Wednesday, July 17, 2019
Cybercrime â⬠computer crime Essay
1.1BackgroundCyber  detestation is  besides c totallyed  estimator  detestation. The  work come in of  reckoners as an   good turnor to  get ahead illegal ends, such as  layting fraud, trafficking in  baby bird lampblackography and  expert property, stealing identities, or violating privacy is cybercrime. Cybercrime,  particularly through the Inter displace, has grown in  wideness as the  computing device has become  rally to commerce, entertainment, and government.1 New technologies creates  sunrise(prenominal) criminal opportunities because of the  proto(prenominal) and widespread adoption of computers and the Internet, these days computer crime has been a growing  reduce even here in Nepal.1.2  tilt of ProblemThe  maturement on  reading  technology and cyberspace made the  macrocosm as a small  ball-shaped village. People  advise get  opening right through the world from their  hearthstone with  net. The trends of global terrorism  ar  in  akin manner changed by  development such    IT. Cyber crime as a new  utensil becomes a  strength threat in international peace. In particular, this paper is  think on cyber crime, its effects, challenges and impact of cyber crime on global security.1.3Objectives of the Studya. To know how  distant cybercrimes  atomic number 18 occurring in Nepalb. Cyber crime in Nepal and the  law of nature into forcec. To learn  most cyber security1.4Importance of the StudyThe  search  guide is basically  utile for all researchers and learners who argon willing to study  nigh cyber crime. It is  evenly beneficial to armed and police forces, the students of strategic studies, political science, history and international relationship. Cyber crime, at present is  existence a  abundant challenge in each and every development sector. So, it will be useful for the planners and policy makers too.1.5Limitation of the StudyIt is because of  snip constrains the research is limited in studying on cyber crime, its effects and cyber security  solitary(p   renominal). However, broaden  fancy of cyber crime has been drawn in the study.  line of  telephone line visit was very costly in terms of time and  imagings, so only  secondhand sources ( information) have been used to  fill out the study. It is specifically focused on identifying the causes, objectives, and impacts of cyber crime, the development in cyber space and information warf be, and potential threat in international peace. At last various measures for combating it and recommendations.1.6MethodologyIn this study, descriptive and analytical method has been chosen. Because of the time constrains, the data has been used in the research  conk out  argon based on secondary sources. They were obtained through books, and World Wide  blade sites.CHAPTER IIHISTORY OF CYBER  disgustThe  beginning(a)  cross-fileed cyber crime took place in the year 1820. In 1820, Joseph-Marie Jacquard, a  textile manufacturer in France, produced the loom. This device allowed the repeat of a series of s   teps in the weaving of special fabrics. This aftermathed in a fear amongst Jacquards employees that their traditional  employment and livelihood were being threatened. They committed acts of  profane to discourage Jacquard from further use of the new technology. This is the   basic-class honours degree recorded cyber crime. In Nepal, business houses, organizations started using electronic materials and computers where government was  lacking(p) in electronic rules and regulations. There is no exact date recorded for the first cyber crime in Nepal till date.  tho we can see many  population being the   victim of cybercrime. Especially in Nepal, many renowned companies  ar receiving emails from  placeholder mailing address demanding for money. Beside this, hacking websites of  banking concerns, newspaper and  subject book accounts, humiliating girls and uploading images in porn sites, sales of pirated CDS and DVDS  be the most normally practiced cybercrime in Nepal.CHAPTER IIICATEGORI   ES OF CYBERCRIMEfundamentally we can categories cybercrime into two types(a) The computer as Target using of computer to  round down a nonher computer like hacking, computer virus/ worms attacks.(b) The computer as a  tool using a computer to commit real world crime like cyber terrorism, credit  shake fraud and pornography,  do attack and many  more(prenominal).2CHAPTER IV set up OF CYBERCRIMEAs the world goes mobile, cybercrime follows. Criminal takes  usefulness of technologies and internet in many  slip guidance to commit crime which is very  grueling to  inhibit by solo effort.  close to of the effects of cybercrime that is frequently occurring in Nepal are as follows (a) HackingThis is a type of crime wherein a persons computer is broken into so that his personal or sensitive information can be accessed. This is  divers(prenominal) from ethical hacking, which many organizations use to check their Internet security  bulwark. In hacking, the criminal uses a variety of  parcel to    enter a persons computer and the person may not be aware that his computer is being accessed from a remote location.(b) Theft This crime occurs when a person violates copyrights and downloads music, movies, games and  computer software. There are even peer sharing websites which  win software piracy and many of these websites are now being  rangeed by the FBI. Today, the  umpire system is addressing this cyber crime and  on that point are laws that prevent people from illegal downloading.(c) Cyber  stem This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and  kind of of resorting to offline  still hunt, they use the Internet to stalk. However, if they notice that cyber  angry walk is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims lives more miser able-bodied.(d) Identity Theft This has become a major problem with people us   ing the Internet for cash proceeding and banking services. In this cyber crime, a criminal accesses data  somewhat a persons bank account, credit  billhooks, Social  credential, debit card and  some other sensitive information to  siphon money or to buy things online in the victims name. It can result in major  financial losings for the victim and even spoil the victims credit history.(e) Malicious  computer software These are Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or  cause damage to software present in the system.(f) Child soliciting and Abuse This is also a type of cyber crime wherein criminals solicit minor league via chat rooms for the purpose of child pornography. The FBI has been spending a lot of time monitoring chat rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting.CHAPTER VCYBER SECURITY AND ITS ADVANTAGES5.   1Cyber securityCyber Security involves protection of sensitive personal and business information through prevention, detention and response to different online attacks. The measures of applying cyber security are as follows (a)  loneliness Policy Before submitting your name, e-mail address, on a website look for the sites privacy policy.(b)  come on Software Up to Date If the  vender reduces patches for the software operating system your devices tack together them as soon as possible.  position them will prevent attackers from being able to take advantages. Dont  distinguish options that will allow your computer to  concoct your passwords. (c) Disable remote connectivity Some devices are equipped with wireless technologies like Bluetooth that can be used to connect to other devices.You should disable these features when they are not in use.5.2Advantages of Cyber SecurityThe advantages of cyber security are mentioned  below (a) The cyber security will defend us from critical attacks.    (b) It will defend us from hacks and virus.(c) Internet Security processes all the  ingress and outgoing data on your computer. (d)  finishing of cyber security used in our PC needs update every week. (e) It helps us to browse the site, website.CHAPTER VICYBER LAW IN NEPALNepal has moved a step further in the information and communication technology (ICT) as the government has promulgated electronic Transaction  numeral-2063 and Regulations, legalizing all electronic transactions and digital signatures. 4 Cyber law or Electronic Transaction Act understandably defines the rights, duties and authorities of the subscribers, network service provider, and so forth The act had provision of separate bodies, IT courtroom and Appellate Tribunal. The both look into all cases related to computer crime and the cyber crime. The IT  royal court is headed by the District Court  justice and has 3 members. The main purpose of this act (law) is to legalize the electronic transactions and digital sig   natures for both private and public transactions,  defend the electronic documents from the unauthorized access and to control the illegal activities or the cyber crimes. This act has 12 sections and 79 clauses. Electronic Transaction Act 2006 is here to fore addressed in the capacity of cyber law. The Cyber law 2006 dictates the limitation for  malady within 35 days of first knowhow of crime and breaching of the cyber law. The punishment varies from Rs. 50000 to Rs. 300000 penalty and 6 months to 5 years imprisonment as the attempts to discourage the cyber crime.CHAPTER VIICHALLENGES IN CYBER CRIMEThough there is cyber law in Nepal, but yet there are many challenges in investigating Cybercrime  receivable to a. Internet and the computers as the Sceneof  law-breaking there are many types of computer crime that exist, as well as the legal and technical challenges that face law enforcement and prosecutors in their efforts to combat this crime. b. Investigators skills (not trained) to    combat cyber terrorism. c. knowhow of cyber securityd. high-tech crimes and confusionse.  unhopeful participation of tech groups and less co-operation of resource groups f. Imitation of traditional perspective for shaping cyber crime. A challenging aspect of cybercrime is its nonlocal  reference point actions can occur in jurisdictions  confused by vast distances. g. Creating a Safer  reading Society by Improving the Security of Information Infrastructures.CHAPTER VIIIRECOMMENDATION umteen people has become the victim of cybercrime especially girls, celebrities, politicians and many other renowned personalities. Its a well known  express that Prevention is always better than  recuperate, Therefore, it is always better to take  certain(a) precaution beforehand rather than regretting afterwards. Whosoever is accessing the net should take Safety and privacy energizing on social networking site. Some of the  rubber measures are mentioned below a. Stay informed,  relent attention to news    sources to learn  virtually recent threats and websites that have been attacked. b. Be careful, to  neer enter private or financial data into websites that dont  state  validation of security. c. Clean and clear your internet cache, lost fragments, orphaned registry keys,  fly-by-night files, deleted email messages, and other temporary files on your computer often. d. Google yourself and make sure there is nothing out there that gives out too many details about you. e. Never provide your credit card number as a prooff. Report abuse, if you are stalked or harassed online, dont  do to the attacker. Instead keep a record of the communications and report the abuse to the websites administrator.CHAPTER IXCONCLUSIONThere are  suspend investigative law enforcement agencies, District  practice of law Offices of Police Headquarters or  local anaesthetic Police office, Metropolitan  plague  segmentation who are working against cybercrime and the criminals. Cybercrime is indeed  getting the r   ecognition it deserves. However, it is not going to be restricted that easily. In fact, it is highly  liable(predicate) that cybercrime and its hackers will continue developing and upgrading to  halt ahead of the law. So, to make us a safer we must need cyber security. Moreover, every  soul most apply the possible way to stay alert.ACRONYMSFBI- Federal Bureau of  investigatingDoS- Denial-of-ServicePC- Personal ComputerIT- Information  applied scienceCD-Compact DiscDVD-digital Versatile Disc / Digital Video DiscICT-Information and Communication  applied scienceBIBLIOGRAPHYa. http//www.britannica.com/EBchecked/topic/130595/cybercrime b. http//www.bezaspeaks.com/cybercrime/history.htmc. http//www.slideshare.net/aemankhan/cybercrimeppt-27376284 d. http//www.slideshare.net/aemankhan/cybercrimeppt-27376284 e. http//egovernancenepal.blogspot.com/2007/03/cyber-law-electronic- transaction-act.html f. http//www.crossdomainsolutions.com/cyber-crime/g. http//www.spotlightnepal.com/News/Article/   -Cyber-Law-And-Its-Challenge- h. http//www.ekantipur.com/2014/05/25/oped/cybercrime-without-cyber-rules/390001.html i. http//www.thehimalayantimes.com/fullNews.php?headline=Journo+charged+with+cyber+crime&NewsID=38http//setopati.net/ politics/1775/0963 j. http//mybhaktapur.com/2011/12/20/nepal-police-arrests-facebook-mis-user-for-cyber-crime/ k. http//www.thehimalayantimes.com/fullNews.php?headline=Cyber+criminals+to+target+mobile%26sbquo%3B+social+in+2014&NewsID=401622 l. http//surendraphuyalnepal.wordpress.com/m. Kantipur  chance(a)n. Nagarik Dainiko. A Guide to Computer Crime from legal.practitioner.comp. International Journal of Cyber Criminologyq. Cybercrime Nepalese  potential by Nepal Policer. Moore, R. (2005) Cyber crime investigation High-Technology Computer Crime, Cleveland, Mississippi Anderson Publishing.  
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.