UNIVERSITY a daily basis. In the real

UNIVERSITY OF BARISAL                                                                                                                                              ASSIGNMENT BNB F                                                                                                  COMPUTER SCIENCE AND ENGINEERING     Course Title     Course Title:  Data Communication.

Course Code:  CSE-2207.Topic:   Cyber-Crime and it’s prevention.                                Submitted By : SadiaIslam, Roll: 16 CSE007.Joy Sarkar, Roll:16 CSE008.Department of Computer Science and Engineering.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Submitted To:,Tania IslamLecturer,Department of Computer Science and Engineering.Date Of Submission:  28 January,2018. Abstract:Todays world has become a parallel formof life and living.Here Public are now capable of doing things which were notimaginable few years ago. Internet has enabled the use of website communicationand a lot of anytime anywhere the IT solutions for the betterment of humankind. Cyber crime is a very serious threat. Governments, police departments andintelligence units have started to react cyber threats. In this paper, we willtry to discuss about cybercrime in detail including the types, methods,technical reasons and adverse impact of cyber crimes on a network as well asthe behavior , psychology behind this crime & some effective solutions .

 Introduction :Crime  have been associated with mans  fall.1 This Crime remains elusive and everstrives to hide  in the face ofimprovement. Different nations have different strategies to contend with crimedepending on their nature and extent.

It has leaves a negative social andeconomic consequence. Cybercrime is a crimes committed on the internet usingthe computer as either a tool or a targeted victim. It is very difficult toclassify crimes in general into distinct groups as many crimes involves on adaily basis.  In the real world, crimeslike hacking, murder or theft need not  necessarilybe separate.  All cybercrimes involveboth the computer and the person behind it as victims.

For example, hackinginvolves attacking the computer’s data . It is important to take note thatcyber crime occurs in many cases and it is not possible to classified aappropriate classification system.Cyber Crime :Cyber crimeis the latest  the most complicatedproblem in the cyber world. “Cyber crime  said to be those species, of which, genus isthe daily crime, and where either the computer is a subject of the conductconventional crime”. “Any criminal operation that uses a computer  target or a means for enternalize furthercrimes comes within the of cyber crime” . The computer may be used as ainstrument in the following kinds of activity- financial crimes, pornography,online gambling,hacking, computer information hacking crime, email spoofing,  cyber defamation, cyber stalking. The computermay however be  act the following cases-unauthorized access to  computernetworks,and the information contained in the electronic form, data didling,salami attacks,  web jacking, theft ofcomputer system, physically damaging the computer system.

Reasonsfor Cyber Crime : Thereare many technical reasons behind these crimes. The threats of cybercrime to thenetwork security are not only for several organizations, but can be observedall over the world indifferent countries Some technical reasons behind cyber crimes are as follows:•     Lack of reporting and standards3•     Tough to identify3•     Limited media coverage.3•     Least marginal cost of online activity due to global  reach.3•     A very few rate of Official investigation and criminalprosecution3•     Capability of computer to store data in comparatively smallspace.

4•     Easy to access4•     Complexities in operating systems code4•     Lake of evidence4•     Negligence4•     Loopholes in systems5           confidentialCyberCriminals :  The cyber criminals constitute of various groups/ category.This division may be justified on the basis of the object that they have intheir mind. The following are the category of cyber criminals 1. Children and adolescents between the age group of 6 –18 years :The simple reason for this type of offender behaviour pattern inchildren is seen mostly due to the curiousity to know and search thethings.  Other akin reason may be toprove themselves to be outstanding amongst other children in their group. 2. Organised hacker: These kinds of hackers are mostlyorganic together to fulfil certain objective. The reason may be to fulfil theirpolitical bias, superstition, etc.

The Russian are said to be one of the bestquality hackers in the world..  The NASAas well as the Microsoft sites is always under attack by the hackers.

3. Professional hackers / crackers  Their work is inspires  by the colour of money. These kinds of hackersare mostly employed to hack the site of the competing and get credible,reliable and valuable information.

Further they are ven employed to damage thesystem of the employer basically as a measure to make it safer by discover theloopholes. Different types ofcyber crime:Fraud andfinancial criminal:Computer fraud is any dishonest misrepresentation of fact intendedto let another to do or refrain from doing something which causes loss. In thiscontext, the fraud will result in obtaining a benefit by:·        Altering in anunauthorized way. This requires little technical expertise and is common formof theft by employees altering the data before entry or entering false data, orby entering unauthorized instructions or using unauthorized processes;·        Altering,destroying, suppressing, or stealing output, usually to conceal unauthorizedtransactions. This is difficult to detect;·        Altering  stored data;.Datadiddling:This kind ofan attack entangle altering raw data just before a computer processes it andthen changing it back after the processing is completed. The electricity boardfaced similar problem of information diddling while the department was beingcomputerised.

 Denialof Service attack: The computer of the oblation isflooded with more requests than it can handle which cause it to crunch.Distributed Denial of Service(DDoss)attack is also a type of denial of service attack, in which the criminals arewide in number and widespread. E.g.

Amazon, Yahoo. Webjacking: This term Web jacking is derived from the termhi jacking. In these kinds of crime the hacker gains access and control overthe web site of another. The hacker may even mutilate or change the informationon the site.8  This  occurs  political objectives or for money. Hererecently the site of MIT (Ministry of Information Technology) was hacked by thePakistani hackers and some obscene matter was placed therein.25 After thatthe site of Bombay crime branch was also web jacked.5 There are Another caseof web jacking is that of the ‘gold fish’ case.

In this web jacking case thesite was hacked and the data pertaining to gold fish was changed. Thus the webjacking is a process whereby control over the site of another is made backed bysome consideration for it.2Awareness:As technology advances huge people rely on the internet tostore sensitive information such as banking or credit card information,criminals are going to attempt to steal that information.

Cyber-crime is agreat threat to people across the world. Raising awareness about howinformation is being protected and the tactics criminals use to steal thatinformation is very important today. According to the FBI’s Internet CrimeComplaint Center occurs in 2014 there were 269,422 complaints filed.

4 Withall the claims combined there were a reported total loss of $800,492,073.6Butyet cyber-crime never seem to be on the average person’s radar. There are morethan 1.5 million cyber-attacks annually, that means that there are over 4,000attacks a day, 170 attacks every hour, or nearly three attacks every minute,with studies showing us that only 16% of victims were carrying out the attacksto stop.5 Anyperson who uses the internet for any reason can be avictim,  it is important to be aware ofhow one is being fully protected while online.7 Prevention of CyberCrime: We knowthat  Prevention is always better thancure.

  We should keep in mind thefollowing things.1.    For prevent cyber stalking avoid disclosing any information pertaining toone self. This is as good as disclosing anyones identity to strangers in publicplace. 2.    It is urgent to avoid sending any photograph online particularly tostrangers and chat friends as there have been incidents of misuse of thephotographs.3.

    Everyone must use latest and update antivirus software to guard againstvirus attacks.4.     It is necessary always keep backup volumes so that one may not suffer data loss in case of virus contamination 5.     Never send someones credit cardnumber to any site that is not secured, to guard against frauds.6.     Always keep a watch on the sitesthat  children are accessing to preventany kind of harassment  of children. 7.    At last  It is better to use asecurity programme that gives control over the cookies and send informationback to  the site as leaving the cookiesunguarded   Conclusion:Human mindscapacity is ambigious.

It’s also true that It is not possible to extract cybercrime . But It is quite possible to check them. Technology acting to make thiscrime more effective to battle cyber crime.  We can not think our daily life withoutcomputer as well as internet. The advantages of internet and computer can notbe explained in one word. But they have also some fault as like cyber crimes.Its also became a part of our life.

Criminals and victims both are the part ofour society. Now, the rate of various types of cyber crimes increases rapidly.It must be reduced by keeping proper steps that’s are already discussed in thispaper for keeping safe our personal and private data and information ,ensurethe security of all types of websites and making our  society clean & peaceful.References:1 https://study.

com/academy/lesson/what-is-cybercrime-definition-history-types-laws.html2 . www.




I'm Simon!

Would you like to get a custom essay? How about receiving a customized one?

Check it out