These are the Cyber Criminals, the ill-motivated hackers, crackers and spammers. In this
report, an attempt has been made to see Cyber Crime in a broad Spectrum, starting from
scratch. Reports & Investigations from World’s top Cyber Security firms has been
incorporated. Without delving too much into the actual means of exploitation, an attempt to
visualise the entire process as whole, has been made.
The use of technology has become an integral part of our lives. Our increasing dependence on
technology consolidates itself as a powerful platform that has revolutionised the way we do
business and communicate with people, leaving us in the open to threats of cybercrime. We
have become complacent to the existence of cybercrime, perhaps putting too much faith in
technology. Organisations must recognise this environment and must identify methods to
address these risks proactively.
As businesses and individuals increase their reliance on technology, they tend to become
exposed to the growing cybercrime threats and the fact remains that we cannot ignore
technology. Many businesses may not have taken time to consider whether they have sound
cyber-security mechanisms in place, but ignoring this risk could endanger their operations.
Through this survey we have analysed the preparedness of an individual or organisation from
potential cybercrimes threats, other than highlighting preventive mechanisms to deal with this
rapidly growing issue. While large organisations are beginning to take preventive measures to
protect themselves, small organisations normally pay insignificant attention to risk
assessment or have no funding to put the risk in place.
CYBERCRIME: WHAT DOES IT MEAN?
Cyber Crime:
Computer crime, or cybercrime, is crime that involves a computer and a network. “Any
criminal activity that uses a computer either as an instrumentality, target or a means for
perpetuating further crimes comes within the ambit of cyber-crime” A generalized definition
of cyber-crime may be “ unlawful acts wherein the computer is either a tool or target or both”
The computer may be used as a tool in the following kinds of activity- financial crimes, sale
of illegal articles, pornography, online gambling, intellectual property crime, e-mail spoofing,
forgery, cyber defamation, cyber stalking. The computer may however be target for unlawful
acts in the following cases- unauthorized access to computer/ computer system/ computer
networks, theft of information contained in the electronic form, e-mail bombing, data
diddling, salami attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft
of computer system, physically damaging the computer system.
4