Introduction
A cyber- crime is when a virus or malware transpires to another component of a computer to corrupt a network. Cyber-crime can vary from computer, to phones, GPS system, or even ATM machines etc. Hacker would use a computer or mechanical devices as a tool or target. There are many forms of criminal activities that needs to exclude in order to secure and safer guard from defamation, fraud, theft, mischief etc. Therefor most of this criminal activity comes within our judicial jurisdiction (Indian Penal Code). There are two forms of cyber criminals, one in where a computer is misused to corrupt other computer, this is called a target. Such as virus/worm, hacking, DOC etc. Another form of crime is a computer used for implementation
…show more content…
Threats are not only affecting the applications and online transaction but they are growing into our new technology such as on-board system, home automation and digital devices etc. There are three main sources of treat unavailability, damage to data and damage to the image. Highest number of threats to personal assets are scams or stolen data, however there are other source that need full attention like theft of phones, GPS., telephone etc. Systems are being hacked is due to security flaws in database, personal transaction and lack of tight attention of fake website. The main reason threats are occurred to obtain and profit information to exploit the corporation or the government. Many of recent product are getting expensive due to suffocated design and protection from unwanted malware or virus. On October 29, 2006 the Hindu newspaper published a new report on a cyber-terrorism. Police investigation team announced a suspect of treating President and Prime Minister. Suspect created Hotmail address between 2.30 to 4.15 and message was sent along that period. The suspect used the internet cafe to make fake account and then threaten the President and Prime Minister. All the hard discs were given to the Center for Development of advance to investigate the forensic analysis. Such threats have been noted to center. It became an important component of National Security Management …show more content…
Several sophisticated technologies and infrastructures are prime targets for cyber-terrorism. Large Multi-Nation Corporation spent millions to secure database, information and recent activities. Many banks in India are facing greater risk of hacking by unknown group of people. Many cyber criminals are trying to be anonymity them self by adding more layers to disguise their identities. Overall bank corporate in India has improved their security from malwares etc. Many of customer’s are using their phone to make a transaction to their account. Which is creating a higher jeopardy of alien hackers to steal and use one personal bank statement and pin number etc. UK government spends around 850 million pounds to tackle cyber-crime and secure internet and network by unknown origination. One of the major concerns of cyber-crime is complexity. Complexity is the best friend of all hackers, the more complex the network. The easier it is for them to hack into the system. Having changes in system or network will improve chances of hacker to expose the content or steal important database. Securing the door locked may help the threats being away, however there so many doors opened, one will likely end up opening a door. Having security sealed is very difficult as operation and high- skilled hackers would enjoy cracking suffocated and complex systems for external