka. Factly.in, 2020.
attackers are innovating and advancing their approach to steal
4. Advanced cyber security innovations and updates for 2020.
much complex data and knowledge. Right from credentials to
Technology Trends-medium.com, 2019.
misconfiguring cloud data, cyber security attacks are making life
tough for people within the IT sector. [4] There are few innovations 5. What is cybercrime and how can you prevent it? avast.com,
which can be helpful in cyber security sector which are: 2019.

Biometric scanning: Payments can be made more secure by 6. Shalini S (2019) How to prevent cybercrime in India? myadvo.
in, 2019.

© Under License of Creative Commons Attribution 3.0 License 3

You might also like