Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Name: Nirja Pal

Class: 6 Sec: E
House: Chenab
Roll Number: 24
Subject: Introduction
of Cybercrimes:
- Cyberstalking
- Identity Theft
CYBERSTALKING

MEANING OF CYBERSTALKING
Cyberstalking refers to the use of the internet and other technologies to harass or stalk
another person online, and is potentially a crime in the India. This online harassment, which
is an extension of cyberbullying and in-person stalking, can take the form of e-mails, text
messages, social media posts, and more. It is often methodical, deliberate, and persistent.
Most of the time, the interactions do not end even if the recipient expresses their displeasure
or asks the person to stop. The content directed at the target is often inappropriate and
sometimes even disturbing, which can leave the person feeling fearful, distressed, anxious,
and worried.

Cyber-stalkers often start with small. In the beginning they may send few strange, unpleasant
messages to their intended victim. Then later they may brush off these messages as funny,
annoying or mildly weird and ignore them taking any action.

Over time, the messages may become systematic, sustained and repetitive and take on an
increasingly intimidating or frightening tone.

CONSEQUENCES OF CYBERSTALKING
Just like stalking, cyberstalking has the potential to cause a wide range of physical and
emotional consequences for those who are targeted. For instance, it's not uncommon for those
who are being harassed online to experience anger, fear, and confusion. They also might have
trouble sleeping and even complain of stomach trouble.

Overall, the findings revealed that victims of harassment may suffer high levels of
psychological distress as a consequence of the experience with victims of cyberstalking
experiencing psychological effects which are broadly comparable to the symptoms seen in
the PTSD, leaving the victim experiencing feelings of isolation.

HOW TO PREVENT CYBERSTALKING?


As with many things in life, it’s better to be proactive than reactive when it comes to
cyberstalking. Becoming a victim will be far less likely if you follow our five simple tips
below. These guidelines will enable you to enjoy all the benefits of online communication
while remaining completely safe.

1) KEEP A LOW PROFILE


Keeping a subdued online existence is tough for some people, especially those who need to
use online platforms for self-promotion or business-related activities. However, many users
could benefit from toning things down a little. You should always avoid posting personal
details such as your address and phone number, and think carefully about revealing real-time
information such as where you are and who you’re with.
In an ideal world, you would avoid using your real name in online profiles. While this is
difficult for anything work-related, it’s quite feasible for things like forums, message boards
and certain social media accounts. For example, you can use a nickname on Instagram or
Twitter.

2) UPDATE YOUR SOFTWARE


Keeping your software up-to-date may not be the first thing that springs to mind when you
think about cyberstalking prevention. However, regular software updates are crucial when it
comes to preventing information leaks. Many updates are developed to patch security
vulnerabilities and help ensure your information remains safe.

They are especially important for mobile devices which contain valuable data and track your
exact location. There are numerous cases in which cyberstalking begins when an attacker
pays someone to hack your email or phone and uses the gathered information against you. A
such, protecting yourself from hackers is key to cyberstalking prevention.

3) HIDE YOUR IP ADDRESS


Many applications and services reveal your IP address to the person with whom you’re
communicating. This may seem unimportant, but this information is directly related to your
personal data. For example, your IP address is linked to the internet bill that is sent to your
home and which you pay with your credit card. Cyber-stalkers can begin with your IP address
and use it to find your credit card data and physical address.

To mask your IP address you can use a Virtual Private Network (VPN). This hides your real
IP address and replaces it with from a location of your choice, so you could even appear to be
in a different country. It also encrypts all of your internet traffic, keeping it safe from the
prying eyes of hackers.

INDENTITY THEFT

What is identity theft?


Identity theft, also known as identity fraud, is a crime in which an imposter obtains key
pieces of personally identifiable information (PII), such as Social Security or driver's license
numbers, to impersonate someone else.
The stolen information can be used to run up debt purchasing credit, goods and services in
the name of the victim or to provide the thief with false credentials. In rare cases, an imposter
might provide false identification to police, creating a criminal record or leaving outstanding
arrest warrants for the person whose identity has been stolen.

Types of identity theft


The two categories of identity theft are:

1. True-name identity theft means the thief uses PII to open new accounts. The thief
might open a new credit card account, establish cellular phone service or open a
new checking account to obtain blank checks.

2. Account-takeover identity theft is when the imposter uses PII to gain access to the
person's existing accounts. Typically, the thief will change the mailing address on
an account and run up a bill before the victim realizes there is a problem. The
internet has made it easier for identity thieves to use the information they've stolen
since online transactions are made without any personal interaction.

Impact and prevention


In addition to losing money and accruing debt, victims of identity theft can incur severe
intangible costs. These include damage to reputation and credit, which can prevent victims
from getting credit or finding a job. Depending on the circumstances, identity theft can take
years to recover from.

To protect yourself from identity theft, experts recommend individuals regularly check credit
reports with major credit bureaus, pay attention to billing cycles and follow up with creditors
if bills do not arrive on time.

Additionally, people should:

 destroy unsolicited credit applications;

 watch out for unauthorized transactions on account statements;

 avoid carrying Social Security cards or numbers on them;

 avoid giving out PII in response to unsolicited emails; and


 shred discarded financial documents.

 Many state attorney general websites also offer identity theft kits designed to educate
people on identity theft prevention and recovery. Some offerings include helpful
documents and forms. The Identity Theft Affidavit, for example, is the form used to
officially file a claim of identity theft with a given business. This form in particular is
most often used when new accounts have been opened using a victim’s personal data,
not when an existing account has been illegally accessed.

 If an individual experiences tax-related identity theft, they should continue to pay and
file taxes, even if they must file paper returns.

You might also like