Published on 25th January 2025
Authored By: Nuha Hajira.K
School Of Excellence In Law, Chennai
ABSTRACT
Cybercrime was as unimportant to write about a generation ago as changes in the futures market or quantum physics. It is now a major plot point in many novels. The primary reason for the increase in cybercrime rates is the internet’s explosive growth. In our digital age, everything has moved online. We use the internet to help us complete our tasks, whether it’s for information access or data storage. As we become increasingly involved with the online world, we become more vulnerable to cyber threats.
This article provides an overview of the definition and evolution of cybercrime. There are also some noteworthy examples of cybercrime mentioned.
The rates of cybercrime in India and other nations are compared in this article, which indicates that they appear to be increasing yearly. The increase in cybercrime rates is depicted in a bar graph.
The article covers the rules governing computer crime in India and other nations, as well as preventive measures to reduce cybercrime rates.
Key Words
Cybercrime, IT Act, history of cybercrime, case laws relating to cybercrime, impact of cybercrime, preventive measures for cybercrime
INTRODUCTION
Cybercrime was as unimportant to write about a generation ago as changes in the futures market or quantum physics. It is now a major plot point in many novels. We are always being attacked, whether it’s by a college student using Facebook to catfish others, criminal gangs using phishing to acquire personal information to sell on the dark web, or the daily SMS instructing us to click a link in order to confirm a payment or get a reward. Everywhere we look—identity theft, pension scams, those strangers who monitor our kids on TikTok, etc.—someone is attempting to use the technology we rely on against us.
Crime is one of the many facets of our lives that are controlled by the microchip. These days, computers are used to commit the majority of crimes, from multibillion-dollar financial fraud to internet stalking. Cybercrime is defined as illegal conduct that aims to compromise the security of computer systems and the electronic data they manage. Cybercrime is the term used to describe any illegal conduct that involves or is related to the use of a computer system or network, including the unlawful possession, provision, or distribution of information via a computer network. The computer and the crime are the two components of computer crime.
Over 50,000 instances of cybercrime were recorded in India in 2020, according to a Statista poll, a significant increase from the previous year. Karnataka and Uttar Pradesh had the highest percentages during the period under study. Karnataka and Uttar Pradesh had the highest percentages during the period under study. The northern state of Uttar Pradesh recorded over 6,000 cases of cybercrime in 2018, which is more than the national average. The following year, Karnataka, India’s IT state, did the same. The majority of these complaints were made with the goal of financially or sexually abusing persons under the Information Technology Act.
LITERATURE REVIEW
Before the internet was created, cybercrime did not exist, but as we move into the age of artificial intelligence, cybercrime becomes more prevalent. In fact, an amendment to the IT Act is proposed every other year to prevent computer-based crime and to give it a closer look. Only after cybercrime has increased are digital forensics and evidence taken into consideration in court.
In her book Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth, Theresa Payton poses the question, “How do you police something you don’t know is a crime?” In the past, the only way to rig an election was to take enough votes from recently deceased individuals. These days, influence can be quietly poured into people’s eyes without them realizing it. Deepfake videos, cyber troll farms, and AI viruses are the signs of a war that most people, including those defending us, are unaware is happening.
According to Kevin Mitnick’s book The Art of Deception: Controlling the Human Element of Security, the cybersecurity axiom states that people are a computer network’s weakest link. Kevin Mitnick authored the book on taking advantage of such vulnerabilities, whether they are related to phishing emails or a phone call “from the bank” claiming they are phoning over a fraudulent transaction. Among his many hacking-related works is the intriguing biography Ghost in the Wires.
HISTORY
Hackers trying to get access to computer networks were involved in the first instances of cybercrime. Others used it to obtain sensitive or vital information, while others did it purely for the thrill of breaking into high-security networks. Hackers eventually started introducing computer viruses into networks, which led to failures on computers in homes and offices.
Malicious programs or code known as computer viruses have the ability to propagate, tamper with data, and damage or even destroy machines. When computer viruses are widely used, like in government, hospital, or bank networks, cyberterrorism may be applicable. Additionally, computer hackers engage in phishing scams that request bank account information and credit card fraud.
The first cyberattack is thought to have occurred in France in 1834, long before the internet was invented. Attackers grabbed financial market data after breaking into the French telegraph network. Since then, there has been a significant surge in cybercrime, which is typified by an interesting development of methods, techniques, and strategies that are all employed for negative purposes.
However, cybercrime did not begin to gain traction until the mid-1900s. The digital revolution encouraged cyber criminals to use technology early on.
They developed new, crafty methods to steal money and data from people and businesses by applying their creativity and forethought.
1962
Allen Scherr’s cyberattack against the MIT computer networks, which involved punch card password theft from their database, marked the beginning of the modern era of cybercrime.
1971
The first computer virus was created as a research project by Robert Thomas of BBN Technologies. The Creeper Virus, a self-replicating program that was first identified on the ARPANET in 1971, foretold that subsequent viruses might cause significant damage to computer systems.
1981
Ian Murphy was the first person ever convicted of committing a cybercrime when he was able to enter AT&T’s internal networks and change the clocks on their computers, causing havoc.
1988
The first major cyberattack on the internet was carried out by Cornell graduate student Robert Morris. The “Morris Worm” targeted the Internet before the World Wide Web was launched when academic experts controlled it. It attacked computers at UC Berkeley, NASA, Stanford, Princeton, Johns Hopkins, and Lawrence Livermore Laboratories, among other colleges.
The 1990s: Contemporary Technology Fuels New Crime
Some of the best communication technologies in history emerged in the 1990s as a result of the internet connecting people worldwide and across multiple communication networks.
However, the news wasn’t entirely good. The rise in cybercrime was facilitated by these advancements.
When these new technologies were being developed and put into use, trust and safety precautions weren’t given top attention, which was exploited by hackers and other bad actors.
Since cybersecurity was neither a name nor an active field in these early days, the main focus was on creating innovative apps for communications and commercial efficiency. However, a shadow economy was progressively becoming more powerful.
Rising rates of cybercrime suggested that hackers were seizing fresh opportunities and developing creative strategies to break into networks without permission and alter data online.
1994
In order to gather research data that was used as attack instructions for war jets, a 16-year-old British youngster and his accomplice, Datastream Cowboy, and Kuji, used a “password sniffer” program to execute a series of attacks against the Air Force’s Rome Laboratory.
1995
Vladimir Levin was the first known hacker to try to take over a bank, and a fairly large one at that. He was able to enter Citibank’s network and engaged in a number of illicit actions there. He transferred almost $10 million in total into many accounts at banks across the globe.
One of the most well-known hackers in history, Kevin Mitnick, had to exploit insiders and manipulate others to gain access to Motorola, Nokia, and other massive networks.
1998
Max Butler, a security consultant for the FBI and others, broke into US government websites under false pretenses. The US Air Force informed officials of his offenses, and he received an 18-month sentence. He was then sentenced to a record-breaking 13 years in prison as a hacker for yet another illicit endeavor.
Computer viruses were largely unknown to the general public until the Melissa Virus struck in March 1999, affecting users worldwide, corrupting their Microsoft document files, and causing an estimated $80 million in losses.
CYBERCRIME HAS INCREASED IN THE NEW MILLENNIUM
The first decade of the new century saw an increase in sophisticated attacks and a proliferation of advanced persistent threat actors (APTs), the majority of which were financed by nation-states. Important sectors of the global digital economy were severely harmed by new viruses and worms brought on by the rise in cybercrime.
All computer users were concerned about cybersecurity at the end of the decade, but large corporations and governmental organizations were especially concerned since they stood to lose the most.
2000
A 15-year-old hacker going by the online moniker “Mafiaboy” launched many distributed denial of service (DDoS) attacks against some of the largest commercial websites in the world, such as Amazon, Yahoo, CNN, and eBay. These businesses lost millions of dollars as a result of the attack, which also caused the websites to fall down for hours in some situations.
2005
A security breach at a U.S. location exposed the personal data of 1.4 million HSBC Bank MasterCard users.
2008
The data of 134 million people was exposed in one of the greatest breaches ever, which attacked Heartland Payment systems using a combination of malware, password sniffers, and SQL injection.
2010s: An Increase in Cyberattacks
Cybercrime has risen from a tiny sector to a huge one in the last ten years. Every day, the number of attacks and the frequency of cybercrime increases as attackers create new dangerous software and methods. On it, trillions of dollars were spent.
It went beyond the expansion of the cybercrime sector. As the notion of expected digital security declined, businesses started hiring more cybersecurity specialists to combat the threat of cyberattacks. Furthermore, the requirement for ongoing data protection spawned a brand-new industry known as ethical hacking, whose main goal is to find flaws before they are maliciously exploited.
2011
The Sony Corporation announced Over a few days in April, 77 million PlayStation Network members’ data was stolen by hackers. Players’ usernames, passwords, birthdays, answers to security questions, and other details were included in this data. It took 23 days to restore the system and get rid of the threat.
2013
In what is arguably the most well-known data dump in history, whistleblower Edward Snowden revealed private information that was stolen from several foreign countries via malware as part of the National Security Agency’s PRISM surveillance program.
Over 110 million Target customers’ credit card information was stolen as a result of a phishing attack. Hackers gained access to the company’s HVAC subcontractor by sending a malicious email as part of the strategy.
2015
A spear-phishing attempt employing customized emails targeting high-value Defense Department targets was successful, compromising the data of 4,000 military and civilian personnel who worked for the Joint Chiefs of Staff. The hack forced the Pentagon to shut down its email system.
2016
When the Tele Crypt malware initially appeared, it was primarily designed to target online gamers. Thankfully, Malwarebytes researchers quickly created a free decryption tool.
2017
A Lithuanian cybercriminal deceived Google and Facebook staff into transferring over $100 million to anonymous offshore bank accounts while posing as an Asian manufacturer. The scam was run for two years before he was apprehended. Google, however, claimed to have retrieved the money that had been lost.
2018
The biggest DDoS attack to date caused a well-known development website named GitHub to experience 1.3 terabytes of traffic per second, forcing its server to shut down completely. GitHub had more security measures in place than other companies, but they were just overwhelmed by the scope of the attack.
2019
One of the worst data breaches in banking history occurred at Capital One, where thousands of Social Security and bank account records were stolen along with over 100 million credit card applications. About $150 million was spent on damage management by Capital One.
Billions of Dollars Lost from 2020 to the Present
In May 2020, Neiman Marcus notified 4.6 million consumers that a hacker had gained access to their personal data, including credit card numbers, expiration dates, virtual card numbers, customer names, contact details, and usernames and passwords, through the hacking of online accounts.
2021
Security researchers revealed a proof-of-concept serious attack for a remote code execution vulnerability in Log4j, a Java logging library that is used in a large number of internet applications, revealing a zero-day threat that caused enormous waves in the cybersecurity sector.
2022
The Costa Rican social security agency was shut down by a ransomware assault in late May. The attack expanded to other offices in the nation and resulted in a state of emergency. This is one of the scariest examples of hackers’ readiness to jeopardize the lives and livelihoods of strangers.
CASE BRIEFS RELATING TO COMPUTER CRIME
In the case of Shreya Singhal v. UOI[1]
In this case, the Supreme Court considered whether Section 66A of the IT Act was lawful.
Information: Two women were arrested under Section 66A of the IT Act for allegedly posting offensive and provocative comments on Facebook regarding Bombay’s complete closure after a political figure’s death. Anyone who uses a computer resource or communication to send or receive something that is offensive, false, or that irritates, discomforts, threatens, insults, hates, hurts, or incites ill will is subject to penalties under Section 66A of the IT Act.
The women challenged the legality of Section 66A of the IT Act in a petition after being arrested, arguing that it infringed upon their right to free speech and expression.
The Supreme Court’s ruling was based on three ideas: provocation, advocacy, and discourse. The essence of free speech and expression was found to be simply talking about or supporting a cause, regardless of how contentious it may be. It was determined that Section 66A could impose restrictions on all types of communication and, among other things, failed to distinguish between incitement by such words that resulted in a causal connection to public disorder, security, or health, and simple advocacy or discussion of a cause that is offensive to some.
The Court responded to the inquiry of whether Section 66A is intended to protect individuals from defamation by stating that it forbids offensive statements that might annoy a person but do not damage his reputation.
When asked if Section 66A is intended to protect people from defamation, the Court responded that it forbids offensive statements that might annoy someone but do not damage their reputation.
However, the Court further declared that as there is a clear distinction between information transmitted via the Internet and information conveyed through other forms of communication, Section 66A of the IT Act does not infringe Article 14 of the Indian Constitution. Additionally, because the procedural unreasonableness claim is illegal on substantive grounds, the Supreme Court did not even consider it.
State of Tamil Nadu v. Suhas katti[2]
Given that a conviction was obtained within seven months of the FIR being filed, the current case marks a turning point in the history of the Cyber Law regime.
Facts: The victim’s family friend, the accused, wanted to marry her, but she ended up marrying another man, leading to a divorce. The accused persuaded her again after their divorce, and he harassed her online after she refused to marry him. The accused emailed the victim abusive, offensive, and defamatory messages using a fake email account that was made in the victim’s name.
In addition to Sections 469 and 509 of the IPC 1860, the offender was prosecuted under Section 67 of the IT Act.
The Additional Chief Metropolitan Magistrate of Egmore found the accused guilty in accordance with Sections 67 of the IT Act and 469 and 509 of the Indian Penal Code, 1860. Under Section 469 of the IPC, the accused was sentenced to two years in prison and a fine of Rs. 500; under Section 509 of the IPC, he was sentenced to one year in prison and a fine of Rs. 500; and under Section 67 of the IT Act, he was sentenced to two years in prison and a fine of Rs. 4,000.
Shankar v. State rep[3]
In order to have the charge sheet against him revoked, the petitioner applied to the court under Section 482, CrPC. Sections 66, 70, and 72 of the IT Act were used to accuse the petitioner of gaining unauthorized access to the Directorate of Vigilance and Anti-Corruption (DVAC) Legal Adviser’s protected system.
Conclusion: The court determined that the charge sheet against the petitioner could not be revoked in accordance with Section 72 of the IT Act’s statute of non-granting of prosecution sanction.
Avnish v. State (NCT) of Delhi[4]
Bazee.com CEO Avnish Bajaj was arrested for violating Section 67 of the IT Act by sharing cyber pornography. The bazee.com website has been exploited by another person to sell copies of a pornographic CD.
According to the Court, Mr. Bajaj was not involved in the dissemination of pornographic material. Additionally, the Bazee.com website did not display the sexual content. However, Bazee.com receives a cut of sales and revenue from advertisements on its website.
The Court went on to say that the evidence collected indicates that someone other than Bazee.com committed the cyber pornographic offense. Bail was granted to Mr. Bajaj, but only if he produced two sureties worth Rs. 1 lakh. However, it was the accused’s responsibility to demonstrate that he was merely a service provider and did not give any material.
CBI v. Arif azim (sony sambandh case)
After paying online at www.sony-sambandh.com, non-resident Indians (NRIs) could mail Sony products to their Indian friends and relatives.
Someone using the name Barbara Campa visited the website in May 2002 and purchased a cordless phone and a Sony Color TV set for Arif Azim of Noida. The order was sent to Arif Azim after she paid with her credit card. However, because the real owner denied any such purchase, the credit card company informed the company that the payment was illegal.
A case was brought under Sections 418, 419, and 420 of the Indian Penal Code, 1860, and a complaint was submitted to the CBI. According to the investigations, Arif Azim worked in a contact center and had access to Barbara Campa’s credit card information.
Despite condemning Arif Azim, the court was lenient with him because he was a young man and a first-time offender. The court sentenced the offending party to a year of probation. Because it showed that the Indian Criminal Code, 1860 may be a useful piece of legislation to rely on when the IT Act is insufficient, this case was significant in the field of cyber law.
Pune Citibank emphasizes call center fraud
Facts: Using the internet, $350,000 was unlawfully transferred from four Citibank accounts in the US to a few phony accounts in 2005. The employees gained the trust of the clients and obtained their PINs with the intention of helping them with difficult issues. They found vulnerabilities in the MphasiS system rather than cracking firewalls or decoding encrypted software.
The defendants in this case are former workers of the MphasiS contact center, the court stated. Every employee is inspected when they enter or leave the building. Therefore, it is clear that the employees must have been able to recall the numbers.
SWIFT, or the Society for Worldwide Interbank Financial Telecommunication, was used to transfer the funds. The offense was committed by gaining unauthorized access to the client’s computer accounts. This case is therefore classified as a “cybercrime.” The IT Act adequately addresses these facets of crime, and any violation of the IPC involving the use of electronic documents is punishable by the same sanctions as those involving printed documents.
The court determined that section 43(a) of the Information Technology Act of 2000 is applicable due to the type of unlawful access required to finish transactions. The defendants were also charged under Section 420 (cheating), Sections 465, 467, and 471 of the Indian Criminal Code of 1860 and the Information Technology Act of 2000, as well as Section 66.
RESEARCH METHODOLOGY
Because it includes a thorough investigation of computer crime and related regulations, this research work is both analytical and exploratory in nature.
In order to provide a concise analysis of computerized crime rates and the extent to which they have escalated in comparison to previous years, the author has employed the quantitative research approach.
In order to effectively compare the crime rates in the provinces and the countries from the previous year to the current year, statistical data is employed in this article. A thorough analysis of the history of cybercrime was also presented by the author, who also cited relevant case laws.
This paper also includes a graph demonstration of the cybercrime rates before and after the COVID-19 effect. Before getting into the demographic description we shall first see what a computer crime actually is in layman’s words.
WHAT IS A CYBERCRIME?
Any unlawful behavior involving the use of a computer, network, or the internet is referred to as a computer crime, cybercrime, or digital crime. This covers any illegal conduct that targets or is made possible by computer systems, including identity theft, phishing, hacking, cyberbullying, online harassment, unauthorized access, malware or virus dissemination, and cyber espionage.
The term “cybercrime” was initially defined in 1995 by Sussman and Heuston. A collection of actions or behaviors based on the material offence object and modus operandi that impact computer data or systems is considered cybercrime, which lacks a clear definition.1. “Criminal acts carried out through the use of a computer or other form of electronic communications” is the definition of cybercrime by Anderson and Gardener (2015). The Information Technology (IT) Act of 2000 defines “Cybercrimes” as actions that carry penalties. The IT Act 2000 in India deals with the problem of cybercrime. After some changes were made to this Act in 2008, the Information Technology (IT) Act of 2008 was passed, which addressed a broad variety of subjects, including internet business interactions, digital signatures, e-commerce, and so on.
Computer crimes can have a significant impact on individuals, businesses, and governments. They can result in financial losses, damage to reputation, loss of privacy, and even physical harm. As technology continues to advance, the range and complexity of computer crimes are also increasing, making it more important than ever to be aware of the risks and take steps to protect yourself online.
CYBERCRIME AGAINST FEMALES
Women and girls are becoming increasingly concerned about cybercrime. Cybercriminals target women using a variety of strategies, such as identity theft, revenge porn, sexual harassment, stalking, and cyberbullying.
One of the most common forms of cybercrime against women is online harassment, which can cause severe psychological damage to its victims. Sending frightening threats, spreading false information, and exchanging private information without authorization are common examples of this type of crime. Another common cybercrime against women is revenge porn, which is the distribution of private images or videos without the subject’s consent.
Women are particularly concerned about identity theft because thieves might use stolen personal data to access bank accounts or perpetrate fraud. Phishing schemes, in which thieves impersonate trustworthy companies to gain private information like credit card numbers or passwords, commonly target women.
Cybercrime against women is a severe problem that needs to be addressed by authorities and society at large. Regardless of gender or identity, we must endeavor to make the internet a safer environment for everyone.
REASON FOR THE GROWTH OF CYBERCRIME AGAINST WOMEN IN INDIA
Because of the Internet’s transcendental jurisdiction, cybercrime is a major threat to society. One could argue that women and children are the primary victims of this crime. Studies show that the number of internet users in India has increased from 71 million in 2009 to 52 million today. In 2009, 37% of all users accessed the internet through cybercafés, and 8% of working women utilized the internet, compared to 7% of nonworking women. Cybercafé owners often divulge users’ private information without any restrictions, which is then often used for inappropriate purposes.
Although technological proficiency is a good trait that might be considered necessary for any country to progress, it is also increasingly being used as a springboard for offensives against the weaker elements of society. Additionally, data shows that people in India know virtually little about the internet.
IMPACT OF CYBERCRIME
Suppose an e-commerce company obtains credit card information from clients when they make an online payment. This massive company has millions of clients. Assume that at least 70% of their consumers pay through debit cards, credit cards, UPIs, digital wallets, and so on. This indicates that the company has amassed a sizable online client database. If the organization fails to take necessary precautions to safeguard and encrypt its customers’ sensitive financial information, hackers can exploit the smallest of flaws and break into internal systems. They can steal money by gaining access to clients’ credit card information and tracking it back to their bank accounts. Many individuals may suffer financial losses as a result of this, causing a tremendous commotion in society.
- Impact on infrastructure cybercrime
Cyberterrorism is also a serious threat to society. Cyberterrorists can breach systems that govern infrastructures such as air traffic control, putting millions of lives at risk. The more a country’s technical development, the greater its cyberterrorism danger.
Healthcare websites can potentially be targeted by cybercriminals. They have the potential to reveal sensitive data from patients and healthcare employees. Malware and denial-of-service attacks are examples of cybercrime. Cyberattacks on the healthcare business can have far-reaching consequences, including threats to patients’ lives.
- Individual impacts of cybercrime
The danger of giving internet users false information is known as cyberbullying. Similar to healthcare attacks, cybercrime has consequences beyond only monetary losses. Suicidal thoughts may arise as a result of victims’ feelings of grief and distress.
LAWS RELATED TO THE PREVENTION OF COMPUTERISED CRIMES
IN INDIA
The Information Technology Act, 2000 (“IT Act”), which went into effect on October 17, 2000, contains cyber legislation in India. The primary goal of the Act is to give legal status to electronic commerce and to make it easier to file electronic records with the government.
Cyber laws encompass the following Acts, Rules, and Regulations:
- Information Technology Act, 2000
- Information Technology (Certifying Authorities) Rules, 2000
- Information Technology (Security Procedure) Rules, 2004
- Information Technology (Certifying Authority) Regulations, 2001 Apart from this parts of IPC also govern the crimes related to computers in India (now repealed) and have Bharatiya Nyaya Sanhita,2023
IN USA
- Computer Fraud and Abuse Act, 1986
- Title -18 crime and criminal procedure
- Privacy Act,1974
- Undertaking spam, spyware, and fraud with the Enforcers Beyond Borders Act of 2006
IN THE UNITED KINGDOM OF GREAT BRITAIN AND NORTHERN IRELAND
- The Computer Misuse Act,1990
- Data Protection Act 2018
- Electronic Communications Act,2000
IN CANADA
- Criminal Code of 1985
- Evidence Act,2010
- Personal information protection and electronic documents act
IN AUSTRALIA
- Cybercrime Legislation Act
- Criminal code act
- Privacy Act, 1988
- Electronic Transaction Act,1999
IN PAKISTAN
- Prevention of Electronic Crimes Act,2016
- Prevention of Electronic Crime Ordinance,2009
- Electronic Data Protection Act,2005
DISCUSSION
Cybercrime has become an integral part of everyone’s life, as the publication has already acknowledged.
The results of this study provided information about computer crime and crime rates in India and other countries in a comparative analysis. Additionally, the page highlights laws that have been created by the governments of different countries in an effort to reduce the prevalence of cybercrime.
The history of cybercrime worldwide was also covered in the article.
Cybercrime is growing dramatically every year, as the article has demonstrated, and technical innovation is the main factor contributing to this significant increase in crime rates.
In order to reduce cybercrime rates we must implement preventive measures, to give it an instance the paper has illustrated a few preventive measures.
- Keep operating system and software upgrades up to date.
- Keeping your operating system and applications updated ensures that you get the newest security patches to protect your computer.
- Keep your antivirus software up to date and use it.
- Using antivirus software or a full-featured internet security package, like Kaspersky Total Security, is a great way to protect your computer from online threats. Anti-virus software can be used to scan for, identify, and get rid of threats before they become a problem. You may rest easy knowing that your computer and data are protected from cybercriminals thanks to this security. Maintain the most recent version of your antivirus program for optimal security.
- Make use of strong passwords.
- Use secure, hard-to-guess passwords, and don’t store them elsewhere. Use a reliable password manager to generate strong passwords at random to streamline the procedure.
- Avoid opening attachments from unsolicited emails.
- Email attachments from spam emails are commonly used to infect computers with malware and other illegal activities. You should never open an attachment from a stranger.
- Links in spam emails or on questionable websites should never be clicked.
- Clicking on links in spam emails or other messages or visiting unknown websites can also result in cybercrime. To keep yourself safe online, avoid doing this.
- Unless it is secure, personal information shouldn’t be shared.
- Never divulge personal information over email or phone unless you are positive that the line or email is secure. Verify that you are conversing with the individual you think you are.
- If you have any doubtful questions, get in touch with the business right away.
- If a company calls you and asks for personal information or data, hang up the phone. To make sure you are speaking with them and not a cybercriminal, call them again at the number listed on their official website. Since scammers can keep the call open, try using a different phone. They may pose as representatives of the bank or other organization you believe you are speaking with.
- Take note of the website Addresses you visit.
- Keep an eye on the Websites you’re visiting. Do these appear to be genuine? Avoid clicking on links with unknown or spam-like URLs. When conducting financial transactions online, be sure your internet security package contains capabilities to safeguard online transactions.
- Keep track of your bank statements.
- It is critical to recognize when you have been a victim of cybercrime as soon as possible. Keep a watch on your bank statements and contact the bank if you see any unusual activity. The bank can look into whether or not they are fraudulent.
FUTURE ENHANCEMENT
The internet has now become a very prominent part of everybody’s life and cannot do a day without the usage of the internet or any other electronic gadgets for that matter furthermore cybercrime is now as common as any other insignificant crime but the consequence is not very so since it is now very common we cannot completely eradicate cyber crime but we can surely prevent as much as possible by doing exceptionally small changes in our everyday lifestyle which we do not consider but those small things as a whole can impact and prevent cyber crime in a large number.
For instance,
- by not giving our important email on every other random website or by not giving our phone numbers or any such details for the same matter.
- by not using wifi from a public place or by not playing any random games of other countries via
- by checking and clearing out spam in electronic gadgets every now and then
- by always having an anti vis in your
- By checking if the website is secured or not before clicking on it
- By having adequate knowledge about cybercrime and the legislation and by educating others
CONCLUSION
To summarize, the introduction of computer networking and new technological technology has given rise to cybercrime in recent years. Because the target is known to the attacker, he/she performs such crimes with harmful motives such as inflicting harm to the computer system, stealing or wiping data saved in the system, changing passwords, hacking credit card details and bank account numbers, and so on. Cybercrimes such as cyberstalking, cyber terrorism, cyber pornography, morphing, forgery, email spoofing, identity theft, and so on have major societal consequences. By hacking the victim’s account, the cybercriminal obtains unlawful access to computer resources or any other personal information. As a result, it is critical for everyone to be aware of these crimes and to be vigilant in order to prevent any personal or professional loss.
However, the Indian government passed the Information Technology Act in 2000 to combat these “hi-tech” crimes in response to the global issue of cybercrime. In 2008, the Act was re-enacted with several modifications. Eight new offenses were added, and the Act was renamed the Information Technology (Amendment) Act, 2008, or ITAA, 2008. Aside from this law, several provisions of the Indian Criminal Code (IPC) are used as legal instruments to punish offenders. Cyberstalking and online harassment are also prohibited by law under the Sexual Harassment of Women at Workplace (Prevention, Prohibition, and Redressal) Act, 2013. Therefore, the judiciary has passed the aforementioned statute to punish offenders and deliver justice to victims.
There is no doubt that cybercrime is increasing at an exponential rate. The criminals or hackers of the World Wide Web are infiltrating and exploiting the personal information of Internet users.
“In the past year, 85% of global industries were subjected to phishing and social engineering cyber attacks.”
Throughout time, the quantity tends to increase. Internet thieves are stronger than ever because of the use of cutting-edge technologies and cyber tools. They regularly assault the online community and compromise private data.
ABBREVIATIONS
- ITAA -Information Technology Amendment Act, 2000
- IPC -Indian Penal Code, 1860
- Hi-tech -High-tech crimes
- URLs -uniform resource locator
- NCRB -National Crime Records Bureau
- IT Act -Information Technology Act, 2000
- AIR -All India report
REFERENCES
Vinay.m, Jayaprakash, ‘Unraveling Women’s Involvement in the Digital Realm: An Empirical Investigation’ (2023) research gate<https://www.researchgate.net/publication/375885584_Unraveling_Women’s_Involvement_in_the_Digital_Realm_An_Empirical_Investigation> accessed on 05/12/2024
Statista, ‘India: Number of Cyber Crime Cases Registered under IT Act from 2007 to 2019’ (Statista, 2024) <https://www.statista.com/statistics/309435/india-cyber-crime-it-act/> accessed 06/12/ 2024.
Enigma Software, ‘Top 20 Countries with the Most Cybercrime’ (Enigma Software, 2024) <https://www.enigmasoftware.com/top-20-countries-the-most-cybercrime/ >accessed 06/12/2024.
[1] AIR (2013) 12 S.C.C. 73
[2] C No. 4680 of 2004
[3] CBCID Cyber Crime Cell Crime No. 02 of 2008
[4] 2005) 3 CompLJ 364 Del