Maheswari CSP1111

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

CHAPTER 1

EXECUTIVE SUMMARY

INTRODUCTION:

Cybercrime is rising rapidly in India. Developing economies such as India face unique cybercrime
risks. This project examines cybercrime and cybersecurity in India. The literature on which this
project draws is diverse, encompassing the work of economists, criminologists, institutionalists and
international relations theorists. We develop a framework that delineates the relationships of formal
and informal institutions, various causes of prosperity and poverty and international relations related
aspects with cybercrime and cybersecurity and apply it to analyse the cybercrime and cybersecurity
situations in India. The findings suggest that developmental, institutional and international relations
issues are significant to cybercrime and cybersecurity in developing countries.

Cybercrime is rising rapidly in India. Developing economies such as India face unique cybercrime
risks. This project examines cybercrime and cybersecurity in India. The literature on which this project
draws is diverse, encompassing the work of economists, criminologists, institutionalists and
international relations theorists. We develop a framework that delineates the relationships of formal
and informal institutions, various causes of prosperity and poverty and international relations related
aspects with cybercrime and cybersecurity and apply it to the cybercrime and cybersecurity situations
in India. The findings suggest that developmental, institutional and international relations issues are
significant to cybercrime and cybersecurity in developing countries.

The widespread use of mobile devices that enable Internet access increases the exposure of both
individuals and organizations to cybercrime. This article addresses the issue of strategic prevention of
cybercrime with the key focus on the measures to prevent cybercrime related to children and teenagers.
The primary tool for such prevention is undoubtedly education aimed at establishing greater awareness
and knowledge regarding illegal Internet content and cybercrime among children and teenagers, as
well as parents and educators. As many children have Smartphones, special attention should be paid to
Smartphones and other mobile devices.

New technologies create new criminal opportunities but few new types of crime. What distinguishes
cybercrime from traditional criminal activity? Obviously, one difference is the use of the digital
computer, but technology alone is insufficient for any distinction that might exist between different
realms of criminal activity. Criminals do not need a computer to commit fraud, traffic in child
pornography and intellectual property, steal an identity, or violate someone’s privacy. All those
activities existed before the “cyber” prefix became ubiquitous. Cybercrime, especially involving the
Internet, represents an extension of existing criminal behaviour alongside some novel illegal activities.
Most cybercrime is an attack on information about individuals, corporations, or governments.
Although the attacks do not take place on a physical body, they do take place on the personal or
corporate virtual body, which is the set of informational attributes that define people and institutions
on the Internet.

So, I went to Guntakal to some random houses and talk to them about the cyber security, the threat
which can occur to them if they don’t know about the cyber security and I thought them they things
which we should do to prevent us for cyber hackers”.

learning objectives and outcomes

1. Analyze and resolve security issues in networks and computer systems to secure an IT
infrastructure.
2. Design, develop, test and evaluate secure software. Develop policies and procedures to manage
enterprise security risks.
3. Evaluate and communicate the human role in security systems with an emphasis on ethics, social
engineering vulnerabilities and training.
4. Interpret and forensically investigate security incidents.
CHAPTER 2

OVERVIEW OF THE COMMUNITY

The Village Community:

ADONI is a City in Kurnool district of the Indian state of Andhra Pradesh. It is the headquarters
Adoni Railway Division in South Central Railway. As per provisional data of 2011 census, Mana
Adonil municipality had a population of 126,479, out of which males were 62,695 and females were
63,784. The literacy rate was 75.70 per cent. Telugu is the official and widely spoken language. Urdu
and Kannada are also spoken widely Adonirailway station is a 2 point junction and divisional
headquarters since 1953 and is one of the most profitable divisions in Indian Railways The Andhra
Pradesh State Road Transport Corporation operates bus services from Mana Adonil bus station.

It is the headquarters of Adoni mandal in Kurnool revenue division. It is also the


headquarters of the AdoniRailway Division in South Central Railway. It’s the Adoni has number of
happy habitations living and the history info about the Guntakal is it has the old railway division and
its mostly famous of dargah and temples and their delicious ways of cooking and the town have a
greater facility of education, which provides schooling and degree of graduation. Guntakal is being
productive town with a big standrew church and a LPG storage unit of its nearby and have the famous
mastan vali dargah and has the beautiful iskon temple and the other thing is Guntakal known for is
waterfalls nearby in town pennobilam village there has different types of people with different kinds of
work, and it already known for delicious meal and food, good known for making biryani. widely
Guntakal is keeping of a neat and clean town and otherside its municipality and work is so effective
according to town and town provide a good range of medical and hospitality support ,the hospitals of
are so clean & good and often they care think about taking care of people in the town , it good of
goods and transport which is essential for every town ,it has a reservoir at last of town and own some
industries near of it, most of Adoni town is full of tradition of different cultures , different types of
habits, different types of religion and values, the people of Adoni is often so happy about their town
and every community service are also done finely and the people of has greater understanding and
other perspective values and different religions are often respect each other culture and tradition and
they are polite and well- mannered people and children which shows the morals of living and concern
on their character building and personality and equity. There are still people have like middle class and
poor people live together and some of are the agriculture farmers, blacksmiths, fishers, netmakers and
other prespective fields of work. This is all about the town Adoni

Our community service project has done in this town for the peoples of ADONI on about the
“Awareness on Cybercrimes”. Because the people in this city facing the problems on cybercrimes like
email frauding, QR code Scams, OTP frauds etc…

“So, I went to Adonil to some random houses and talk to them about the cybersecurity, the threat
which can occur to them if they don’t know about the cyber security and I thought them the things
which we should do to prevent us for cyber hackers and provides some measurements to avoid
cybercrimes”.

BRIEF EXPLANATION ABOUT CYBER CRIME AWARENESS

Introduction: What is cybercrime?

Cybercrime is a broad term that is used to define criminal activity in which computers or computer
networks are a tool, a target, or a place of criminal activity and include everything from electronic
wracking of service attacks. It is a general term that covers crimes like phishing, Credit card frauds,
bank robbery, illegal downloading, industrial espionage, child pornography, kidnapping children via
chat rooms, scams, cyber terrorism, creation and or distribution of viruses, spam and so on.

It also covers that traditional crimes in which computers or networks are used to enable the illicit
activity. Cybercrime is increasing day by day, nowadays it has become a new fashion to earn money
by fraud calls or to take revenge through hacking other accounts.

Types Of Cybercrimes:

Cybercrime ranges variety of activities. Cybercrime can be basically divided into three major
categories:

A. Cybercrimes against persons like harassment occur in cyberspace or through the use of cyberspace.
Harassment can be sexual, racial, religious, or other.
B. Cybercrimes against property like computer wreckage (destruction of others' property),
transmission of harmful programs, unauthorized trespassing, unauthorized possession of computer
information.

C. Cybercrimes against government like Cyber terrorism.

A. Crimes against persons are:

Cyber-Stalking:

It means to create physical threat that creates fear to use the computer technology such as internet, e-
mail, phones, text messages, webcam, websites or videos.

Dissemination of Obscene Material:

It includes Indecent exposure/ Pornography (basically child pornography), hosting of web site
containing these prohibited materials. These obscene matters may cause harm to the mind of the
adolescent and tend to deprave or corrupt their mind.

Defamation:

It is an act of imputing any person to lower down the dignity of the person by hacking his mail account
and sending some mails with using vulgar language to unknown persons mail account.

Hacking:

It means unauthorized control/access over computer system and act of hacking completely destroys the
whole data as well as computer programmes. Hackers usually hacks telecommunication mobile
network.

Cracking:

It is one of the serious cybercrimes known till date. Cracking means that a stranger has broken into
your computer systems without your knowledge and consent and has tampered with precious
confidential data and information.

E-Mail Spoofing:
A spoofed e-mail may be said to be one, which misrepresents its origin It shows its origin to be
different from which actually it originates.

SMS Spoofing:

Spoofing is a blocking through spam which means the unwanted uninvited messages. Wrong doer
steals mobile phone number of any person and sending SMS via internet and receiver gets the SMS
from the mobile phone number of the victim. It is very serious cybercrime against any individual.

Carding:

It means false ATM cards i.e., , Debit and Credit cards used by criminals for their monetary benefits
through withdrawing money from the victim's bank account malafidely. There is always unauthorized
use of ATM cards in this type of cybercrimes.

Cheating & Fraud:

It means the person who is doing the act of cybercrime i.e., , stealing password and data storage has
done it with having guilty mind which leads to fraud and cheating.

Assault by Threat:

refers to threatening a person with fear for their lives or lives of their families through the use of a
computer network i.e, E-mail, videos or phones.

B. Crimes against Property:

As there is rapid growth in the international trade where businesses and consumers are increasingly
using computers to create, transmit and to store information in the electronic form instead of traditional
project documents.

There are certain offences which affects person s properties which are as follows:

Intellectual Property Crimes:


Intellectual property consists of a bundle of rights. Any unlawful act by which the owner is deprived
completely or partially of his rights is an offence. The common form of IPR violation may be said to
be software piracy, infringement of copyright, trademark, patents, designs and service mark violation,
theft of computer source code, etc.

Cyber Vandalism:

Vandalism means deliberately destroying or damaging property of another. Thus cyber vandalism
means destroying or damaging the data when a network service is stopped or disrupted. It may include
within its purview any kind of physical harm done to the computer of any person. These acts may take
the form of the theft of a computer, some part of a computer or a peripheral attached to the computer.

Hacking Computer System:

Hacktivism attacks those included Famous Twitter, blogging platform by unauthorized access/control
over the computer. Due to the hacking activity there will be loss of data as well as computer. Also
research especially indicates that those attacks were not mainly intended for financial gain too and to
diminish the reputation of particular person or company.

Transmitting Virus:

Viruses are programs that attach themselves to a computer or a file and then circulate themselves to
other files and to other computers on a network. They usually affect the data on a computer, either by
altering or deleting it. Worm attacks plays major role in affecting the computerize system of
individuals.

Cyber Trespass:

It means to access someone's computer without the right authorization of the owner and does not
disturb, alter, misuse, or damage data or system by using wireless internet connection.

Internet Time Thefts:

Basically, Internet time theft comes under hacking. It is the use by an unauthorized person, of the
Internet hours paid for by another person. The person who gets access to someone else's ISP user ID
and password, either by hacking or by gaining access to it by illegal means, uses it to access the
Internet without the other person's knowledge. You can identify time theft if your Internet time has to
be recharged often, despite infrequent usage.

C. Cybercrimes against Government

There are certain offences done by group of persons intending to threaten the international
governments by using internet facilities. It includes:

Cyber Terrorism:

Cyber terrorism is a major burning issue in the domestic as well as global concern. The common form
of these terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and
hate e-mails, attacks on sensitive computer networks etc. Cyber terrorism activities endanger the
sovereignty and integrity of the nation.

Cyber Warfare:

It refers to politically motivated hacking to damage and spying. It is a form of information warfare
sometimes seen as analogous to conventional warfare although this analogy is controversial for both its
accuracy and its political motivation.

Distribution of pirated software:

It means distributing pirated software from one computer to another intending to destroy the data and
official records of the government.

Possession of Unauthorized Information:

It is very easy to access any information by the terrorists with the aid of internet and to possess that
information for political, religious, social, ideological objectives.

Analysis Of Cybercrimes In India:

India is the second largest online market in the world with over 560 million internet users, Ranked
only behind China. And it is estimated that by 2023, there would be over 650 million internet users in
the country. According to the latest national crime records bureau NCRB data, a total of 27, 248 cases
of cybercrime where registered in India in 2018.

In Telangana, 1205 cybercrime cases where registered in the same year. According to FBIs report,
India stands third among top 20 cybercrime victim. The national cybercrime reporting portal
(cybercrime.gov.in) which was started last year by the central government received 33,152 complaints
till now resulting in lodging of 790 FIRs.

In fact, according to a 2017 report, Indian consumers had lost over 18 billion US dollars due to
cybercrimes. In 2018, there were over 27,000 cases of cybercrimes recorded in the country, marking
an increase of over 121% compare to the number of the cases as two years back.

Total number of cybercrimes reported in India from 2012-2018

Number of cyber crimes

2018 27,248

2017 21,796

2016 12,317

2015 11,592

2014 9,622

2013 5,693

2012 3,377

The above table clearly shows the increasing number of cybercrimes cases in India. The top 5 popular
Cybercrimes are- Phishing scams, identity theft scams, online harassment, cyber stalking, invasion of
privacy.

Origin Of Cyber Crime

At the beginning of 1970s, criminal regularly committed crimes via telephone lines. The perpetrators
were called Phreakers. Actually, there was no real cybercrime until the 1980s. One person had another
persons computer to find, copy or manipulate personal data and information. The first person to be
found guilty of cybercrime was Lan Murphy, also known as Captain Zap, and that happened in the
year 1981.He had hacked the American telephone company to manipulate its internal clock, so that
users could still make free calls at peak times.

Cyber Laws:

Cybercrimes are a new class of crimes which are increasing day by day due to extensive use of internet
these days. To combat the crimes related to internet The Information Technology Act, 2000 was
enacted with prime objective to create an enabling environment for commercial use of I.T. The IT Act
specifies the acts which have been made punishable. The Indian Penal Code, 1860 has also been
amended to take into its purview cybercrimes.

The various offenses related to internet which have been made punishable under the IT Act and the
IPC are enumerated below:

1.Cybercrimes under the IT Act:

o Tampering with Computer source documents - Sec.65

o Hacking with Computer systems, Data alteration - Sec.66

o Publishing obscene information - Sec.67

o Un-authorised access to protected system Sec.70

o Breach of Confidentiality and Privacy - Sec.72

o Publishing false digital signature certificates - Sec.73

2.Cybercrimes under the Special Acts:

o Online sale of Drugs under Narcotic Drugs and Psychotropic Substances Act

o Online sale of Arms Act

3.Cybercrimes under IPC and Special Laws:


o Sending threatening messages by email - Sec 503 IPC
o Sending defamatory messages by email - Sec 499 IPC
o Forgery of electronic records - Sec 463 IPC
o Bogus websites, cyber frauds - Sec 420 IPC
o Email spoofing - Sec 463 IPC
o Web-Jacking - Sec. 383 IPC
o E-Mail Abuse - Sec.500 IPC
Steps Ton Prevent Cyber Crimes:

1. Never disclose personal information publicly on websites. This is as good as disclosing one's
identity to a stranger in public place.

2. Always avoid sending any photograph online particularly to strangers and chat friends as there
have been incidents of misuse of the photographs.

3. Never enter credit card number to any side that is not secured, to prevent its misuse.
CHAPTER 3
COMMUNITY SERVICE PART

Activities undertaken in the community:


1. Explained about what is hacking and what is cyber security.
2. Explained about importance of CYBERSECURITY.
3. Explained about how Cybercrimes occurred.
4. Explained about what are the safety measures taken to reduce cyber attacks.
5. Showing some cyber crime vedios to the people and they occur.
6. Giving power point presentation on Cybercrimes awareness.

Values,life skills ,and technical skills the student acquired:

1 .Self-Awareness
2. Time Management
3. Communication Skills
4. important of cyber security
5. safety measures to take in case of cyber attacks
6. Critical thinking
7. Creative thinking
8. Decision making
9. Problem Solving
10 .Effective communication
11. Interpersonal relationship
CHAPTER 5

OUTCOMES DESCRIPTION

Details of the Socio-Economic Survey of the Village/Habitation. Attach the


questionnaire prepared for the survey.

1. What is cyber crime?

2. How Cybercrimes occurred?

3. What are the different types of cyber attacks?

4. How the data can be stealed?

5. How to protect ourselves from cyber crimes?

6. Which tools are used for causing cyber attacks?

7. Is there any cyber laws regording on cyber crimes? and what are

8. How to complaint a cyber crime ? which procedure to follow?

9. what is the toll free number for complainting cyber crime case?

10. Which punishments should be given incase anyone causing cyber Crime?
DESCRIPTION OF THE COMMUNITY AWARENESSPROGRAMMES
CONDUCTED W.R.T THE PROBLEMS AND THEIR OUTCOMES.

The goal of community awareness is to increase the community's knowledge of the available
programs and services offered. This is accomplished by informing the general public through
various activities.

Community Service Helps Connect to the Community.

It Benefits Your Career Prospects

Community Service Raises Social Awareness

Community Service Establishes Contacts and Friendships


RECOMMENDATION

Using anti-virus or a comprehensive internet security solution like Kaspersky Total Security is a smart
way to protect your system from attacks. Anti-virus software allows you to scan, detect and remove
threats before they become a problemCybercrime is criminal activity that either targets or uses a
computer, a computer network or a networked device. Most cybercrime is committed by
cybercriminals or hackers who want to make money. However, occasionally cybercrime aims to
damage computers or networks for reasons other than profit. These could be political or
personal.Cybercrime can be carried out by individuals or organizations. Some cybercriminals are
organized, use advanced techniques and are highly technically skilled. Others are novice hackers.
Cybercriminals that target computers may infect them with malware to damage devices or stop them
working. They may also use malware to delete or steal data. Or cybercriminals may stop users from
using a website or network or prevent a business providing a software service to its customers, which
is called a Denial-of-Service (DoS) attack.Cybercrime that uses computers to commit other crimes
may involve using computers or networks to spread malware, illegal information or illegal images
CONCLUSION

We are living in a digital age and cyberspace is not limited to one's boundaries, rather it covers an
entire world. As a result, cybercrime is increasing day by day in all the countries including India. The
biggest challenge relates to cybercrime being its dynamic nature because of the ongoing evolution of
digital technology. As a result, new cybercrime methods and techniques come into practice.
Therefore, cybercrime should be given as much importance as other crime happening in our society be
it theft, rape, murder etc

Preliminary research displayed a need for additional education regarding the dangers of cybercrime
and the importance of information safety for all target groups. In order to successfully address the
issue of cybercrime, it is important to implement successful preventive techniques in all target groups.
Therefore, we concluded that continuous education plays an important role in raising the awareness of
all users and in encouraging them to implement preventive techniques in everyday life. In order to
evaluate the effects of the educational module implementation, an evaluation will be performed
following the conclusion of each educational module. Through implementation of these educational
modules targeting the youngest Internet users, we will be making the first step toward the creation of
an information security culture.

You might also like