- Download 350
- File Size 1.03 MB
- File Count 1
- Create Date 27/06/2022
- Last Updated 27/06/2022
Awareness of people about identity theft & Cyber-crime while using internet
Kalpak Vijay Rasam
ASM’s Institute of Management & Computer Studies
Cyber-crime is one of the biggest drawbacks of technological development in the world where internet is turning into one of the basic prerequisites in almost all fields and branches of studies.
The present study covers details about cybercrime also in what kind they take place, ruining lives of lakhs of people across the globe on daily basis. Stealing identity of an individual, known as individua theft, poses great threat to the mankind.
Such practices are one of the few examples of missing technology. The survey was conducted during experimentation. An analysis is done to explore the awareness of cybercrime among common people, who are major target of such criminal-minded maniacs.
As internet is gradually turning into one of the basic obligations for people belonging to different walks of life, cyber-crime acts as a major challenge in the expansion and development of widespread use of the internet.
Cyber-crimes take place using a computer which is considered as an "object or subject of the conduct constituting crime." Computers are accessible and store whole lot of different kinds of data and in a small space, which tend to make them assailable to such criminals. Cyber criminals target children, youth or teenagers, adolescents, professional hackers and acrimonious employees. The term 'cyber' can be anything relating to or some kind of characteristics of the civilization of computers, information technology, and virtual reality. For this purpose, a computer may have been used to act such a heinous crime or simply a computer may be the target. These crimes include and are not always limited to identity theft, foreboding a nation's safekeeping, copyright infringement and child pornography. These crimes have become a colossal threat to individual privacy, where confidential data individual's identity or photos and videos are stolen or ambushed by the attacker. In Cyber Crime, such as identity theft, financial theft, espionage, most of the times non-state agents and also government organizations are involved. Cybercriminals usually use computer technology to ingress and accrued personal information, business trade secrets or use the internet to attain coercive or malicious objectives. Criminals can also use computers for communication, hacking or accessing data storages apparently. Criminals who carry out these illegal activities are often to as hackers. Because of the peculiar nature of cyber-crimes, they can be committed mysteriously and far away from the victim without existing physically. Also, cyber criminals are kind of vulnerable creatures that can use computer technology to cause damage to anyone without the fear of being caught.