Hienullo.com

Farmhouse of the tech.

Cyber ​​Crimes and Solutions

We currently live in the cyber age, where the internet and computers have a huge impact on our way of life, social life, and the way we do business.

The use of information technology has presented us with great security and ethical challenges. Just as everything has positive and negative aspects, the use of information technology is beneficial and unsafe.

With the growth of the Internet, network security has become a major concern. Cybercrime has emerged rapidly in recent years and has significant consequences. Cybercriminals do everything from stealing money, hacking into others’ computers, stealing intellectual property, spreading viruses and worms to damaging computers connected to the Internet, and committing fraud.

The cessation of cybercrime is one of the main concerns today.

Cybercriminals exploit vulnerabilities in computer programs and networks to their advantage.

To hack:

Hacking or cracking is one of the top cyber crimes committed today. The hacker makes use of weaknesses and loopholes in operating systems to destroy data and steal important information from the victim’s computer. Cracking is normally done by using a backdoor program installed on your machine. Many crackers also try to gain access to resources through the use of password cracking software. Hackers can also monitor what you do on your computer and they can also import files on your computer. A hacker could install various programs on your system without your knowledge. These programs could also be used to steal personal information such as passwords and credit card information. The important data of a company can also be hacked to obtain the secret information of the future plans of the company.

Cyber ​​theft:

Cyber-Theft is the use of computers and communication systems to steal information in electronic form. Hackers infiltrate bank systems and transfer money to your own bank accounts. This is a major concern, as large amounts of money can be stolen and transferred illegally.

Many newsletters on the Internet provide investors with free advice recommending stocks they should invest in. Sometimes these recommendations are totally false and cause investors losses. Credit card fraud is also very common.

Most companies and banks do not disclose that they have been victims of cyberattacks for fear of losing customers and shareholders. Cyber ​​theft is the most common and the most reported of all cyber crimes. Cyber ​​theft is a popular cyber crime because it can quickly generate large amounts of cash for experienced cyber criminals with very little effort. Also, there is little chance that a professional cybercriminal will be caught by law enforcement.

Viruses and worms:

Viruses and worms are a very significant threat to normal users and businesses. Viruses are computer programs that are designed to harm computers. It is called a virus because it spreads from one computer to another like a biological virus. A virus must be attached to some other program or document through which it enters the computer. A worm usually exploits loop holes in soft products or in the operating system. The Trojan horse is dangerous. It seems to do one thing but does another. The system can accept it as one thing. Upon execution, it can release a virus, worm, or logic bomb. A logic bomb is an attack triggered by an event, such as a computer clock hitting a certain date. The Chernobyl and Melissa viruses are recent examples.

Experts estimate that the Mydoom worm infected approximately a quarter of a million computers in a single day in January 2004. In March 1999, the Melissa virus was so powerful that it forced Microsoft and other very large companies to completely shut down their e – email systems until the virus can be contained.

Solutions:

An important question arises as to how these crimes can be prevented. Various techniques and solutions have been presented, but problems persist and increase by the day.

Antivirus and antispyware software:

Antivirus software consists of computer programs that attempt to identify, thwart, and remove computer viruses and other malicious software. Anti-spyware products are used to restrict the installation of backdoor programs, Trojans, and other spyware on the computer.

Firewall:

A firewall protects a computer network from unauthorized access. Network firewalls can be hardware devices, software programs, or a combination of both. A network firewall generally protects an internal computer network against malicious access from outside the network.

Cryptography:

Cryptography is the science of encrypting and decrypting information. Encryption is like sending postal mail to someone else with a lock code on the envelope known only to the sender and recipient. Various cryptographic methods have been developed and some of them are not yet cracked.

Cyber ​​Laws and Ethics:

Cyber ​​ethics and cyber laws are also being formulated to stop cyber crime. It is the responsibility of each individual to follow cyber ethics and cyber laws so that the increasing cyber crime is reduced. Security softwares such as antivirus and antispyware must be installed on all computers to stay safe from cyber crimes. Internet service providers must also provide a high level of security on their servers to keep their customers safe from all types of viruses and malicious programs.

Written by:

Shaikh Mohsin Ayaz

Department of Computer Science, University of Karachi

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *