Wednesday, July 17, 2019

Cybercrime †computer crime Essay

1.1BackgroundCyber detestation is besides c totallyed estimator detestation. The work come in of reckoners as an good turnor to get ahead illegal ends, such as layting fraud, trafficking in baby bird lampblackography and expert property, stealing identities, or violating privacy is cybercrime. Cybercrime, particularly through the Inter displace, has grown in wideness as the computing device has become rally to commerce, entertainment, and government.1 New technologies creates sunrise(prenominal) criminal opportunities because of the proto(prenominal) and widespread adoption of computers and the Internet, these days computer crime has been a growing reduce even here in Nepal.1.2 tilt of ProblemThe maturement on reading technology and cyberspace made the macrocosm as a small ball-shaped village. People advise get opening right through the world from their hearthstone with net. The trends of global terrorism ar in akin manner changed by development such IT. Cyber crime as a new utensil becomes a strength threat in international peace. In particular, this paper is think on cyber crime, its effects, challenges and impact of cyber crime on global security.1.3Objectives of the Studya. To know how distant cybercrimes atomic number 18 occurring in Nepalb. Cyber crime in Nepal and the law of nature into forcec. To learn most cyber security1.4Importance of the StudyThe search guide is basically utile for all researchers and learners who argon willing to study nigh cyber crime. It is evenly beneficial to armed and police forces, the students of strategic studies, political science, history and international relationship. Cyber crime, at present is existence a abundant challenge in each and every development sector. So, it will be useful for the planners and policy makers too.1.5Limitation of the StudyIt is because of snip constrains the research is limited in studying on cyber crime, its effects and cyber security solitary(p renominal). However, broaden fancy of cyber crime has been drawn in the study. line of telephone line visit was very costly in terms of time and imagings, so only secondhand sources ( information) have been used to fill out the study. It is specifically focused on identifying the causes, objectives, and impacts of cyber crime, the development in cyber space and information warf be, and potential threat in international peace. At last various measures for combating it and recommendations.1.6MethodologyIn this study, descriptive and analytical method has been chosen. Because of the time constrains, the data has been used in the research conk out argon based on secondary sources. They were obtained through books, and World Wide blade sites.CHAPTER IIHISTORY OF CYBER disgustThe beginning(a) cross-fileed cyber crime took place in the year 1820. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repeat of a series of s teps in the weaving of special fabrics. This aftermathed in a fear amongst Jacquards employees that their traditional employment and livelihood were being threatened. They committed acts of profane to discourage Jacquard from further use of the new technology. This is the basic-class honours degree recorded cyber crime. In Nepal, business houses, organizations started using electronic materials and computers where government was lacking(p) in electronic rules and regulations. There is no exact date recorded for the first cyber crime in Nepal till date. tho we can see many population being the victim of cybercrime. Especially in Nepal, many renowned companies ar receiving emails from placeholder mailing address demanding for money. Beside this, hacking websites of banking concerns, newspaper and subject book accounts, humiliating girls and uploading images in porn sites, sales of pirated CDS and DVDS be the most normally practiced cybercrime in Nepal.CHAPTER IIICATEGORI ES OF CYBERCRIMEfundamentally we can categories cybercrime into two types(a) The computer as Target using of computer to round down a nonher computer like hacking, computer virus/ worms attacks.(b) The computer as a tool using a computer to commit real world crime like cyber terrorism, credit shake fraud and pornography, do attack and many more(prenominal).2CHAPTER IV set up OF CYBERCRIMEAs the world goes mobile, cybercrime follows. Criminal takes usefulness of technologies and internet in many slip guidance to commit crime which is very grueling to inhibit by solo effort. close to of the effects of cybercrime that is frequently occurring in Nepal are as follows (a) HackingThis is a type of crime wherein a persons computer is broken into so that his personal or sensitive information can be accessed. This is divers(prenominal) from ethical hacking, which many organizations use to check their Internet security bulwark. In hacking, the criminal uses a variety of parcel to enter a persons computer and the person may not be aware that his computer is being accessed from a remote location.(b) Theft This crime occurs when a person violates copyrights and downloads music, movies, games and computer software. There are even peer sharing websites which win software piracy and many of these websites are now being rangeed by the FBI. Today, the umpire system is addressing this cyber crime and on that point are laws that prevent people from illegal downloading.(c) Cyber stem This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and kind of of resorting to offline still hunt, they use the Internet to stalk. However, if they notice that cyber angry walk is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims lives more miser able-bodied.(d) Identity Theft This has become a major problem with people us ing the Internet for cash proceeding and banking services. In this cyber crime, a criminal accesses data somewhat a persons bank account, credit billhooks, Social credential, debit card and some other sensitive information to siphon money or to buy things online in the victims name. It can result in major financial losings for the victim and even spoil the victims credit history.(e) Malicious computer software These are Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or cause damage to software present in the system.(f) Child soliciting and Abuse This is also a type of cyber crime wherein criminals solicit minor league via chat rooms for the purpose of child pornography. The FBI has been spending a lot of time monitoring chat rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting.CHAPTER VCYBER SECURITY AND ITS ADVANTAGES5. 1Cyber securityCyber Security involves protection of sensitive personal and business information through prevention, detention and response to different online attacks. The measures of applying cyber security are as follows (a) loneliness Policy Before submitting your name, e-mail address, on a website look for the sites privacy policy.(b) come on Software Up to Date If the vender reduces patches for the software operating system your devices tack together them as soon as possible. position them will prevent attackers from being able to take advantages. Dont distinguish options that will allow your computer to concoct your passwords. (c) Disable remote connectivity Some devices are equipped with wireless technologies like Bluetooth that can be used to connect to other devices.You should disable these features when they are not in use.5.2Advantages of Cyber SecurityThe advantages of cyber security are mentioned below (a) The cyber security will defend us from critical attacks. (b) It will defend us from hacks and virus.(c) Internet Security processes all the ingress and outgoing data on your computer. (d) finishing of cyber security used in our PC needs update every week. (e) It helps us to browse the site, website.CHAPTER VICYBER LAW IN NEPALNepal has moved a step further in the information and communication technology (ICT) as the government has promulgated electronic Transaction numeral-2063 and Regulations, legalizing all electronic transactions and digital signatures. 4 Cyber law or Electronic Transaction Act understandably defines the rights, duties and authorities of the subscribers, network service provider, and so forth The act had provision of separate bodies, IT courtroom and Appellate Tribunal. The both look into all cases related to computer crime and the cyber crime. The IT royal court is headed by the District Court justice and has 3 members. The main purpose of this act (law) is to legalize the electronic transactions and digital sig natures for both private and public transactions, defend the electronic documents from the unauthorized access and to control the illegal activities or the cyber crimes. This act has 12 sections and 79 clauses. Electronic Transaction Act 2006 is here to fore addressed in the capacity of cyber law. The Cyber law 2006 dictates the limitation for malady within 35 days of first knowhow of crime and breaching of the cyber law. The punishment varies from Rs. 50000 to Rs. 300000 penalty and 6 months to 5 years imprisonment as the attempts to discourage the cyber crime.CHAPTER VIICHALLENGES IN CYBER CRIMEThough there is cyber law in Nepal, but yet there are many challenges in investigating Cybercrime receivable to a. Internet and the computers as the Sceneof law-breaking there are many types of computer crime that exist, as well as the legal and technical challenges that face law enforcement and prosecutors in their efforts to combat this crime. b. Investigators skills (not trained) to combat cyber terrorism. c. knowhow of cyber securityd. high-tech crimes and confusionse. unhopeful participation of tech groups and less co-operation of resource groups f. Imitation of traditional perspective for shaping cyber crime. A challenging aspect of cybercrime is its nonlocal reference point actions can occur in jurisdictions confused by vast distances. g. Creating a Safer reading Society by Improving the Security of Information Infrastructures.CHAPTER VIIIRECOMMENDATION umteen people has become the victim of cybercrime especially girls, celebrities, politicians and many other renowned personalities. Its a well known express that Prevention is always better than recuperate, Therefore, it is always better to take certain(a) precaution beforehand rather than regretting afterwards. Whosoever is accessing the net should take Safety and privacy energizing on social networking site. Some of the rubber measures are mentioned below a. Stay informed, relent attention to news sources to learn virtually recent threats and websites that have been attacked. b. Be careful, to neer enter private or financial data into websites that dont state validation of security. c. Clean and clear your internet cache, lost fragments, orphaned registry keys, fly-by-night files, deleted email messages, and other temporary files on your computer often. d. Google yourself and make sure there is nothing out there that gives out too many details about you. e. Never provide your credit card number as a prooff. Report abuse, if you are stalked or harassed online, dont do to the attacker. Instead keep a record of the communications and report the abuse to the websites administrator.CHAPTER IXCONCLUSIONThere are suspend investigative law enforcement agencies, District practice of law Offices of Police Headquarters or local anaesthetic Police office, Metropolitan plague segmentation who are working against cybercrime and the criminals. Cybercrime is indeed getting the r ecognition it deserves. However, it is not going to be restricted that easily. In fact, it is highly liable(predicate) that cybercrime and its hackers will continue developing and upgrading to halt ahead of the law. So, to make us a safer we must need cyber security. Moreover, every soul most apply the possible way to stay alert.ACRONYMSFBI- Federal Bureau of investigatingDoS- Denial-of-ServicePC- Personal ComputerIT- Information applied scienceCD-Compact DiscDVD-digital Versatile Disc / Digital Video DiscICT-Information and Communication applied scienceBIBLIOGRAPHYa. http//www.britannica.com/EBchecked/topic/130595/cybercrime b. http//www.bezaspeaks.com/cybercrime/history.htmc. http//www.slideshare.net/aemankhan/cybercrimeppt-27376284 d. http//www.slideshare.net/aemankhan/cybercrimeppt-27376284 e. http//egovernancenepal.blogspot.com/2007/03/cyber-law-electronic- transaction-act.html f. http//www.crossdomainsolutions.com/cyber-crime/g. http//www.spotlightnepal.com/News/Article/ -Cyber-Law-And-Its-Challenge- h. http//www.ekantipur.com/2014/05/25/oped/cybercrime-without-cyber-rules/390001.html i. http//www.thehimalayantimes.com/fullNews.php?headline=Journo+charged+with+cyber+crime&NewsID=38http//setopati.net/ politics/1775/0963 j. http//mybhaktapur.com/2011/12/20/nepal-police-arrests-facebook-mis-user-for-cyber-crime/ k. http//www.thehimalayantimes.com/fullNews.php?headline=Cyber+criminals+to+target+mobile%26sbquo%3B+social+in+2014&NewsID=401622 l. http//surendraphuyalnepal.wordpress.com/m. Kantipur chance(a)n. Nagarik Dainiko. A Guide to Computer Crime from legal.practitioner.comp. International Journal of Cyber Criminologyq. Cybercrime Nepalese potential by Nepal Policer. Moore, R. (2005) Cyber crime investigation High-Technology Computer Crime, Cleveland, Mississippi Anderson Publishing.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.