ISSN: 2249-8613 (Online)
Journal of ISSN: 2321-5151 (Print)
Communication Engineering & Systems Volume 11, Issue 1, 2021
DOI (Journal): 10.37591/JoCES
STM JOURNALS
http://computerjournals.stmjournals.in/index.php/JoCES/index
Review Article JoCES
Brief Study of Cybercrime on an Internet
Raj Singh Deora1, Dhaval Chudasama2*
Abstract
Cybercrime is a serious challenge to society and is harmful to the individuals who become victims.
This research paper engages analysis of the cybercrimes that target individuals on the internet and
also examines the motivation of criminals that perform such attacks which include (e. g phishing,
scams), online harassment, identity theft, malware, hacking and denial-of-service crimes. Cybercrime
is a threat to today’s internet-dependent society and is a huge growing problem. By research, it is
found that people are using online banking, online shopping and online social networking. Digital
technology provides benefits and it provides a rich environment for criminal activity to steal an
identity to the theft of classified government information, also known as hacking. A few short
examples include buying and selling illegal software and malware, hacking of servers, corrupting
systems that could cost billions to individuals, organizations, and government. Cybercrime refers to
any crime performed using a computer or an electronic device, mainly through the Internet. As the
Internet has many opportunities to consume and access information. Cyber-attacks have mainly
caused damage to banking using a credit card and payment scams. Remember, while working within
a business, each person has to take personal responsibility for ensuring cybersecurity. You have to
prioritize risks that are likely to affect and team up to create the strongest defence against
cyberattacks. The study identified security measures are required as well as knowledge of the
potential dangers of the Internet. Various steps are taken to slow down attacks but unfortunately are
not able to achieve success. The reasons for cyber-attacks, 1.Countries having weak cyber securities,
2. Criminals use new technologies to attack, 3. Cybercrime with business schemes. Every human
being is connected by using the internet and it makes the world small. Awareness should be spread
regarding cyber-crimes and strict punishments should be imposed on cyber criminals so that
criminals leave the idea to do any crime. It ought to guarantee that laws shaped should be followed
appropriately.
Keywords: Cybercrime, cyberattacks, cyber security, cyber criminals, Business schemes.
INTRODUCTION
Rapid technological growth and developments have provided new opportunity and productive
sources for organizations of all sizes. Technological growth is majorly braced by the internet and new
technologies have brought threats and cybercrime continues to evolve with new threats. It’s an
effective idea to know how to recognize
*Author for Correspondence cybercrime to help protect yourself from attack and
DhavalChudasama
E-mail: [email protected] how to protect your data. Hackers are turning to
1
Internet-based social networking sites for
Student, Department of Computer Science and Engineering,
School of Engineering, Indrashil University, Mehsana, exploitation. Today anyone can send and receive
Rajpur, Gujarat, India. any form of data, be it an e-mail, audio or video by
2
Assistant Professor, Department of Computer Science and
just clicking the button. The Internet is the fastest-
Engineering, School of Engineering, Indrashil University, growing infrastructure in everyday life and the
Mehsana, Rajpur, Gujarat, India latest technologies are changing the face of
Received Date: May 15, 2021 mankind. But due to these emerging technologies,
Accepted Date: May19, 2021 we are unable to safeguard our private information
Published Date: May23, 2021
Citation: DhavalChudasama. Brief Study of Cybercrime on
an Internet.Journal of Communication Engineering &
©Systems.
STM Journals 2021.1–6p.
2021; 11(1): All Rights Reserved 1
Brief Study of Cybercrime on an InternetDhavalChudasama
and hence these days’ cybercrimes are increasing day by day. Today more than 60 per cent of
commercial transactions are done online and this needs high security. The scope of cybersecurity is
not limited to securing the information in the IT industry but also to various other fields like
cyberspace. Even the latest technologies like cloud computing, mobile computing, E-commerce, net
banking etc also need a high level of security as it holds some important information regarding a
person whose security has become a must thing. Improving cybersecurity and protecting information
is important to each nation’s safety and economic wellbeing. Making the Internet safer has become
crucial to the development of new services as well as governmental policy. The battle against
cybercrime needs an extensive and safer approach. Given that technical measures alone cannot
prevent any crime, law enforcement agencies must be allowed to investigate and charge cybercrime
effectively. Today many nations and governments are imposing strict laws to prevent the loss. Every
individual must also be trained in cybersecurity. Technology has influenced everything from
governments and market economies to global trade, travel, and communications. There are many
benefits of the online world and cons too. In a study, 30 economies including the United Kingdom,
United States of America (US), and Australia, it was the citizens that spent the most time online—at
eight hours fifty-nine minutes, per day—across PC and mobile devices. Brazil at second with eight
hours, trailed by Thailand at eight hours 49 minutes. A major reason for this increased Internet usage
is social media, and particularly individuals use platforms such as Facebook, Instagram, WhatsApp,
YouTube, Twitter and instant messaging services. Internet crime is the most active and strong sector
of cybercrime. Identity theft, Internet scams and cyberstalking are the major types of Internet crime
[1-3].
Common forms of cybercrime include:
• Phishing: fake email messages to get personal information;
• Identity theft
• hacking websites or computer networks;
• Spreading hate and inflammatory terrorism;
• Child pornography
• grooming
• Violating copyright
• Selling illegal items
• Soliciting, producing child pornography
Computer crime embraces crimes such as phishing, credit card frauds, illegal downloading,
industrial espionage, child pornography, scams, cyberterrorism, and so on. Some crimes committed on
the Internet have been disclosed to the world and some remain a mystery. People have been trying to
solve virus problems by installing virus protection software to protect their computers. The reality is
that Internet culprits are barely caught. Internet users need to use unique passwords, run anti-virus and
anti-spyware software. The internet is the reason for pornography which falls under the category of
obscenity and is punishable. Internet crimes against children are a matter of concern and this problem
has no easy solution. While the internet is an amazing device and has become an indiscernible part of
our lives, there’s a lot out there that could cause serious problems [4-6]
Objective
The theme of the paper targets to spread the knowledge of the crimes and offences that take place
through the internet and brief information on cybercrime and the impact of social media in online
crime by internet users in the emerging world. This paper also focuses on how to prevent cybercrimes
on the internet and the types and effects of cybercrimes on the Internet [7].
What is Cybercrime?
Cybercrime is a term used to describe criminal activity in which computers or computer networks
© STM Journals 2021. All Rights Reserved 2
Journal of Communication Engineering & Systems
Volume 11, Issue 1
ISSN: 2249-8613 (Online), ISSN: 2321-5151 (Print)
are uses as a tool and is used to perform the criminal activity. Digital Crime through the web has
developed significant as the PC has gotten integral to diversion reason, trade and government. PC
wrongdoing fundamentally comprises of unapproved admittance to PC frameworks information
change, information obliteration, and burglary of protected innovation. Cybercrime includes many
different types of profit-driven criminal activity, including email and internet fraud, identity theft,
attempts to steal financial accounts, and steal data from corporate corporations. Cybercriminals use
various pathways to carry out cyberattacks and are seeking new techniques and skills without fear of
detention and arrest. Infecting systems and networks with malware is used to damage the software or
data stored on the system. Cybercriminals also attempt to attack website to change or delete content or
to access or modify databases without authorization. Other common examples of cybercrime include
illegal gambling, selling of illegal items like weapons, drugs and production, possession or
distribution of child pornography. It can include the theft of government information or corporate
secrets through illegal activity by remote systems around the globe. Cybercrime also entails anything
from downloading illegal records to stealing wealth from online bank accounts [8-10].
Types of Cybercrime Examined:
Cyberstalking
Cyberstalking is a crime that involves electronic means to stalk, harass and abuse one person
targeted specifically for reasons of anger, revenge or rage [11].
Hacking
Hacking is a crime that involves cracking systems and gaining unauthorized access to the data. A
lot of hackers try to gain access to resources through the use of password cracking software for
accessing a computer. As computer networking and the Internet has exploded in popularity and so it
becomes the most common target for hackers [11].
Phishing
Phishing is an act of fooling people to acquire financial details, personal information such as
username, password to access their account. Phishers use several different social engineering and
email spoofing toys to trick victims [11].
Software Piracy
It is an illegal act to reproduce and distribute software for business or personal use. Trademark
violation, copyright infringement and patent violation are associated with this type of cybercrime [12].
Espionage
It means theft of trade secrets through systems or networks to gain access to confidential
information held by the government or other organization. Espionage activities can include every type
of cyberattack to gather, modify or destroy data to spy on targeted individuals or groups and
monitoring communications, including emails, text messages and instant messages [12].
Password Sniffers
A programme is made to monitor and record the name and password of network users as they log
in. Whoever installs the sniffer can log in to access restricted documents [12].
Credit/Debit Card Fraud
It involves stealing information from the card and is used to make hefty purchases.
Email Bombing
This is a serious crime in which a person sends several emails to the target system/person.
Vishing
Vishing is an electronic misrepresentation strategy wherein people are fooled into uncovering basic
monetary or individual data to unapproved elements. A vishing attack can be conducted by voice
© STM Journals 2021. All Rights Reserved 3
Brief Study of Cybercrime on an InternetDhavalChudasama
email, landline or telephone [13].
Types of Cybercrime on the Internet:
• Cyberbullying and harassment
• Financial extortion
• Internet threats
• Global security data theft
• Password trafficking
• Personal data hacking
• Copyright violations
• Illegal weapon trafficking
• Child pornography
• Credit card theft and fraud
• Email phishing
• Cyber Espionage
• Virus spreading
Scams through Internet:
Online Investment Scam
Many people save money for future savings. Online investment scams target individuals and
promise a good return but later no money in return is seen [2].
Online Dating Scam
Online dating is done on a large platform. People create fake profiles and then use them for their
benefit. They demand and use their information later [3].
Fake Lottery Scam
A fake lottery scam is done through a website, texting or email. The scammer then asks for
personal information or bank details to steal their savings [4].
Product or Drug Scam
Many people search online to buy medicines or products online as they are sold at discounted rates.
Later these medicines are never delivered once purchased or either they haven’t approved medicines
and can pose serious health issues. The product scam comes in many forms by selling products at low
cost or sometimes even for free. Do good research on the product to find what ingredients it contains
and what reviews it has [5].
Commercial Scam
This type of scam targets both in-person and online. This could be in the form in which a website
offers packages at a cheaper price and ends up selling by adding additional service fees [6].
Types of cybercrime that have Impacted the economy:
• -The loss of IP address and business-confidential information.
• -Online extortion and economic crimes.
• -Financial manipulation of a company publicly.
• -Many activities over the internet reduced trust.
• -Reputational damage to the company and its brand.
Prevention
Cybercrime risks can be reduced by following these steps:
• develop strong policies and procedures for business and employees;
© STM Journals 2021. All Rights Reserved 4
Journal of Communication Engineering & Systems
Volume 11, Issue 1
ISSN: 2249-8613 (Online), ISSN: 2321-5151 (Print)
• create a security system to protect data and system;
• use two-factor authentication application;
• verify the request to send money before the transaction;
• create detection system that flags fake emails;
• train employees on cybersecurity policies and procedures;
• keep websites, devices and systems up to date with the latest software;
• backup data and information regularly to reduce the damage in case of an attack;
• Be aware of emails with links or attachments you didn’t expect;
• Don’t download anything from unknown sources;
• Don’t use public Wi-Fi
• Use strong and unique passwords
• Make sure to keep your social networking profiles private
• Don’t trust everything sold online.
• Enable your privacy settings when using social networking sites.
• In the era of online technology, parents should monitor all the activities of their children online
using parental control.
• Try not to panic if you are a victim such as a child exploitation, identity theft, or a commercial
scam, report this to your local police [10-13].
CONCLUSION
Today hackers are distributed across the world in large numbers. Many government and private
agencies like the FBI, CIA, and state police are working to detect these hackers, but we must protect
ourselves and our private data from online frauds. Apart from this, uneducated people should be given
information about debit cards, credit cards, the internet, and computer. It is a bit difficult to catch
hackers because they sit in one country and hack the computer from another country, so the best way
to avoid these things is to be careful and alert. The Internet also relates to national security as
computers serve roles in delivering emergency services, government operations, banking,
transportation, energy, and telecommunications. Even though data provides users with innumerable
opportunities, these benefits can be exploited for criminal purposes. To protect against cybercrime,
security measures are needed that are designed to protect data and user’s privacy. These problems
should be solved, the problems are being addressed, although probably not fast enough to process
them. The usefulness of the Internet has proved itself in numerous ways that ensure it does not
become a wasteland of criminal activity. The prevention needs to be done by commercial
commodities producing software and those with the potential to stop crime. As technology develops,
the law needs to respond to those who would misuse the new technology. For prevention workshops,
free advertisements, public interest with the help of the government & NGO’S. The process of
acknowledgement about cyber world crimes and cyber illiteracy should be started from the grassroots
level; institutes, computer centres, schools & individuals. Technology-based crimes have been
developing with the passage of every day and they need to be solved with absolute priority. Any sort
of crime should never be tolerated. The wellbeing and prosperity of residents ought to be defended.
Everyone deserves a right to live in a secure environment, no matter in real life or on the Internet.
After researching this issue, cyber-crime is more serious than real-life crime, as it affects millions of
web users at once.
REFERENCES
1. Kaspersky. Tips on how to protect yourself against cybercrime [Online]. Available from
https://www.kaspersky.com/resource-center/threats/what-is-cybercrime
2. Exploring and analyzing Internet crimes and their behaviours. Perspectives in Science.
2016;8:540-542.
© STM Journals 2021. All Rights Reserved 5
Brief Study of Cybercrime on an InternetDhavalChudasama
3. Norton. 11 ways to help protect yourself against cybercrime [Online]. Available from
https://us.norton.com/internetsecurity-how-to-how-to-recognize-and-protect-yourself-from-
cybercrime.html
4. Kaspersky. Tips on how to protect yourself against cybercrime [Online]. Available from https://
www.kaspersky.com/resource-center/threats/what-is-cybercrime
5. HemrajSaini, Yerra Shankar Rao, et al. Cyber-Crimes and their Impacts: A Review. International
Journal of Engineering Research and Applications (IJERA). 2012;2(2):202-209.
6. Helpline Law Legal Solutions Worldwide. Cyber Crimes in India-What is, Types, Web Hijacking,
Cyber Stalking [Online]. Available from https://www.helplinelaw.com/employment-criminal-and-
labour/CCII/cyber-crimes-in-india-what-is-types-web-hijacking-cyber-stalking.html
7. V.Karamchand Gandhi. An Overview Study on Cyber crimes in Internet. Journal of Information
Engineering and Applications. 2012;2(1):1-6.
8. Search Security (2020, 22 Dec). Cybercrime [Online]. Available from https://searchsecurity.
techtarget.com/definition/cybercrime?amp=1.
9. DM Chudasama, LK Sharma, et al. A Comparative Study of Information Systems Auditing in
Indian Context. Information Systems Audits for eCommerce. 2019;7(4):020-028.
10. DM Chudasama, L.K. Sharma, et al. Refine Framework of Information Systems Audits in Indian
Context. International Journal of Computer Sciences and Engineering. 2019;7(5):331-345.
11. DM Chudasama, Kathan Patel, et al. Awareness of Data Privacy Breach in Society. International
Journal of All Research Education and Scientific Methods (IJARESM). 2020;8(10):303-307.
12. DM Chudasama, Darsh Patel, et al. Research on Cybercrime and its Policing. American Journal
of Computer Science and Engineering Survey. 2020;8(10):14.
13. Soham Shah, MA Lokhandwala, et al.Decoding Farm Laws. International Journal of Scientific
Research and Engineering Development. 2021;4(2):590-595.
© STM Journals 2021. All Rights Reserved 6