The term cyber crime is no new term for this 21st century generation. With a tremendous rise in number of users of internet around the world, the merits and demerits of using the internet have been becoming widely known throughout the world. This has led to a drastic change in our world, online as well as offline. There have been various social networking sites like Facebook, Twitter, Myspace, Instagram etc. which makes communication not only convenient but also instantaneous. With the use of social media on such a humungous scale, the activities that take place on social media are also both productive and destructive. For instance, if sites like Facebook, Twitter can be used for communication, they can also be used for trading activities, organizing events, recruiting employees and giving advertisements. Now the question here arises as to what leads to the destructible behavior of social media. The answer to that lies in the fact that when people are ready to give more than required private information on these public sites, they forget that anybody can access this information and not everybody is a friend on social media. It is an easy task to just create a profile, put up a picture, give forged information and then access anybody’s information. People share so much information on these sites that it becomes really easy for attackers to choose their victims and then commit the crime without leaving a trace which makes these sites a golden opportunity to take advantage of a user’s personal details. These crimes include scams, cyberbullying, robbery, stalking, identity theft, harassment and the list goes on.
Image via www.southerncomfortsecurity.com
Cyber attacks are the socially or politically spurred assaults brought out essentially through the Internet. Assaults focus on the overall population or national and corporate associations and are brought out through the spread of malignant projects (infections), unapproved web access, fake sites, and different method for taking individual or institutional data from focuses of assaults, bringing on extensive harm. There are different types of cyber assaults which include targeted attack, Advanced Persistent attack, Denial service attacks etc. The borderlessness of the extent of unapproved access and the modernity and assorted qualities of dangers went for unlawful data access have heightened.
Cyber attacks are the socially or politically spurred assaults brought out essentially through the Internet. Assaults focus on the overall population or national and corporate associations and are brought out through the spread of malignant projects (infections), unapproved web access, fake sites, and different method for taking individual or institutional data from focuses of assaults, bringing on extensive harm. There are different types of cyber assaults which include targeted attack, Advanced Persistent attack, Denial service attacks etc. The borderlessness of the extent of unapproved access and the modernity and assorted qualities of dangers went for unlawful data access have heightened.
Albeit most government offices and significant partnerships have completely sent individual devices as data efforts to establish safety, focuses of assaults have extended to incorporate, other than government organizations, basic foundations and particular commercial enterprises and companies, calling for more powerful counter measures.
Now, all of us have computers in our homes and India is an ever growing and developing country. And not even half of us are aware of the kind of attacks that can be brought upon us through technology. Besides, it’s almost impossible to keep up and protect ourselves against all of them because technology is growing too and it is growing with twice as speed as we do and thus, it is important for us to be smart while doing things online and not let ourselves become a victim of cybercrimes.