Cyber Crime Essay for Students and Children

500+ words essay on cyber crime.

Cyber Crime Essay – Everybody thinks that only stealing someone’s private data is Cyber Crime. But in defining terms we can say that ‘Cyber Crime refers to the use of an electronic device (computer, laptop, etc.) for stealing someone’s data or trying to harm them using a computer.

Besides, it is an illegal activity that involves a series of issues ranging from theft to using your system or IP address as a tool for committing a crime.

Cyber Crime Essay

Types of Cyber Crime

Speaking in a broadway we can say that Cyber Crime are categorized into four major types. These are Financial, Privacy, Hacking, and Cyber Terrorism.

The financial crime they steal the money of user or account holders. Likewise, they also stole data of companies which can lead to financial crimes. Also, transactions are heavily risked because of them. Every year hackers stole lakhs and crores of rupees of businessmen and government.

Privacy crime includes stealing your private data which you do not want to share with the world. Moreover, due to it, the people suffer a lot and some even commit suicide because of their data’s misuse.

In, hacking they intentional deface a website to cause damage or loss to the public or owner. Apart from that, they destroy or make changes in the existing websites to diminish its value.

Modern-day terrorism has grown way beyond what it was 10-20 years ago. But cyber terrorism is not just related to terrorists or terrorist organizations. But to threat some person or property to the level of creating fear is also Cyber Terrorism.

Get the huge list of more than 500 Essay Topics and Ideas

Cyber Crime in India

Web world or cyberspace is a massive community of millions and billions of users and websites. Also, people access it for different uses like shopping, movies, music, video games, transactions, and e-commerce, etc.

essay on cyber crime in india

In this Age of Technology and easy access to the internet, anyone can easily reach it. Because of this fast pace growth from the previous decade. Besides, the internet has opened a world of information on which anyone can connect.

Due to, this the rate of crime especially the rate of Cyber Crime has increased much fold. Moreover, the rate of circulation of data is also increased much fold due to the higher speed of internet. Above all, due to all these issues, the Cybersecurity has become a major concern for society.

Laws related to Cyber Crimes

To stop the spread of Cyber Crime and to safeguard the interest of people the government has made several laws related to Cyber Crimes. Also, these laws serve as protection against Cyber Crime. Apart from that, the government has also introduced cyber cells in police stations to counter the problem of Cyber Crime as fast as they can.

Ways of stopping Cyber Crime

Cyber Crime is not something which we cannot deal with our self. Likewise, with little use of our common sense and logic, we can stop Cyber Crimes from happening.

To conclude, we can say that Cyber Crime is a dangerous offense to someone’s privacy or any material. Also, we can avoid Cyber Crime by following some basic logical things and using our common sense. Above all, Cyber Crime is a violation of not only law but of human rights too.

{ “@context”: “https://schema.org”, “@type”: “FAQPage”, “mainEntity”: [{ “@type”: “Question”, “name”: “What is the main cause of Cyber Crime?”, “acceptedAnswer”: { “@type”: “Answer”, “text”: “The greed for quick money and the desire to get famous quickly are the two main reasons of Cyber Crime. Also, most of the targets of Cyber Crime banks, businessman, financial firms, etc.” } }, { “@type”: “Question”, “name”: “What is the punishment of Cyber Crime in India?”, “acceptedAnswer”: { “@type”: “Answer”, “text”:”If the person is found guilty then there are several punishments based on the level of crime. A simple crime can cost you a fine while a bigger crime can lead you to jail.”} }] }

Customize your course in 30 seconds

Which class are you in.

tutor

  • Travelling Essay
  • Picnic Essay
  • Our Country Essay
  • My Parents Essay
  • Essay on Favourite Personality
  • Essay on Memorable Day of My Life
  • Essay on Knowledge is Power
  • Essay on Gurpurab
  • Essay on My Favourite Season
  • Essay on Types of Sports

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Download the App

Google Play

  • CBSE Class 10th
  • CBSE Class 12th
  • UP Board 10th
  • UP Board 12th
  • Bihar Board 10th
  • Bihar Board 12th
  • Top Schools in India
  • Top Schools in Delhi
  • Top Schools in Mumbai
  • Top Schools in Chennai
  • Top Schools in Hyderabad
  • Top Schools in Kolkata
  • Top Schools in Pune
  • Top Schools in Bangalore

Products & Resources

  • JEE Main Knockout April
  • Free Sample Papers
  • Free Ebooks
  • NCERT Notes
  • NCERT Syllabus
  • NCERT Books
  • RD Sharma Solutions
  • Navodaya Vidyalaya Admission 2024-25
  • NCERT Solutions
  • NCERT Solutions for Class 12
  • NCERT Solutions for Class 11
  • NCERT solutions for Class 10
  • NCERT solutions for Class 9
  • NCERT solutions for Class 8
  • NCERT Solutions for Class 7
  • JEE Main 2024
  • MHT CET 2024
  • JEE Advanced 2024
  • BITSAT 2024
  • View All Engineering Exams
  • Colleges Accepting B.Tech Applications
  • Top Engineering Colleges in India
  • Engineering Colleges in India
  • Engineering Colleges in Tamil Nadu
  • Engineering Colleges Accepting JEE Main
  • Top IITs in India
  • Top NITs in India
  • Top IIITs in India
  • JEE Main College Predictor
  • JEE Main Rank Predictor
  • MHT CET College Predictor
  • AP EAMCET College Predictor
  • GATE College Predictor
  • KCET College Predictor
  • JEE Advanced College Predictor
  • View All College Predictors
  • JEE Advanced Cutoff
  • JEE Main Cutoff
  • MHT CET Result 2024
  • JEE Advanced Result
  • Download E-Books and Sample Papers
  • Compare Colleges
  • B.Tech College Applications
  • AP EAMCET Result 2024
  • MAH MBA CET Exam
  • View All Management Exams

Colleges & Courses

  • MBA College Admissions
  • MBA Colleges in India
  • Top IIMs Colleges in India
  • Top Online MBA Colleges in India
  • MBA Colleges Accepting XAT Score
  • BBA Colleges in India
  • XAT College Predictor 2024
  • SNAP College Predictor
  • NMAT College Predictor
  • MAT College Predictor 2024
  • CMAT College Predictor 2024
  • CAT Percentile Predictor 2024
  • CAT 2024 College Predictor
  • Top MBA Entrance Exams 2024
  • AP ICET Counselling 2024
  • GD Topics for MBA
  • CAT Exam Date 2024
  • Download Helpful Ebooks
  • List of Popular Branches
  • QnA - Get answers to your doubts
  • IIM Fees Structure
  • AIIMS Nursing
  • Top Medical Colleges in India
  • Top Medical Colleges in India accepting NEET Score
  • Medical Colleges accepting NEET
  • List of Medical Colleges in India
  • List of AIIMS Colleges In India
  • Medical Colleges in Maharashtra
  • Medical Colleges in India Accepting NEET PG
  • NEET College Predictor
  • NEET PG College Predictor
  • NEET MDS College Predictor
  • NEET Rank Predictor
  • DNB PDCET College Predictor
  • NEET Result 2024
  • NEET Asnwer Key 2024
  • NEET Cut off
  • NEET Online Preparation
  • Download Helpful E-books
  • Colleges Accepting Admissions
  • Top Law Colleges in India
  • Law College Accepting CLAT Score
  • List of Law Colleges in India
  • Top Law Colleges in Delhi
  • Top NLUs Colleges in India
  • Top Law Colleges in Chandigarh
  • Top Law Collages in Lucknow

Predictors & E-Books

  • CLAT College Predictor
  • MHCET Law ( 5 Year L.L.B) College Predictor
  • AILET College Predictor
  • Sample Papers
  • Compare Law Collages
  • Careers360 Youtube Channel
  • CLAT Syllabus 2025
  • CLAT Previous Year Question Paper
  • NID DAT Exam
  • Pearl Academy Exam

Predictors & Articles

  • NIFT College Predictor
  • UCEED College Predictor
  • NID DAT College Predictor
  • NID DAT Syllabus 2025
  • NID DAT 2025
  • Design Colleges in India
  • Top NIFT Colleges in India
  • Fashion Design Colleges in India
  • Top Interior Design Colleges in India
  • Top Graphic Designing Colleges in India
  • Fashion Design Colleges in Delhi
  • Fashion Design Colleges in Mumbai
  • Top Interior Design Colleges in Bangalore
  • NIFT Result 2024
  • NIFT Fees Structure
  • NIFT Syllabus 2025
  • Free Design E-books
  • List of Branches
  • Careers360 Youtube channel
  • IPU CET BJMC
  • JMI Mass Communication Entrance Exam
  • IIMC Entrance Exam
  • Media & Journalism colleges in Delhi
  • Media & Journalism colleges in Bangalore
  • Media & Journalism colleges in Mumbai
  • List of Media & Journalism Colleges in India
  • CA Intermediate
  • CA Foundation
  • CS Executive
  • CS Professional
  • Difference between CA and CS
  • Difference between CA and CMA
  • CA Full form
  • CMA Full form
  • CS Full form
  • CA Salary In India

Top Courses & Careers

  • Bachelor of Commerce (B.Com)
  • Master of Commerce (M.Com)
  • Company Secretary
  • Cost Accountant
  • Charted Accountant
  • Credit Manager
  • Financial Advisor
  • Top Commerce Colleges in India
  • Top Government Commerce Colleges in India
  • Top Private Commerce Colleges in India
  • Top M.Com Colleges in Mumbai
  • Top B.Com Colleges in India
  • IT Colleges in Tamil Nadu
  • IT Colleges in Uttar Pradesh
  • MCA Colleges in India
  • BCA Colleges in India

Quick Links

  • Information Technology Courses
  • Programming Courses
  • Web Development Courses
  • Data Analytics Courses
  • Big Data Analytics Courses
  • RUHS Pharmacy Admission Test
  • Top Pharmacy Colleges in India
  • Pharmacy Colleges in Pune
  • Pharmacy Colleges in Mumbai
  • Colleges Accepting GPAT Score
  • Pharmacy Colleges in Lucknow
  • List of Pharmacy Colleges in Nagpur
  • GPAT Result
  • GPAT 2024 Admit Card
  • GPAT Question Papers
  • NCHMCT JEE 2024
  • Mah BHMCT CET
  • Top Hotel Management Colleges in Delhi
  • Top Hotel Management Colleges in Hyderabad
  • Top Hotel Management Colleges in Mumbai
  • Top Hotel Management Colleges in Tamil Nadu
  • Top Hotel Management Colleges in Maharashtra
  • B.Sc Hotel Management
  • Hotel Management
  • Diploma in Hotel Management and Catering Technology

Diploma Colleges

  • Top Diploma Colleges in Maharashtra
  • UPSC IAS 2024
  • SSC CGL 2024
  • IBPS RRB 2024
  • Previous Year Sample Papers
  • Free Competition E-books
  • Sarkari Result
  • QnA- Get your doubts answered
  • UPSC Previous Year Sample Papers
  • CTET Previous Year Sample Papers
  • SBI Clerk Previous Year Sample Papers
  • NDA Previous Year Sample Papers

Upcoming Events

  • NDA Application Form 2024
  • UPSC IAS Application Form 2024
  • CDS Application Form 2024
  • CTET Admit card 2024
  • HP TET Result 2023
  • SSC GD Constable Admit Card 2024
  • UPTET Notification 2024
  • SBI Clerk Result 2024

Other Exams

  • SSC CHSL 2024
  • UP PCS 2024
  • UGC NET 2024
  • RRB NTPC 2024
  • IBPS PO 2024
  • IBPS Clerk 2024
  • IBPS SO 2024
  • Top University in USA
  • Top University in Canada
  • Top University in Ireland
  • Top Universities in UK
  • Top Universities in Australia
  • Best MBA Colleges in Abroad
  • Business Management Studies Colleges

Top Countries

  • Study in USA
  • Study in UK
  • Study in Canada
  • Study in Australia
  • Study in Ireland
  • Study in Germany
  • Study in China
  • Study in Europe

Student Visas

  • Student Visa Canada
  • Student Visa UK
  • Student Visa USA
  • Student Visa Australia
  • Student Visa Germany
  • Student Visa New Zealand
  • Student Visa Ireland
  • CUET PG 2024
  • IGNOU B.Ed Admission 2024
  • DU Admission 2024
  • UP B.Ed JEE 2024
  • LPU NEST 2024
  • IIT JAM 2024
  • IGNOU Online Admission 2024
  • Universities in India
  • Top Universities in India 2024
  • Top Colleges in India
  • Top Universities in Uttar Pradesh 2024
  • Top Universities in Bihar
  • Top Universities in Madhya Pradesh 2024
  • Top Universities in Tamil Nadu 2024
  • Central Universities in India
  • CUET DU Cut off 2024
  • IGNOU Date Sheet
  • CUET DU CSAS Portal 2024
  • CUET Response Sheet 2024
  • CUET Result 2024
  • CUET Participating Universities 2024
  • CUET Previous Year Question Paper
  • CUET Syllabus 2024 for Science Students
  • E-Books and Sample Papers
  • CUET Exam Pattern 2024
  • CUET Exam Date 2024
  • CUET Cut Off 2024
  • CUET Exam Analysis 2024
  • IGNOU Exam Form 2024
  • CUET PG Counselling 2024
  • CUET Answer Key 2024

Engineering Preparation

  • Knockout JEE Main 2024
  • Test Series JEE Main 2024
  • JEE Main 2024 Rank Booster

Medical Preparation

  • Knockout NEET 2024
  • Test Series NEET 2024
  • Rank Booster NEET 2024

Online Courses

  • JEE Main One Month Course
  • NEET One Month Course
  • IBSAT Free Mock Tests
  • IIT JEE Foundation Course
  • Knockout BITSAT 2024
  • Career Guidance Tool

Top Streams

  • IT & Software Certification Courses
  • Engineering and Architecture Certification Courses
  • Programming And Development Certification Courses
  • Business and Management Certification Courses
  • Marketing Certification Courses
  • Health and Fitness Certification Courses
  • Design Certification Courses

Specializations

  • Digital Marketing Certification Courses
  • Cyber Security Certification Courses
  • Artificial Intelligence Certification Courses
  • Business Analytics Certification Courses
  • Data Science Certification Courses
  • Cloud Computing Certification Courses
  • Machine Learning Certification Courses
  • View All Certification Courses
  • UG Degree Courses
  • PG Degree Courses
  • Short Term Courses
  • Free Courses
  • Online Degrees and Diplomas
  • Compare Courses

Top Providers

  • Coursera Courses
  • Udemy Courses
  • Edx Courses
  • Swayam Courses
  • upGrad Courses
  • Simplilearn Courses
  • Great Learning Courses

Cyber Crime Essay

The unlawful act of gaining unauthorised access to computer systems or digital devices is known as cybercrime. A detailed grasp of how to stop or recover from cyberattacks is provided by cyber security. Online courses offer guidance on how to avoid, safeguard against, and recover from cybercrime risks. Here are a few sample essays on the topic ‘Cyber Crime’.

100 Words Essay on Cyber Crime

200 words essay on cyber crime, 500 words essay on cyber crime.

Cyber Crime Essay

Cybercrime is the most discussed problem in the twenty-first century. The usage of cellphones and the internet is increasing dramatically over the world, which is generating questions about consumers' security and privacy. Because of this, it is crucial for all users to understand cybercrime and security. Cybercrime is defined as organised criminal conduct carried out by attackers online. Cybercrime comes in numerous forms, such as fraud, computer viruses, cyberstalking, and others. Due to these, businesses and government organisations are spending more on maintaining and employing professionals in cybercrime.

There are millions and billions of users and websites in the vast community known as cyberspace. People utilise it for a variety of activities including e-commerce, transactions, shopping, movies, music, and video games. Anyone can simply access anything online in the current technological era owing to accessible internet connection. As a result, crime in general and cybercrime in particular have surged dramatically. Additionally, the faster internet connection has greatly boosted the rate of data circulation. All of these problems are responsible as to why cyber security has grown to be a significant issue for society.

The government has created a number of cybercrime-related laws in an effort to curb the spread of the crime and to protect people's interests. These laws also provide defence against cybercrime. Aside from that, the government has established cyber cells in police stations to combat cybercrime as quickly as possible.

Cybercrime is an attack that can be harmful to both an individual and a business. There have been several instances where a cyber attack led to a data leak that caused a significant loss for a business or a person. These cyber-attacks could have negative effects on the country and the business. The countless instances of cyberattacks that have taken place in India and other nations have necessitated increased security measures. There are four main categories of cybercrime, according to a popular definition—hacking, money, privacy, and cyber terrorism.

Cybercrime is a type of crime in which illegal activities are carried out online or using computers. Cybercrime comes in a variety of forms which involves harassing online users. Cybercrime is the most serious and rapidly expanding type of crime in this day and age. Any person's life may be negatively impacted for a very long time by becoming a cyber victim. Cybercrimes have a wide range of repercussions on financial and investment activity in digital organisations.

One typical tactic used by criminals is to lure online users in by creating attractive websites and sending phoney emails purporting to be from banks or other organisations and asking for personal information. It makes it easier for criminals to access a person's bank account and personal data. Due to viruses, mail fraud, account hacking, and software piracy, people have been victims of cybercrimes. They also run into problems with unauthorised access mailing, threats from pornographic emails, and video transmission.

Types of Cyber Crime

Cyberstalking | It is the use of electronic communication to track down a person or to make repeated attempts to get in touch with them in order to foster personal interaction despite their blatant lack of interest. Anyone who monitors the internet, email, or any other form of electronic communication is guilty of stalking.

Phishing | It is a sort of fraud that includes collecting personal data from recipients of emails that seem to be coming from a reliable source, including Customer ID, IPIN, Credit/Debit Card number, Card expiration date, CVV number, etc.

Vishing | It is an attempt when criminals attempt to obtain personal information over the phone, such as Customer ID, Net Banking password, ATM PIN, OTP, Card expiration date, CVV, etc.

Smishing | It is a sort of fraud that employs text messages sent to mobile devices to entice victims into dialling a fake phone number, going to a fake website, or downloading harmful software.

Impersonation And Identity Theft | This includes the dishonest or fraudulent use of another person's electronic signature, password, or other distinctive identification trait.

Virus, Worms, Trojan | A computer virus is a programme designed to infiltrate your computer, corrupt your files and data, and spread itself. Worms are malicious software applications that repeatedly duplicate themselves on local drives, network shares, etc. Trojan is a malicious programme that mimics a legitimate application. Trojans offer unauthorised people and applications access to your computer through a backdoor entry, allowing them to steal sensitive data.

How to Prevent Cyber Crime

Backup every piece of information—data, systems, and considerations—to make it easier for businesses to recover from unforeseen events with the help of prior data.

Pick a firewall that offers protection from viruses, malware, and dishonest hackers.

Never divulge private information to a stranger since they might exploit it for fraud.

To avoid cybercrime, check your security settings—in order to determine if someone has logged into your computer, a cyber firewall analyses your network settings.

Antivirus software aids in identifying potential threats and malware before they infect a computer system. Never use software that has been cracked since it poses a serious risk of data loss or malware attack.

Keep your information protected when accessing untrusted websites—information can readily bypass the data through phishing websites.

Applications for Admissions are open.

Aakash iACST Scholarship Test 2024

Aakash iACST Scholarship Test 2024

Get up to 90% scholarship on NEET, JEE & Foundation courses

ALLEN Digital Scholarship Admission Test (ADSAT)

ALLEN Digital Scholarship Admission Test (ADSAT)

Register FREE for ALLEN Digital Scholarship Admission Test (ADSAT)

JEE Main Important Physics formulas

JEE Main Important Physics formulas

As per latest 2024 syllabus. Physics formulas, equations, & laws of class 11 & 12th chapters

PW JEE Coaching

PW JEE Coaching

Enrol in PW Vidyapeeth center for JEE coaching

JEE Main Important Chemistry formulas

JEE Main Important Chemistry formulas

As per latest 2024 syllabus. Chemistry formulas, equations, & laws of class 11 & 12th chapters

TOEFL ® Registrations 2024

TOEFL ® Registrations 2024

Accepted by more than 11,000 universities in over 150 countries worldwide

Download Careers360 App's

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

student

Certifications

student

We Appeared in

Economic Times

Talk to our experts

1800-120-456-456

  • Cyber Crime Essay

ffImage

Essay on Cyber Crime

Cyber crime is the most discussed issue of the 21st century. The technology sector world wide is witnessing  a boom in the consumer of smartphones and the internet which is raising concerns with regard to the privacy and security of the users. Owing to this reason, it is highly essential for all the users to know about cyber crime  & security.  As a result, thi topic has become the most favorite topic of the examiner and can often be seen asked in the exams.  In this view, students must have information on cyber crime and stay prepared to tackle such topics in the essay question in the English paper.

Introduction

Cybercrime is a dangerous attack a company or an individual may face. There are many cases where the cyber attack has brought massive loss to the company and individuals due to the data hack. We live in a technology-driven era, and every piece of information is now fed on computers. Cybercrime involves an attack on computers and digital devices. These cyber-attacks can prove hazardous not just for the organization, but also for the nation. To date, there are many digital attack cases in India and global, pushing for more security measures. These attacks are also affecting the economy of the country if not controlled in the initial stage.

What is Cybercrime?

Cybercrime or attack is defined as the systematic criminal activity occurring digitally

and done by attackers. There are many examples of cybercrime, including fraud,

malware viruses, cyberstalking and others. Due to these, government agencies and

companies are investing more in the maintenance and hiring of cybercrime experts. 

Earlier, cybercrime was committed only by individuals or by small groups. However, now a highly complex cybercriminals network work on attacking the system for data

collection.

Three groups of cybercrimes-

This is the form of cyberstalking, trafficking, and grooming. Over the years, this

This type of cybercrime has been taken seriously by law enforcement agencies. It is

now keeping a track over every such attack on an individual.

Similar to the real world where criminals steal the property, in the cyber world,

attackers steal data. Here, the attacker steals a person's bank details and

misuse the credit card for online purchase. By using malicious software, the

attacker attacks the property to disrupt the system of the organization.

These types of crimes are denoted as cyber terrorism. This can be a terror because

the attacker can get hold of essential documents related to government

projects. An enemy nation or terrorist usually makes such attacks. There are

many cases globally where a terrorist hacks government data.

Apart from these, there is a financial crime where the hacker steals the money of the

user account holder. Moreover, they steal company data and finance.

In this type, the computer system of the person is hacked to get personal

information. In many countries, including India, hacking is a punishable act.

It is quite different from ethical hacking. In normal hacking, illegal use

different types of software to enter the system of the target person. Hacker is

then able to monitor every activity done by the person.

This Cybercrime is about violating copyright and downloading music or movies. In

India, many movies before their releases are leaked on the movie download

sites. In other words , theft is also called privacy, which can bring a huge

loss to the organization.

Cyber Stalking

It is online harassment by an individual or a group of people. Normally, these

stalkers target an individual and harass online. There are many cases of

cyberstalking in India, resulting in the target person ending up taking

Malicious Software

These are computer-based cybercrimes where virus-based software is installed in the

target people or organization computers. This is to damage the system and

corrupt the data of the target.

Laws Related to Cybercrime

In India, there are many cybercrime laws enacted to stop this threat. Be it for

the individual or the organization; these laws help to either bring down the

number of cases or eliminate these digital crimes.

Apart from these laws, as an individual, you also need to take steps to stop these

crimes. Like, not providing your login details, installing trust anti-virus

software and keeping your online profile private can help to act against such

Cybercrime is a significant threat that can bring huge loss to the individual and the

organization. It is essential to follow basic online rules to ensure the safety

of self and the organization.

Benefits of Cyber Crime Essay in English provided by Vedantu

The essay on cybercrime provided by Vedantu is prepared by highly qualified teachers which makes it a reliable source of information. This information could be utilized for a variety of reasons. Being a reliable piece of information the essay will benefit everyone curious to know about the topic.

Following are the highlights of its benefits:

Reliable information 

Adaptive to the context 

Precise language

Fulfills the requirements of the students for english exam questions 

Comprehensive and analytical. The  article digs in the depth of the issue and analyzes it through a 360 degree perspective.

The essay could also be used by the students for preparing themselves for the essay question in the English paper. This essay is an excellent guide to understand what the examiner is looking for in the exam. Moreover, the topic of cybercrime is quite a recurrent one in the exam. So the students use this essay to deal with the same topic.

The Essay on Cyber Crime is an excellent guide on averting any possibilities of a cyber attack. On today's date, one is mostly on the internet for a variety of reasons. It becomes essential for one to know important tips that can keep one safe from cyberbullies, thieves, or blackmailers. It is also important for one to understand the right course of actions to be taken in an eventuality of such an incident.

Download the cybercrime essay for students in English on the Vedantu website.

arrow-right

FAQs on Cyber Crime Essay

1. How Does Cybercrime Work?

Group of people or an individual commits most of these cyber-crimes. These criminals use a systematic process to hack and commit these acts. These criminal communities share strategies and tools to launch attacks. Some of the cybercrime techniques

Fast Flux - In this method, the hacker moves data quickly among computers in a botnet, making it challenging to find the right source.

Social Engineering - This method includes using lies and manipulation to trick people into revealing their personal information.

Skimmers - This involves installing a skimming tool in an ATM and stealing the information. You may find such skimming devices in ATMs.

There are some digital criminals targeting organizations to steal personal information.

2. How Cybercrime Affects Society?

Cybercrime can hugely affect society. In 2018, the US faced a loss of $600 billion. As consumers are increasingly allowing technologies to get into their lives, cyber attackers are getting better access. Some of the essential information available are-

Personal health data, sleep schedules, and geo-locations Shopping history, account information, and passive conversations noticed voice-controlled devices, Private conversations on social media accounts.

Your entire life is now available on social media, making it vulnerable to hack or cyber-attack. Attackers use different techniques including- installing malware, virus, phishing, cyberstalking, etc. These can certainly bring loss of lives and data for individuals and organizations. For society, this is a significant loss in the long run.  One needs to be very careful when presenting himself socially.

3. How to stay secure in times of cybercrime?

Cybercrime is a real threat posing to society. It is the 21st-century version of theft and blackmailing. There are certain ways one should adopt to prevent any possibilities of cybercrime. Do not disclose the banking details to random people or fill the CVV of your debit or credit cards on an unknown and unverified website. Keep your passwords always discrete. The camera of the laptop should always be covered.

4. Where can I get a cybercrime essay?

One can find a good quality cyber crime essay on Vedantu's website. The essay which is prepared by the expert teachers describes everything that one needs to know about cybercrime. It is the one-stop solution for all your requirements on the topic. Their essay is available in PDF format on the website and could be downloaded on any device. One downloaded essay could be used in offline mode too. If one finds it feasible, the printout of the PDF could also be taken out.

essay on cyber crime in india

45,000+ students realised their study abroad dream with us. Take the first step today

Meet top uk universities from the comfort of your home, here’s your new year gift, one app for all your, study abroad needs, start your journey, track your progress, grow with the community and so much more.

essay on cyber crime in india

Verification Code

An OTP has been sent to your registered mobile no. Please verify

essay on cyber crime in india

Thanks for your comment !

Our team will review it before it's shown to our readers.

Leverage Edu

  • School Education /

✍️Essay on Cybercrime: Free Samples in 100, 200, 300 Words

dulingo

  • Updated on  
  • Apr 26, 2024

Essay on Cybercrime

The 21st century is a digital age, where any and every task is done on the internet. All thanks to the developments in technology which have been the main factor to ease human life on earth and maybe on other plants in future. But with the benefits of technology, there are several harmful effects, one of them which has recently gained popularity; Cyber Crime. 

essay on cyber crime in india

Cybercrime has emerged as pervasive and evolved as one of the most dangerous threats to humans. There are several users on the internet who indulge in illegal and criminal activities, using computers and networks. To guide you through this hot debate topic, below we have discussed essays on cybercrime.

Table of Contents

  • 1 Essay on Cybercrime in 100 Words
  • 2 Essay on Cybercrime in 200 Words
  • 3 Essay on Cybercrime in 300 Words
  • 4 Short Essay on Cybercrime

Also Read: Essay on Student Life

Essay on Cybercrime in 100 Words

Cybercrime involves illegal activities like hacking, ransomware, cyberbullying, online fraud, etc. People who are involved in cybercrime or any similar activities are called hackers, scammers or fraudsters. Cybercrime leads to financial loss for individuals who have fallen victim to one. Cybercrime often invades a person’s privacy by stealing their personal details, including sensitive data, photos, and communication records, which can be used for blackmailing or any malicious purpose.

There are several governmental and non-government organizations which are working 

To tackle cybercrime by raising awareness among the masses, cyber security training, implementing robust security protocols, and enacting comprehensive cybercrime laws.

Also Read: I Love My India Essay: 100 and 500+ Words in English for School Students

Essay on Cybercrime in 200 Words

Cybercrime is a criminal activity done online using a computer, network and internet. With the increasing use of the internet and mobile phones, the number of criminal activities has also gained pace.  These criminal-minded people steal the personal details of a person, which leads to financial losses and damages the reputation of the victims. Various scams and fraudulent schemes are offered on the internet like online auctions, advance fees, or any investment scam, which are all aimed at deceiving individuals into parting with their money.

Cybercrime is not limited to financial losses or reputational damage, a more discrete term has emerged; cyberbullying.  In cyberbullying, a person is harassed, humiliated, or threatened online. This can have severe psychological and emotional consequences. Ethical hackers or white hat hackers can help organizations identify vulnerabilities in their systems before malicious hackers exploit them. 

Cybercrime doesn’t have any boundaries and is an international issue and international cooperation is crucial for tracking and prosecuting cybercriminals who operate across borders. To combat cybercrime effectively, a multi-faceted approach is required, involving education, technology, legislation, and international cooperation. As technology continues to advance, our efforts to combat cybercrime must keep pace to protect our increasingly interconnected world.

Also Read : Essay on Winter Season

Essay on Cybercrime in 300 Words

Economists have termed cybercrime as ‘ A Hidden Threat to the Digital World.’ Modern humans are relying on the internet for their day-to-day activities and every macro and micro activity. In this sense, the term cybercrime comes to the front. Cybercrime refers to criminal activities conducted through the use of computers, networks, and the Internet. 

Cybercrime consists of various malicious activities like hacking, phishing, ransomware attacks, identity theft, online fraud, and cyberbullying. Hackers, fraudsters, scammers, criminals, and even state-sponsored actors exploit vulnerabilities in digital systems to steal sensitive information, disrupt operations, and cause financial and emotional harm to victims.

The consequences of cybercrime are far-reaching. Financial losses run into 10 digits annually, affecting individuals and organizations alike. Personal privacy is invaded as cybercriminals steal sensitive data, photos, and communication records. In cases of cyberbullying and harassment, victims suffer reputational damages, psychological distress, and emotional trauma, particularly in cases of cyberbullying and harassment.

It’s necessary to look for a multifaceted approach to deal with cybercrime, some of which are.

  • Raising public awareness through campaigns where people are informed about the risks of cybercrime and educate them on best practices for online safety.
  • Individuals and organizations should implement robust security protocols, regularly update software, and use multi-factor authentication to protect their digital assets.
  • Governments should enact and enforce cybercrime laws, providing law enforcement agencies with the resources and expertise needed to prosecute cybercriminals effectively.
  • Looking at the global nature of cybercrime, international collaboration is vital. Countries should work together to share threat intelligence and cooperate in the investigation and prosecution of cybercriminals.
  • Ethical hackers can help organizations identify and rectify vulnerabilities in their systems before malicious actors exploit them.

Tackling cybercrime requires proactive measures, including education, strong cybersecurity practices, legislation, international cooperation, and the active involvement of ethical hackers.

Also Read: Essay on Green Energy PDF: 150 and 250 Words

Short Essay on Cybercrime

Find the short essay on cyber crime from below:

Cybercrime is an illegal and unethical activity which is done by hackers and fraudsters to gain financial or any other benefits for themselves.

To tackle cybercrime, several measures can be taken. Some of these measures are education and public awareness, research and innovation, ethical hacking, etc.

To write an essay on cybercrime, you need to give details on how it works and the level of danger it poses to humans. Cybercrime consists of various malicious activities like hacking, phishing, ransomware attacks, identity theft, online fraud, and cyberbullying. Hackers, fraudsters, scammers, criminals, and even state-sponsored actors exploit vulnerabilities in digital systems to steal sensitive information, disrupt operations, and cause financial and emotional harm to victims.

Related Articles

For more information about such informative articles, visit our essay writing page and make sure to follow Leverage Edu .

' src=

Shiva Tyagi

With an experience of over a year, I've developed a passion for writing blogs on wide range of topics. I am mostly inspired from topics related to social and environmental fields, where you come up with a positive outcome.

Leave a Reply Cancel reply

Save my name, email, and website in this browser for the next time I comment.

Contact no. *

essay on cyber crime in india

Connect With Us

45,000+ students realised their study abroad dream with us. take the first step today..

essay on cyber crime in india

Resend OTP in

essay on cyber crime in india

Need help with?

Study abroad.

UK, Canada, US & More

IELTS, GRE, GMAT & More

Scholarship, Loans & Forex

Country Preference

New Zealand

Which English test are you planning to take?

Which academic test are you planning to take.

Not Sure yet

When are you planning to take the exam?

Already booked my exam slot

Within 2 Months

Want to learn about the test

Which Degree do you wish to pursue?

When do you want to start studying abroad.

January 2024

September 2024

What is your budget to study abroad?

essay on cyber crime in india

How would you describe this article ?

Please rate this article

We would like to hear more.

Have something on your mind?

essay on cyber crime in india

Make your study abroad dream a reality in January 2022 with

essay on cyber crime in india

India's Biggest Virtual University Fair

essay on cyber crime in india

Essex Direct Admission Day

Why attend .

essay on cyber crime in india

Don't Miss Out

Win up to 100% Scholarship

  • UPSC Online
  • UPSC offline and Hybrid
  • UPSC Optional Coaching
  • UPPCS Online
  • BPSC Online
  • MPSC Online
  • MPPSC Online
  • WBPSC Online
  • OPSC Online
  • UPPCS Offline Coaching
  • BPSC Offline Coaching
  • UPSC Test Series
  • State PSC Test Series
  • DAILY CURRENT AFFAIRS
  • SUBJECT WISE CURRENT AFFAIRS
  • DAILY EDITORIAL ANALYSIS
  • DAILY CURRENT AFFAIRS QUIZ
  • Daily Prelims(MCQs) Practice
  • Daily Mains Answer Writing
  • Free Resources

pw

  • Offline Centers
  • NCERT Notes
  • UDAAN Notes
  • UPSC Syllabus
  • UPSC Prelims PYQs
  • UPSC Mains PYQs
  • Prelims Preparation

essay on cyber crime in india

Growing Cyber Crimes in India: Reasons, Challenges, and Way Forward

essay on cyber crime in india

Context:  This article is based on the news “ Cyber crime growing at the rate 15-20% annually in India: West Bengal IGP Cyber Cell ” which was published in the Economic Times. In 2022, Cyber Crimes in India recorded a 24% increase compared to the previous year, according to the latest data released by the National Crime Records Bureau (NCRB) .

NCRB Data on Cyber Crimes in India, National Critical Information Infrastructure Protection Centre (NCIIPC), Information Technology (IT) Act, 2000, National Cyber Security Policy (NCSP), and .

Growing Cyber Crimes in India: Reasons, Challenges, Government Initiatives, and Way Forward. 

NCRB Data on Cyber Crimes in India

Cyber Crimes in India

  • According to the report ‘ Crime in India ’, 65,893 cases were registered under cybercrime, showing an increase compared to 52,974 cases in 2021.
  • Preliminary probe data showed that most frauds originated in Mewat (Haryana) and Jamtara (Jharkhand).
  • More than 80,000 complaints have been received from West Bengal in 2023 till November end in the national cybercrime reporting portal.

Enroll now for UPSC Online Course

About Cyber Crime 

  • For example, Hacking, identity theft, fraud, and Cyberstalking.
  • Cybercrimes comes as a State subject as per the Seventh Schedule of the Indian Constitution.

Increasing Cyber Crimes in India: Major Reasons

  • Financial gain: Through stealing financial information , such as credit card numbers and bank accounts, or through demanding ransom in exchange for stolen data or resources. 

: A form of harassment or bullying inflicted through the use of electronic or communication devices such as computer, mobile phone, laptop, etc.  : Use of electronic communication by a person to to foster personal interaction repeatedly despite a clear indication of disinterest by such person. It is when a person builds an with a young person and tricks him/her into doing a sexual act.  : It is an act of sending , text messages, or emails, usually by cell phone.  This occurs when fraudsters manage to get a new SIM card issued against a registered mobile number fraudulently through the mobile service provider. 
  • For example, Unified Payment Interface (UPI) frauds are the most prevalent online financial frauds reported between January 2020 and June 2023, according to the Future Crime Research Foundation (FCRF) report by IIT-Kanpur.
  • Espionage: Some cybercriminals engage in cyber crime to steal confidential or proprietary information for competitive advantage or to damage the reputation of an organization.
  • For example , the Cambridge Analytica scandal (2018) under which the Facebook database was leaked with data of 419 million users including the data of many Indian users. 
  • Personal motives : Some cybercriminals engage in cybercrime to harass, defame, or harm individuals or organizations.
  • For Example: In June 2023, tech giant Microsoft experienced temporary disruptions to its Outlook and Azure computing services after an attack by a cybercrime group called Anonymous Sudan.

Cyber Crimes in India: Challenges

  • Rapid Technological Advancements : The rapid adoption of technology in India has led to an increased attack surface for cybercriminals. As new technologies such as IoT (Internet of Things), cloud computing, etc. become more prevalent, the attack vectors for cybercriminals also expand. 

against information systems, programs, and data that threatens violence or results in violence.  in the target population. Attackers often do this by damaging or disrupting targets military websites, and government websites for spreading hate and propaganda.
  • For instance, Deep Fake and AI-generated voice is a rising challenge as it has become easy to create and superimpose faces and voices. 
  • A zero-day exploit is a cyberattack technique that takes advantage of an unknown security flaw in computer software, hardware or firmware.
  • For instance, the Malware(Dtrack) attack on Kudankulam Nuclear Power Plant (KKNPP) in 2019. It is believed that this malware has been created by a group called Lazarus with links to North Korea.
  • Lack of Cybersecurity Awareness : Many individuals and businesses in India may not be fully aware of the risks and preventive measures associated with cybersecurity which makes them more susceptible to falling victim to cybercrimes.
  • Inadequate Legal Framework : Although India has made efforts to establish legal frameworks to address cybercrimes, there may still be gaps and challenges in effectively enforcing these laws. 

Also Read: What is Deepfake Technology? – Its Types, Impacts, and Security Countermeasures

Cyber Crimes in India: Government Measures

  • National Cyber Forensic Laboratory (Investigation) : It has been established in New Delhi to provide early-stage cyber forensic assistance to Investigating Officers (IOs) of all State/UT Police both through online and offline modes. ‘CyTrain’ portal : Massive Open Online Courses (MOOC) platform for capacity building of all the stakeholders, police officers, judicial officers and prosecutors through online courses on critical aspects of cybercrime investigation, forensics, prosecution, etc. along with certification .
  • National Cyber Security Policy (NCSP) : It aims to create a secure cyberspace environment and strengthen the country’s cybersecurity . 
  • Indian Cyber Crime Coordination Centre (I4C) : The I4C serves as the nodal point for coordinating efforts to combat cybercrime in India with a focus on enhancing the capabilities of law enforcement agencies to prevent and investigate cybercrimes.
  • National Cyber Crime Reporting Portal : It has been launched to enable the public to report incidents about all types of cyber crimes , with a special focus on cyber crimes against women and children. 
  • National Critical Information Infrastructure Protection Centre (NCIIPC): NCIIPC is responsible for protecting critical information infrastructure from cyber threats. It identifies critical sectors and formulates policies and guidelines for securing them.
  • Cyber Swachhta Kendra : This initiative focuses on the detection and removal of malware-infected systems , thereby reducing the impact of botnets. 
  • Computer Emergency Response Team (CERT-In) : CERT-In is the national agency responsible for responding to and mitigating cybersecurity incidents. It issues alerts and advisories to the public and private sectors to enhance cybersecurity awareness.
  • Information Technology (IT) Act, 2000 : It is a comprehensive legislation that addresses various aspects of electronic governance, digital signatures, data protection, and penalties for cybercrimes. 

Enroll now for UPSC Online Classes

: Reducing the and protecting communities for a safer world. The strategy outlines INTERPOL’s plan to support its member countries in combating cybercrime. : UN member states have been negotiating an on countering cybercrime. If adopted by the UN General Assembly, it would be the on a cyber issue.  : The treaty focused on across borders so that a range of cybercrime could be prosecuted in the multiple countries affected. in this convention.

Way Forward to Prevent Cyber Crimes in India

  • Investing in advanced cybersecurity technologies can help to protect critical information systems and networks . 
  • Cyber Hygiene Practices: Encourage individuals and organizations to adopt good cyber hygiene practices, such as regular software updates, strong password management, and secure online behavior.
  • For instance , India and Japan have agreed to step up cooperation to improve skills in securing cyberspace at bilateral and multilateral levels. 
  • Public Awareness and Education: Conduct widespread awareness campaigns to educate the public about common cyber threats, safe online practices, and the importance of cybersecurity. 
  • Encourage the Adoption of Cyber Insurance: Cyber insurance policies help cover the financial losses that result from cyber events and incidents. In addition, cyber-risk coverage often helps with the costs associated with remediation, including payment for legal assistance , investigators, crisis communicators, and customer credits or refunds.

Conclusion:

The growing trend of cyber crimes in India demands a comprehensive approach, including advanced cybersecurity measures, international cooperation, public awareness, and the effective implementation of legal frameworks to ensure a secure digital environment for individuals and organizations.

Print Friendly, PDF & Email

To get PDF version, Please click on "Print PDF" button.

essay on cyber crime in india

  • Recent Post
  • Related Post
  • Most Viewed Post

essay on cyber crime in india

National Monetisation Pipeline (NMP)

India Eyes Breakthrough Against Sickle Cell Anaemia

Iberian lynx’s

Patna High Court Strikes Down 65% Quota In Bihar

International Yoga Day 2024

The Changing Role of The Global South In The Global Economy

Social stock exchange, prime- minister’s egypt state visit, shanan power project, mq-9b drones, drug controller general of india, latest comments, recent editorial.

Should not EVs and Hybrids be treated Equally for ...

Killer Moonshine, On the Hooch Tragedy in Kallakur...

The US-Saudi Agreement, from Fistbump to Embrace

AI Regulation, India can Look to Japan for a Balan...

Decades of Uncertainty for Tibetans

Blueprints Beyond Borders for Solace and Shelter

Popular current affairs

India Eyes Breakthrough Against Sickle Cell Anaemi...

The Changing Role of The Global South In The Globa...

Our Courses

essay on cyber crime in india

THE MOST LEARNING PLATFORM

Learn From India's Best Faculty

#

Our Initiatives

Beginner’s roadmap, quick links.

#

PW-Only IAS came together specifically to carry their individual visions in a mission mode. Infusing affordability with quality and building a team where maximum members represent their experiences of Mains and Interview Stage and hence, their reliability to better understand and solve student issues.

Subscribe our Newsletter

Sign up now for our exclusive newsletter and be the first to know about our latest Initiatives, Quality Content, and much more.

Contact Details

G-Floor,4-B Pusha Road, New Delhi, 110060

Download Our App

Biginner's roadmap, suscribe now form, fill the required details to get early access of quality content..

Join Us Now

(Promise! We Will Not Spam You.)

CURRENT AF.

<div class="new-fform">

Select centre Online Mode Hybrid Mode PWonlyIAS Delhi (ORN) PWonlyIAS Delhi (MN) PWonlyIAS Lucknow PWonlyIAS Patna Other

Select course UPSC Online PSC ONline UPSC + PSC ONLINE UPSC Offline PSC Offline UPSC+PSC Offline UPSC Hybrid PSC Hybrid UPSC+PSC Hybrid Other

</div>

essay on cyber crime in india

CbseAcademic.in

Essay on Cyber Crime | 500+ Words

Cybercrime is like a shadow lurking in the digital world, ready to harm us. In this essay, we will explore the world of cybercrime, its types, consequences, and how we can protect ourselves in the digital age.

Defining Cybercrime:

Cybercrime involves illegal activities conducted online. These crimes can harm individuals, organizations, and even entire nations.

The Digital Revolution

The rise of technology has brought convenience but also vulnerabilities. Cybercriminals exploit these vulnerabilities for personal gain.

Types of Cybercrime

Cybercrime takes many forms, including hacking, identity theft, online scams, and cyberbullying. Each poses unique risks and challenges.

Hacking and Data Breaches

Hackers gain unauthorized access to computer systems, stealing valuable data. These breaches can lead to financial loss and privacy violations.

Identity Theft

Identity theft involves stealing personal information for fraudulent purposes. Victims can face financial ruin and emotional distress.

Online Scams

Scammers trick people into giving away money or personal information. Awareness and skepticism are key defenses against these scams.

Cyberbullying

Cyberbullying involves using the internet to harass or harm others. It can have devastating effects on mental and emotional well-being.

The Impact of Cybercrime

Cybercrime has far-reaching consequences, affecting individuals, businesses, and governments. It erodes trust and security in the digital world.

Financial Loss

Victims of cybercrime often suffer financial losses. Recovering stolen funds can be challenging, and the impact can be long-lasting.

Emotional Toll

The emotional toll of cybercrime can be severe. Victims may experience fear, anxiety, and a loss of trust in online interactions.

Expert Opinions on Cybercrime

Experts in cybersecurity emphasize the importance of vigilance, education, and strong security measures in protecting against cyber threats.

Cybersecurity Measures

Protecting against cybercrime requires cybersecurity measures like strong passwords, antivirus software, and regular software updates.

The Role of Education

Education about online safety is vital. Schools and organizations should teach digital literacy and cybersecurity from an early age.

Online Privacy

Protecting online privacy means being cautious about sharing personal information and understanding the importance of data protection laws.

Reporting Cybercrime

Reporting cybercrime to law enforcement is crucial. It helps track down cybercriminals and prevent further harm.

International Cooperation

Cybercrime is a global issue. International cooperation and laws are essential to combating it effectively.

The Future of Cybersecurity

As technology evolves, so do cyber threats. Ongoing research and innovation in cybersecurity are essential to staying ahead of cybercriminals.

Conclusion of Essay on Cyber Crime

In conclusion, cybercrime is a digital menace that affects us all. Whether it’s hacking, scams, or cyberbullying, the consequences can be devastating. However, we can protect ourselves by staying informed, practicing good cybersecurity habits, and reporting cybercrime when it occurs.

The digital age has brought us incredible opportunities, but it has also brought risks. It is our responsibility to navigate this digital world with caution and vigilance. By doing so, we can reduce the impact of cybercrime and make the internet a safer place for everyone. Cybersecurity is not just a personal responsibility; it’s a collective effort to keep our digital world secure and trustworthy.

Also Check: The Essay on Essay: All you need to know

Drishti IAS

  • Classroom Programme
  • Interview Guidance
  • Online Programme
  • Drishti Store
  • My Bookmarks
  • My Progress
  • Change Password
  • From The Editor's Desk
  • How To Use The New Website
  • Help Centre

Achievers Corner

  • Topper's Interview
  • About Civil Services
  • UPSC Prelims Syllabus
  • GS Prelims Strategy
  • Prelims Analysis
  • GS Paper-I (Year Wise)
  • GS Paper-I (Subject Wise)
  • CSAT Strategy
  • Previous Years Papers
  • Practice Quiz
  • Weekly Revision MCQs
  • 60 Steps To Prelims
  • Prelims Refresher Programme 2020

Mains & Interview

  • Mains GS Syllabus
  • Mains GS Strategy
  • Mains Answer Writing Practice
  • Essay Strategy
  • Fodder For Essay
  • Model Essays
  • Drishti Essay Competition
  • Ethics Strategy
  • Ethics Case Studies
  • Ethics Discussion
  • Ethics Previous Years Q&As
  • Papers By Years
  • Papers By Subject
  • Be MAINS Ready
  • Awake Mains Examination 2020
  • Interview Strategy
  • Interview Guidance Programme

Current Affairs

  • Daily News & Editorial
  • Daily CA MCQs
  • Sansad TV Discussions
  • Monthly CA Consolidation
  • Monthly Editorial Consolidation
  • Monthly MCQ Consolidation

Drishti Specials

  • To The Point
  • Important Institutions
  • Learning Through Maps
  • PRS Capsule
  • Summary Of Reports
  • Gist Of Economic Survey

Study Material

  • NCERT Books
  • NIOS Study Material
  • IGNOU Study Material
  • Yojana & Kurukshetra
  • Chhatisgarh
  • Uttar Pradesh
  • Madhya Pradesh

Test Series

  • UPSC Prelims Test Series
  • UPSC Mains Test Series
  • UPPCS Prelims Test Series
  • UPPCS Mains Test Series
  • BPSC Prelims Test Series
  • RAS/RTS Prelims Test Series
  • Daily Editorial Analysis
  • YouTube PDF Downloads
  • Strategy By Toppers
  • Ethics - Definition & Concepts
  • Mastering Mains Answer Writing
  • Places in News
  • UPSC Mock Interview
  • PCS Mock Interview
  • Interview Insights
  • Prelims 2019
  • Product Promos
  • Daily Updates

Make Your Note

India's Cybersecurity Challenge: Threats and Strategies

  • 26 Dec 2023
  • 15 min read
  • GS Paper - 2
  • Government Policies & Interventions
  • GS Paper - 3
  • Cyber Security
  • Cyber Warfare
  • Challenges to Internal Security Through Communication Networks

This editorial is based on “We want a Digital India. Just not the one we are living in” which was published in The Indian Express on 26/12/2023. The article discusses the challenges and opportunities for India in the domain of cyber security, and argues that India needs a new approach that is based on self-reliance, innovation, and collaboration.

For Prelims: SWIFT system , National Informatics Centre (NIC) , Cyber Surakshit Bharat Initiative , Cyber Swachhta Kendra , Indian Cyber Crime Coordination Centre (I4C) , National Critical Information Infrastructure Protection Centre (NCIIPC) , Defence Cyber Agency (DCyA),

For Mains: India’s vulnerability to cyber attacks, Challenges posed by cyber attacks, Government Initiatives and Way Forward

As the world is advancing in the realm of digitalisation, the threat of cyber attacks has also grown and India is no exception to it. In October, 2023, Resecurity, a US company, informed the world about the availability of Indians’ personal data on the dark web. It would have been easy to ignore this amid the deluge of bad news filling our news feeds but for the size and sensitivity of data. The seller of the data set was providing verifiable, sensitive information of 55% of the Indian population — roughly around 815 million ( 81.5 crore) citizens.

This included personally identifiable information like name, phone number, Aadhaar number, passport number and address. All for a paltry sum of USD80,000. On December 18, Delhi police had arrested four individuals in this matter.

How Vulnerable is India to Cyber Attacks?

  • India is the second largest online market in the world, behind China.
  • By 2025, the number is expected to grow to 900 million.
  • However, India’s outdated or inadequate cyber security infrastructure, policies, and awareness, making it easy for hackers to exploit the gaps and weaknesses in the system that’s why India faces sophisticated and persistent cyber threats from state-sponsored and non-state actors, who target India’s strategic, economic, and national interests.

What are the Challenges Posed by Cyber Attacks on India?

  • For example, in October 2019, there was an attempted cyber-attack on the Kudankulam Nuclear power plant.
  • For instance, in March 2020, a malware attack on the City Union Bank’s SWIFT system led to unauthorised transactions worth USD 2 million.
  • For example, in May 2021, the personally identifiable information (PII) and test results of 190,000 candidates for the 2020 Common Admission Test (CAT), used to select applicants to the IIMs, were leaked and put up for sale on a cybercrime forum.
  • For example, in 2020, a cyber espionage campaign called Operation SideCopy (a Pakistani threat actor) was uncovered, which targeted Indian military and diplomatic personnel with malware and phishing emails.
  • APTs are difficult to detect and counter, as they use advanced techniques and tools to evade security measures.
  • For example, in February 2021, a cyber security firm called RedEcho revealed that a China-linked APT group had targeted 10 entities in India’s power sector, with malware that could potentially cause power outages.
  • For example, in December 2020, a global cyberattack on SolarWinds, a US-based software company that provides network management tools, affected several Indian organisations, including the National Informatics Centre (NIC), the Ministry of Electronics and Information Technology (MeitY), and Bharat Heavy Electricals Limited (BHEL).

What are the Initiatives Regarding Cyber Security?

  • National Cyber Security Policy: This policy aims to build a secure and resilient cyberspace for citizens, businesses, and the government. It outlines various objectives and strategies to protect cyberspace information and infrastructure, build capabilities to prevent and respond to cyber attacks, and minimise damages through coordinated efforts of institutional structures, people, processes, and technology.
  • Cyber Surakshit Bharat Initiative: This initiative was launched to raise awareness about cyber crimes and create safety measures for Chief Information Security Officers (CISOs) and frontline IT staff across all government departments.
  • National Cyber Crime Threat Analytics Unit
  • National Cyber Crime Reporting Portal
  • National Cyber Crime Training Centre
  • Cyber Crime Ecosystem Management Unit
  • National Cyber Crime Research and Innovation Centre National Cyber Crime Forensic Laboratory Ecosystem
  • Platform for Joint Cyber Crime Investigation Team.
  • Cyber Swachhta Kendra (Botnet Cleaning and Malware Analysis Centre): This centre was launched in 2017 to create a secure cyberspace by detecting botnet infections in India and notifying, enabling cleaning and securing systems of end users to prevent further infections.
  • Computer Emergency Response Team - India (CERT-In): It is an organisation of the MeitY which collects, analyses and disseminates information on cyber incidents, and also issues alerts on cybersecurity incidents.
  • The government has established the National Critical Information Infrastructure Protection Centre (NCIIPC) to protect the CII of various sectors, such as power, banking, telecom, transport, government, and strategic enterprises.
  • Defence Cyber Agency (DCyA) : The DCyA is a tri-service command of the Indian Armed Forces that is responsible for handling cyber security threats. It has the capability to conduct cyber operations, such as hacking, surveillance, data recovery, encryption, and countermeasures, against various cyber threat actors.

What Should India Do Further to Save Itself from Cyber attacks?

  • However, the IT Act still has some gaps and limitations, such as the lack of clear definitions, procedures, and penalties for various cyber offences, and the low conviction rate of cyber criminals.
  • India needs to enact comprehensive and updated laws that cover all aspects of cyber security, such as cyber terrorism, cyber warfare, cyber espionage, and cyber fraud.
  • However, these efforts are still inadequate and fragmented, as India faces a shortage of technical staff, cyber forensics facilities, cyber security standards, and coordination among various stakeholders.
  • India needs to invest more in developing its human and technological resources, establishing cyber security centers of excellence, adopting best practices and standards, and fostering collaboration and information sharing among different agencies and sectors.
  • Adopt a zero-trust architecture, and mandate a standardised playbook for responding to cybersecurity vulnerabilities and incidents. Urgently execute a plan for defending and modernising state networks and updating its incident response policy.
  • India needs to engage more with other countries and international organisations, such as the United Nations , the International Telecommunication Union , the Interpol , and the Global Forum on Cyber Expertise, to exchange best practices, share threat intelligence, harmonise cyber laws and norms, and cooperate in cyber investigations and prosecutions.
  • India also needs to participate more actively in regional and bilateral dialogues and initiatives, such as the ASEAN Regional Forum , the BRICS , and bilateral forums it has like Indo-US Cyber Security Forum, to build trust and confidence, and to address common cyber security issues and interests.

Highlight the key challenges posed by Cyber Attacks on india. How can the government formulate effective strategies to mitigate the risks posed by cyber attacks?

UPSC Civil Services Examination, Previous Year Question (PYQ)

Q.1 In India, under cyber insurance for individuals, which of the following benefits are generally covered, in addition to payment for the loss of funds and other benefits? (2020)

  • Cost of restoration of the computer system in case of malware disrupting access to one’s computer
  • Cost of a new computer if some miscreant wilfully damages it, if proved so
  • Cost of hiring a specialised consultant to minimise the loss in case of cyber extortion
  • Cost of defence in the Court of Law if any third party files a suit

Select the correct answer using the code given below:

(a) 1, 2 and 4 only (b) 1, 3 and 4 only (c) 2 and 3 only (d) 1, 2, 3 and 4

Q.2 In India, it is legally mandatory for which of the following to report on cyber security incidents? (2017)

  • Service providers
  • Data centres
  • Body corporate

(a) 1 only (b) 1 and 2 only (c) 3 only (d) 1, 2 and 3

Q. What are the different elements of cyber security ? Keeping in view the challenges in cyber security, examine the extent to which India has successfully developed a comprehensive National Cyber Security Strategy. (2022)

essay on cyber crime in india

  • IAS Preparation
  • UPSC Preparation Strategy
  • Cyber Crime

Cybercrime: Notes for UPSC GS-III

Cybercrime is a crime that involves a computer and a network. The computer may have been used to commit the crime and in many cases, it is also the target. Cybercrime may threaten a person or a nation’s security and financial health.

Cybercrime is a topic featured in the GS-III section of the IAS Exam . Candidates attempting the exam will find the details given in the article to be of immense use.

 

Definition of Cybercrime

Any offenses committed against individuals or groups of individuals to harm the reputation or cause physical or mental trauma through electronic means can be defined as Cybercrime. Electronic means can include but are not limited to, the use of modern telecommunication networks such as the Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS).

To know more about India’s national cybersecurity policy , visit the linked article.

Why is Cybercrime considered a grave offense?

There are many privacy concerns surrounding cybercrime when sensitive information is intercepted and leaked to the public, legally or otherwise. Some of that information may include data about military deployments, internal government communications, and even private data about high-value individuals. Cybercrime is not confined to individuals alone. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Cybercrimes crossing international borders and involving the actions of at least one nation-state is sometimes referred to as cyberwarfare.

In 2018, a study by Center for Strategic and International Studies (CSIS), in partnership with McAfee, a leading cybersecurity firm concludes that close to $600 billion, nearly one percent of global GDP, is lost to cybercrime each year.

Candidates can check out the relevant links given below to prepare for the upcoming exams even better-

Laws against Cybercrime in India

Ever since the introduction of cyber laws in India, the Information Technology Act (IT Act) 2000  covers different types of crimes under cyber law in India. The following types of cybercrimes are covered under the IT Act 2000.

  • Identity theft  – Identity theft is defined as theft of personnel information of an individual to avail financial services or steal the financial assets themselves.
  • Cyberterrorism  – Cyberterrorism is committed with the purpose of causing grievous harm or extortion of any kind subjected towards a person, groups of individuals, or governments.
  • Cyberbullying  – Cyberbullying is the act of intimidating, harassment, defaming, or any other form of mental degradation through the use of electronic means or modes such as social media.
  • Hacking  – Access of information through fraudulent or unethical means is known as hacking. This is the most common form of cybercrime know to the general public.
  • Defamation  – While every individual has his or her right to speech on internet platforms as well, but if their statements cross a line and harm the reputation of any individual or organization, then they can be charged with the Defamation Law.
  • Trade Secrets  – Internet organization spends a lot of their time and money in developing software, applications, and tools and rely on Cyber Laws to protect their data and trade secrets against theft; doing which is a punishable offense.
  • Freedom of Speech  – When it comes to the internet, there is a very thin line between freedom of speech and being a cyber-offender. As freedom of speech enables individuals to speak their mind, cyber law refrains obscenity and crassness over the web.
  • Harassment and Stalking   – Harassment and stalking are prohibited over internet platforms as well. Cyber laws protect the victims and prosecute the offender against this offense.

IT Act, 2000 went through amendments under the Indian Penal Code in the year 2008. These were made in light of the laws on cybercrime – IT Act, 2000 by way of the IT Act, 2008. They were enforced at the beginning of 2009 to strengthen the cybersecurity laws.

Cybercrime – UPSC Notes:- Download PDF Here

Frequently Asked Questions about Cybercrime

What are examples of cyber crimes, what are types of cybercrime.

For more UPSC- related preparation articles visit the links given in the table below. Candidates can visit the UPSC Syllabus page to get a general idea of the UPSC exams.

Related Links

Online Quiz 2022

IAS General Studies Notes Links

Leave a Comment Cancel reply

Your Mobile number and Email id will not be published. Required fields are marked *

Request OTP on Voice Call

Post My Comment

essay on cyber crime in india

IAS 2024 - Your dream can come true!

Download the ultimate guide to upsc cse preparation, register with byju's & download free pdfs, register with byju's & watch live videos.

Vocation India

Essay on Cyber Crimes | Cyber Crime Essay 150, 200, 250 Words

Essay on Cyber Crimes: Crime has changed its nature with changing times. Earlier, crimes used to be committed by one or many persons physically. Now, crimes are committed from far away through computers and mobile devices. Such crimes are known as Cyber Crimes. 

Essay on Cyber Crimes

As we move towards a more digitally-oriented world, Cyber crimes have become more widespread and prominent. Moreover, as technology evolves, the rate and sophistication of cyber crimes has also improved. Cyber crimes are now a major form in which crimes are committed.

The threat posed by cyber crimes is huge, hence making it imperative for us to educate our younger generation about its nature and impacts. Due to the critical importance of the subject, the students are often required to write an Essay on Cyber Crimes. Hence, we, in this article, provide you with two Essay on Cyber Crimes to help you write your own Essay on Cyber Crimes.

Essay on Cyber Crimes 150 Words

An Essay on Cyber Crimes 150 Words is as follows

In the past few decades, we, humans, have become extremely reliant on computers and mobile phones for our day-to-day work. The excessive reliance on them has led to some criminals misusing the technology to commit crimes. Such crimes have become widespread and lethal in recent times.

Cybercrimes come in a wide variety of forms, ranging from relatively small offences like breaking into someone’s social network account to far more serious ones like stealing confidential data from a government organisation or financial institution. It can also involve stealing money digitally from any individual’s or organisation’s bank account. In the past, we have seen how a cybercriminal sitting in one country can steal millions of dollars from a bank in another country.

Cyber crimes pose a serious threat to the normal functioning of a country’s social and economic system. It can cause riots, robberies, killings, genocides, terrorist attacks and a lot more things. Thus, cyber crimes must be kept in check by the government authorities and citizens must assist them.

Essay on Cyber Crimes 200 Words

An Essay on Cyber Crimes 200 Words is as follows

Cyber crimes are a bane to society. Cyber crimes are a type of crime which include carrying out illegal activities while using technology, such as computers and the Internet. They have become extremely widespread and sophisticated. In fact, it is a constantly evolving threat that can cause serious threats to individuals, governments, corporations and other financial organizations.

Cyber crimes can be of many types. One of the most widespread types is a money heist which involves the robbery of money from big banks, wealthy individuals, financial organisations, and even the common man. Another type of cyber crime is hacking, which is the act of breaking into a computer system or network without authorization from the authorities. Hackers may carry out such actions for numerous motives, such as obtaining confidential information, causing harm to the system, etc. 

Due to the grave threat posed by cyber crimes, it is extremely important to educate and spread awareness about its harmful effects. To secure cyberspace, the government, big corporations and even individuals need to do their part. The government must make laws to counter cybercrimes, corporations must use vigilance to prevent them from happening and individuals need to stay aware and cautious to prevent themselves from being victims.

Essay on Cyber Crimes 250 Words

An Essay on Cyber Crimes 250 Words is as follows

The nature of crime has evolved with technology. Earlier, crimes used to be conducted physically at a place. Now, however, crimes are carried out from a distance using the cyberspace. Such crimes are called cyber crimes.

Over the past few decades, humans have become increasingly dependent upon digital products for the smallest of tasks. Cybercriminals use this exact fact to commit heinous crimes such as robberies, hacking, cyberstalking, phishing, etc. 

The most common type of cybercrime is hacking in which a person or a group of persons  break into a system used by governments or private individuals to do activities that they are not authorised to do. Another type of cyber crime that is now becoming very effective is identity theft in which personal information about a person, such as their name, address, and government ID number, may be stolen and used fraudulently.

Cybercrime can have serious and pervasive repercussions. Cybercrime victims may experience mental suffering, financial losses, and reputational harm. it can occasionally endanger the nation’s security. For instance, cyberattacks against vital infrastructure, like transportation or electrical grids, might result in severe disruption and anarchy.

Cyber Crime is a major problem that threatens people, businesses, and national security. It can be used to cause deaths, riots, genocide, terrorist attacks, bank robberies, hijacks, accidents and so on. Moreover, as technology improves, cybercriminals keep finding new ways to disrupt the normal functioning of our social and economic systems. Thus, it is now imperative that citizens, as well as governments and big corporations, must do their part to tackle the ever-burgeoning threat of cyber crime. 

Essay on Cyber Crimes

Thank you for visiting Vocation India and reading our article on Essay on Cyber Crimes

Share this article on Essay on Cyber Crimes with your friends

About The Author

Gautam kukreja, related posts.

essay on cyber crime in india

My Village Essay | My Village Essay 10 Lines

essay on cyber crime in india

Our National Flag Paragraph | 5 Lines on Our National Flag

essay on cyber crime in india

A Boat Journey Paragraph for Class 6 [Latest & Unique]

essay on cyber crime in india

Corruption Free India for a Developed Nation 500 Words & 10 Lines

Leave a comment cancel reply.

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

ISSN 2581-5369

HeinOnline, MANUPATRA, Google Scholar Indexed

A Study on Cyber Crime and its Legal Framework in India

  • Apoorva Bhangla and Jahanvi Tuli
  • Show Author Details

Apoorva Bhangla

Student at NMIMS School of Law, India

Jahanvi Tuli

  • img Download Full Paper
  • img Export Citation

Export citation

Cyber-crime mainly involves activities that use internet and computers as a tool to extract private information of an individual either directly or indirectly and disclosing it on online platforms without the person’s consent or illegally with the aim of degrading the reputation or causing mental or physical harm. With the advancement in technology a steep increase in the rate of cyber-crimes has been observed. With the increase of dependency on cyberspace internet crimes committed against women have also increased. This is mainly because around more than half of the online users are not fully aware of the functioning of online platforms, they are ignorant towards technological advancements and have minimal adequate training and education. Thus, cybercrime has emerged as a major challenge for the law enforcement agencies of different countries in order to protect women and children who are harassed and abused for voyeuristic pleasures. Women are commonly targeted for cyber stalking, cyber pornography, impersonation etc. India is one of the few countries which has enacted the IT Act 2000 to deal with issues pertaining to cyber-crimes in order to protect the women from exploitation by vicious predators however this act doesn’t address some of the gravest dangers to the security of the women and issues involving women are still growing immensely.

  • Cyber-crime
  • online platforms.

Research Paper

Information

International Journal of Law Management and Humanities, Volume 4, Issue 2, Page 493 - 504

Creative Commons

essay on cyber crime in india

This is an Open Access article, distributed under the terms of the Creative Commons Attribution -NonCommercial 4.0 International (CC BY-NC 4.0) (https://creativecommons.org/licenses/by-nc/4.0/), which permits remixing, adapting, and building upon the work for non-commercial use, provided the original work is properly cited.

Copyright © IJLMH 2021

I. Introduction

The advent of technology has provided women an opportunity to explore their strengths and widen their capabilities. With the rapid modernisation taking place all over the world, internet has become a part of our daily lives. It has proved to be an efficient tool of communication. However, with the increase of dependency on cyberspace internet crimes committed against women have also increased. Women all over the world have been victims to a number of harassments for decades now. With the advent of technology and digitalisation people have the ability to communicate virtually with anybody, anytime and anywhere across the globe. Cyber-crime has emerged as one of the results of this modernisation. Online platforms are often used to harass and abuse women for voyeuristic pleasures. One of the major reasons as to why it takes place is because of the fact that around more than half of the online users are not fully aware of the functioning of online platforms such as WhatsApp, skype, Facebook, etc. There is minimal adequate training and education that is provided to the users. Moreover, ignorance towards technological advancements has carved its way for such heinous crimes. Women are commonly targeted for cyber stalking, cyber pornography, impersonation etc. The victims often trust the offender and share their private data or information as a consequence of which innumerable cyber-crimes take place daily. Due to fear of defamation in the society and lack of evidence it becomes really difficult to identify the origin of the crime. Cyber-crime has become a concept wherein majority of cases the victims have been women who have fallen prey to technological fancies. A steep increase in the rate of cyber-crimes has been observed in different countries where the primary concern has always been the protection of women. India is one of the few countries which has enacted the IT Act 2000 to deal with issues pertaining to cyber-crimes in order to protect the women from exploitation by vicious predators and provide them support so that they can fight back against all wrongdoings. Many institutions have taken up the issues pertaining to cybercrime in order to raise awareness for the safety of women but still a steep increase has been observed in this area, which poses a negative impact on the development of the nation. 

II. What is Cyber Crime?

Cybercrimes can be defined as: “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones”. [1]

Cyber-crime involves the use of internet and computer. It threatens an individual’s privacy by disclosing or publishing their personal or confidential information online with the aim of degrading their reputation and causing them physical or mental harm either directly or indirectly. Women are generally the targets of these offenders because they are inexperienced and lack knowledge of the cyber world, thereby falling prey to the technological fancies.

Debarati Halder and K. Jaishankar further define cybercrime from the perspective of gender and defined “cybercrime against women” as “Crimes targeted against women with a motive to intentionally harm the victim psychologically and physically, using modern telecommunication networks such as internet and mobile phones”.

Types of Cyber Crime

  • Cyberstalking

In today’s modern world, it is one of the most commonly committed crimes. It involves following a person’s movements and pursuing him/her stealthily. It involves gathering data that maybe used to harass a person or making false accusations or threats. A cyber stalker uses internet to stalk someone and thus, doesn’t pose a direct physical threat to an individual but due to the anonymity of the interactions that take place online the chances of identification of the cyber stalker becomes quite difficult which makes this crime more common than physical stalking. 

One of the major targets of cyber stalking is women and children who are stalked by men and adult predators namely, for revenge, for sexual harassment and for ego. Most of the times, the victim is unaware of the use and rules of the internet and the anonymity of the users has contributed to the rise of cyber stalking as a form of crime. The offender  for committing this offence maybe charged for breach of confidentiality and privacy under section 72 of the IT Act, 2000 as cyber stalking is yet not covered under existing cyber laws in India. Also, section 441 and 509 of IPC are also applicable for the same.

  • Cyber Pornography

It is a major threat to women and children security as it involves publishing and transmitting pornographic pictures, photos or writings using the internet which can be reproduced on various other electronic devices instantly. It refers to portrayal of sexual material on the internet.

According to A.P. Mali, “It is the graphic, sexually explicit subordination of women through pictures or words that also includes pornography is verbal or pictorial material which represents or describes sexual behaviour that is degrading or abusive to one or more of participants in such a way as to endorse the degradation. The person has chosen or consented to be harmed, abused, subjected to coercion does not alter the degrading character of such behaviour.” [2] Around 50% of the total websites on the internet show pornographic material wherein photos and pictures of women are posted online that are dangerous to women’s integrity. 

According to IT Amendment Act 2008 “crime of pornography under section 67-A, whoever publishes and transmits or causes to be a published and transmitted in the electronic form any material which contains sexually explicit act or conduct can be called as pornography. Section 292/293/294, 500/506 and 509 of Indian Panel Code, 1860 are also applicable and victim can file a complaint near the Police Station where the crime has been committed or where he comes to know about crime. After proving crime, the accused can be called as first conviction with an imprisonment for a term which may extend to five years including fine which may extend to ten lakh rupees. In the second conviction the term of imprisonment may extend to seven years and fine may extend to ten lakh rupees”.

  • Cyber Morphing

It is a form of crime in which the original picture is edited by an unauthorised user or a person possessing a fake identity. Photographs are taken of female users from their profiles and are then reposted for pornographic purposes by fake accounts on different sites after editing them. Due to the lack of awareness among the users the criminals are encouraged to commit such heinous crimes. Cyber morphing or Cyber obscenity is punishable under section 43 and 66 of Information Act 2000.

  • Cyber Bullying

Cyberbullying involves the use of internet for causing embarrassment or humiliation to someone place by sharing their personal or private data by sending, posting or sharing harmful or false content over digital devices like computers, tablets, laptops and cell phones. It can take place through SMS, online gaming communities, online forums or social media platforms wherein information can be exchanged online and is available to a number of people. Cyberbullying is persistent and permanent and therefore, can harm the online reputation of not just the victim but both the parties involved. 

  • Email Spoofing and Impersonation

It is one of the most common cybercrime. It involves sending e-mail which represents its origin. In today’s times, this from of crime has become immensely common that it becomes really difficult to assess as to whether the mail that is received is truly from the original sender. Email spoofing is mostly used to extract personal information and private images from women fraudulently and are later used to blackmail them. According to a report, there has been a 280% of increase of phishing attacks since 2016. Avanan research depicts that around 4% of the total emails that are received by an individual user are fraudulent emails. In Gujarat Ambuja’s Executive case, the 51 year old cyber 1 criminal created a fake email ID and pretending to be a woman indulged in a “cyber relationship” extorting Rs 96 lakh from an Abu Dhabi based businessman. [3]

Email spoofing is an offence under section 66-D of the Information Technology Amendment Act, 2008 and section 417, 419 and 465 of Indian Panel Code 1860. It is a cognizable, bailable and compoundable offence with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.

  • Online Trolling

It is a form of online violence on social media platforms where people are given the liberty to speak their mind. Online harassers often tend to target people who express their opinions and think differently from the prevailing societal norms. On such section constitutes of females who are targeted by social media bullies. According to Digital Hifazat report, “women that are vocal online, especially on topics that have been traditionally relegated to ‘male expertise’ like religion or politics, or about women’s experiences, including those of sexuality, menstruation, or speaking out about patriarchy, are subjected to a vicious form of trolling, usually from self-identified right-wing accounts on Twitter.” [4]

Social media bullying takes a toll on the mental as well as the physical health of the victims. Abuse, hate speech and mean comments are the most common elements of trolling. The most common consequences of trolling are self-censorship and mental health concerns. 

III. Extent of cybercrime against women in india

With approximately 688 million active users, India is the second largest internet market in the world. [5] Sites like Facebook, YouTube, Twitter, Instagram, WhatsApp and Snapchat are the most liked in India. While internet population has been increasing there still is a gender divide. According to a report published by IAMAI (Internet and Mobile Association of India) on internet usage in India, about 67% of the users are male compared to which only 33% are female. [6] This disparity between the male and female users is the major reason for the growth of cybercrime incidents against women.

Cyber-crimes are illegal activities which is forbidden by the law and committed by the use of internet and cyber technology. Cyber-crimes can be committed against any person, property or government but this paper solely focuses on cyber- crimes against women. According to National Crime Research Bureau there was sharp increase in the number of reported cyber-crime in 2017 in comparison to past years. Further increase in the reported cybercrimes can be seen in the year 2018. “While a total of 21,796 crimes were recorded under both IPC and IT Act in 2017, the number has increased to 27,248 in 2018.” [7] In 2017 NCRB for the first time had included categories relating to women and child on the nature of crimes committed against them.

Since the 1990s the information technology has taken giant strides forward and every family who has a modest income has the internet service. Individuals from varying age are able to use it everywhere starting from their home to their workplace. It can be deduced that internet has become a world on its own with its own place where one can share, have cultural values or opportunities.  But it has its own disadvantages, the cyber world has become a place for wrongdoers to defraud women and some even going as low as to encroach children. The ceaseless advancement of internet is making it harder to detect and regulate leading to rise of cyber criminals. Due to technological innovations cyber criminals are able to commit crime with a fake identity from any place in the world. This means that they do not have any physical contact with the real world and are mostly getting away with it without any punishment. With the protection of anonymity people are able to access any kind of material on the web which leads to huge number of anti-social, violent and aggressive content.

One of the major reason for the rise of cyber-crime against women apart from the advancement of internet is the fact that Indian women are not open on reporting a cyber-crime. They fear that it will bring disgrace to their families. Most of the times they believe that it is their own fault that the crime happened. Cyber space is a world on its own and people come and go as they please. This makes the cyber criminals to commit a crime and escape punishment easily. Through various instances it can be seen that women befriend men on the internet who forms a bond by discussing their lives and pretending to be the woman’s true friend. Gradually they form a strong friendship and then starts to send obscene messages. In this tinstance it is the duty of the woman to report the person but it can be seen that in the most of the cases they shy away and this gives more courage to the cyber-criminal. A 2016 survey on Violence Online in India conducted by the Feminism in India portal on 500 individuals (97% women and 3% trans-genders) found that 58 percent of respondents “had faced some kind of online aggression in the form of trolling, bullying, abuse or harassment”. But 38% of those who faced such violence did not take any action. [8] The victim women needs to understand that by reporting the man the problem can be solved and further saving the lives of other woman who can be the criminal’s future targets.

IV. The legal framework

There are two unique features of the Internet. Firstly, it is not confined to a particular boundary and the cyber-criminal can commit a crime from ay part of the world. The second unique feature is that it provide anonymity to its users which has its own boon and bane. For people who use this anonymity for putting out their opinion to the world it’s a boon but the perpetrators who use this anonymity for commission of crime it is a bane. Therefore this features not only pose a challenge in crime prevention but also in the implementation of law. At present there is no specific law that deals with cyber-crime against women. Other laws which can be used in the specific case, most women are not aware of. Women does not know about their rights or that such rights exist.

There are many laws in statues and regulations which penalises cyber-crime. But the majority of the laws belong to the Indian penal Code (IPC), 1860 and the Information technology Act (IT Act), 2000. The IPC is the general criminal code of India which defines offences and prescribes punishment for the same. IPC covers laws and punishment pertaining to physical world and has been legislatively amended and judiciously interpreted to be applicable to cyber criminals. Whereas the IT Act is a specific code pertaining to use of information technology and crime committed through it. In 2008 IT Amendment Act was enacted inclusive of certain crimes related to cyber world. Both IT Act and IPC are complementary to each other on cyber-crime against women. The below mentioned table is taken from a discussion paper published by IT for Change it showcases the laws that a cyber-criminal can be charged with when he/she commits a crime against women. Following which the loopholes in the said laws is analysed.

IT Act Section 66E The capture and electronic transmission of images of private parts of a person, without his/her consent. – Non-consensual circulation and malicious distribution of sexually explicit photographic and video material about an individual.
Section 67 The publishing or transmission of obscene material in electronic form. –  Graphic sexual abuse on social media and blog platforms, including trolling.

–  Sending emails/social media messages with sexually explicit content and images to an individual, against his/her will.

Section 67A The publishing or transmission of sexually explicit content in electronic form. –  Graphic sexual abuse on social media and blog platforms, including trolling.

–  Sending emails/social media messages with sexually explicit content and images to an individual, against his/her will.

Section 67B The electronic publishing or transmission of material in electronic form that depicts children in obscene or indecent or sexually explicit manner. – Circulation of child pornography
IPC Section 354 A Sexual harassment, including by showing pornography against the will of a woman –  Graphic sexual abuse on social media and blog platforms, including trolling.

–  Sending video and pictures with sexually explicit content and images to a woman, against her will.

Section 354 C Voyeurism, including watching or capturing the image of a woman engaging in a private act in circumstances where she would have a reasonable expectation of not being observed; and dissemination of images of a woman engaging in a private act under circumstances where she has agree to the capture of images but not to their dissemination. – Non-consensual production, circulation and malicious distribution of sexually explicit photographic and video material about a woman.
Section 354D Following a woman, contacting/ attempting to contact her to foster personal interaction repeatedly despite a clear indication of disinterest by such woman, or monitoring the use by a woman of the Internet, email, or any other form of electronic communication – Cyber-stalking. Only women are recognized as potential victims by the law.
Section 499

 

Criminal Defamation that leads to reputational harm -Though this is a gender neutral provision, it could be invoked by women bloggers and women on social media fighting slander and libel.
Section 507 Criminal intimidation by anonymous communication – Though this is a gender neutral provision, it could be invoked by women fighting trolls issuing threats, whose identities are often anonymous.
Section 509 Word, gesture, act or exhibition of an object intended to insult the modesty of a woman. – Though this provision does not explicitly address online sexual harassment and abuse, it could be invoked in such cases.

Table 1. Key legal provisions that can be invoked to address online Violence against women [9]

Lacuna in the Existing Provision of Law

  • The verbal abuse made online which does not contain any sexual content is not properly tackled. General sexist comments have not been taken under Section 499 and Section 507 of the IPC which deals with criminal defamation and criminal intimidation pertaining to those trolls that are of personal nature. Further, doxing without any circulation of sexual material and without any intimidation is not included. Section 66 of the IT Act criminalises hacking but it does not explicitly state the act of doxing through hacking. Online trolling, verbal abuse, hacking for doxing has been treated as personal and isolated crime in Section 499 and Section 507 of IPC and Section 66 of the IT Act. It is important to note that this act of abuse is committed against women because she is a women. From the past it can be seen that the abuse is based on the women’s sexuality and caste.
  • Section 66E of IT Act and Section 354C, Section 354D of the Criminal Laws Amendment Act 2013 are the exception to violence as physical harm and not as intrusion to bodily integrity and personal autonomy as defined by the other sections of IT Act and IPC. These sections also just focuses on physical privacy and not on the “informational privacy”. [10] It is to be considered that Section 509 of IPC mention “Privacy” but it only talks about privacy with respect to women’s modesty. “Sexual violence is largely viewed from the standpoint of maintaining public decency through curbing obscenity and protecting the modesty of women.” [11] Further, it can be seen that withdrawn at any point. Sexual violence is combined with the need to regulate the ratification and representation of sexuality which results in reinforcing genders norms of protecting women’s sexuality rather than protecting her bodily integrity or their informational privacy. Section 72 [12] and Section 43 read with Section 66 [13] of the IT Act is an economic offence and not a gender or social offence.
  • Psychological violence based on gender against women is not recognised by the law outside their familial setting. Acknowledgement of psychological violence that is the circulation of private information through infringement of privacy which is not of sexual nature is not been done.
  • Additionally laws like Protection of Women from Domestic Violence Act, 2005 which deals with cases related to psychological violence at home and live in relationships does not talk about cybercrime with respect to women.

V. Suggestions

  • While using online platform not divulging any personal data is almost impossible and thus, one should beware while sharing any personal information online.
  • It is imperative that an eye should be kept on phony email messages and such emails should not be responded to that ask for personal information. Also, email address should be guarded.
  • While engaging in online activities it is imperative that attention should be paid to privacy policies on websites and steer clear of fraudulent websites used to steal personal information.
  • It is necessary that response to offences on the internet against women should be seen as part of the broader movement against harassment and abuse. Broader efforts should be initiated as it is ultimately a people- centred challenge.
  • Keeping up with the pace of change is the need of the hour. Keeping up with the technological advancements is a challenge that is essential to overcome as most of the online crimes takes place due to the lack of knowledge and awareness among the users.
  • A collaborative effort among media, clubs, associations and women’s media networks is critical to promote women’s leadership and decision making in the society.
  • Online diligence, monitoring and reporting against violence and cyber-crime should be done effectively and efficiently.
  • There should be an E-portal where women can report their problems online themselves without suffering from the stigma of involving police in such matters. Also, the database of criminals should be maintained which could help in law enforcement.
  • Women should be made aware about using online media platforms and adequate procedures should be followed by them. They need to be aware of their right in the cyberspace.
  • Education systems must initiate contemporary issues regarding online crimes and awareness should be spread regarding safe internet uses.
  • The government should make more rigid rules to apply on the Internet Service Providers (ISPs) as they have the entire record of the data that is accuses by the users surfing on the web. Also, in case of any suspicious activities a report should be made by them in order to prevent crimes at an early stage.

VI. Conclusion

“The law is not the be-all and end-all solution.” Victims are still not getting justice despite of a strong legal base in spite of them remaining silent. Cyber-crime against women is just a reality check of what really is going on in the real world. The lines between the online and offline world is getting blurred. Cyber-crime happens because the criminals think that is a much easier way with less punishment. With millions of users in the online platforms complaint mechanisms has also become fruitless.

For instance in the recent boy’s locker room case where group of teenage boys from Delhi shared pictures of underage women and objectified them by passing derogatory comments on group chat in Instagram and Snapchat. When a girl shared the screenshots of the chats the group was busted. Women all over country raised voices but it could be seen that they were not shocked. The reason is that objectification of women has become quite normal in the society. Women have has accepted this mentality of objectification by male as every day new cases come into light. Years have passed and still women lives in the fear of going out alone outside in the real world. In fact the online world which she could go to in the safety of her home has also become an unsafe place.

It comes upon the women to take preventive measures such as usage of data security, not leaving digital footprint, keeping everything password protected. But this are all superficial ways. The major problem that has always been existing is the patriarchy and misogyny in the society. To solve this problem a long term measure need to be undertaken that will help in dealing with cyber-crime against women.

There is the need of the hour to evolve the societal and cultural norms with the development of information technology. Mandatory steps need to be taken. Steps like digital literacy, development of data security, providing access of technology to women and girls and most of all enactment of laws specifically on cyber-crime especially with reference to women.

[1] DEBRATI HALDER &   K. JAISHANKAR,   CYBER CRIMES AGAINST WOMEN IN INDIA

[2] Adv. Prashant Mali, IT Act 2000: Types of Cyber Crimes & Cyber Law in India-Part 1 .

[3] Case of Cyber Extortion , INDIA FORENSIC, (Jan 20, 2021), http://www.indiaforensic.com/cyberextortion.htm

[4] Trolls Target Women: Dealing with Online Violence, THE CITIZEN, (Jan 21, 2021), https://www.thecitizen.in/ index.php/en/NewsDetail/index/7/17330/Trolls-Target-Women-Dealing-with-Online-Violence

[5] Digital population in India as of January 2020 , STATISTA, (Jan 21, 2021),   www.statista.com/statistics/309866/ india-digital-population/.

[6] India Internet 2019 , IAMAI, (Jan 28, 2021), https://cms.iamai.in/Content/ResearchPapers/d3654bcc-002f-4fc7-ab39-e1fbeb00005d.pdf

[7] Crime in India- 2018 , NCRB, (Jan 28, 2021), https://ncrb.gov.in/crime-india-2018

[8] Pasricha & Japleen, “Violence” online in India: Cybercrimes against women and minorities on social media , http://feminisminindia.com/wp-content/uploads/2016/05/FII_cyberbullying_report_website.pdf

[9] Technology-mediated violence against women in India, IT FOR CHANGE, (Jan 29, 2021), https://itforchange.net/e-vaw/wp-content/uploads/2017/12/DISCUSSIONPAPER.pdf

[10] “Information privacy, or data privacy (or data protection), concerns personally identifiable information or other sensitive information and how it is collected, stored, used, and finally destroyed or deleted – in digital form or otherwise. In relation to technology, it pertains to the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.”

[11] supra note 9

[12] Breach of privacy and confidentiality

[13] Data Theft

Total number of HTML views: 8872

Total number of pdf downloaded: 1084, open access.

http://doi.one/10.1732/IJLMH.26089

Recent content

1 uniform civil code: a proposal to one nation one law.

By Raman Bhardwaj and Dr. Rekha Kumari

Volume: 7 Issue : 3 Page: 3391 - 3399

2 Predictive Modelling of Conflict-Induced Forced Displacement in West Africa

By Aashi Sharma , Harshita and Naman Kachroo

Volume: 7 Issue : 3 Page: 3376 - 3390

3 Hindu Women’s Right to Inheritance in Bangladesh: An Analytical Study

By Yasmin Farjana

Volume: 7 Issue : 3 Page: 3359 - 3375

4 Corruption and Good Governance: Commonwealth Games Scam & Corruption present in the Public Sectors

By Karthik R. Iyer

Volume: 7 Issue : 3 Page: 3343 - 3358

5 Exploring the Process of ‘Complaint Mode of Crime Reporting’ and its Various Facets under the Indian Criminal Procedure Code

By Aditya Narayan Dwivedi and Shilpa Nayak

Volume: 7 Issue : 3 Page: 3329 - 3342

International Journal of Law Management & Humanities

Typically replies within 24 hours.

Any questions related to the journal or your submission?

WhatsApp Us

🟢 We will respond within 24 hours, maybe less.

WhatsApp us.

Home — Essay Samples — Law, Crime & Punishment — Cyber Crimes — Laws for Cyber Crimes in India

test_template

Laws for Cyber Crimes in India

  • Categories: Cyber Crimes India

About this sample

close

Words: 2132 |

11 min read

Published: Sep 20, 2018

Words: 2132 | Pages: 4 | 11 min read

Table of contents

Introduction, categories of cyber crimes: cyber crime regulated by cyber laws or internet laws.

  • The Computer as a Target: Using a computer to attack other computers e.g. Hacking, Virus/Worm attacks, etc.
  • The computer as a weapon: Using a computer to commit real world crimes e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
  • Email spoofing Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source. Please Read
  • Email Spamming Email spamming refers to sending email to thousands and thousands of users - similar to a chain letter.
  • Sending malicious codes through email E-mails are used to send viruses, Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code.
  • Email bombing E-mail bombing is characterized by abusers repeatedly sending an identical email message to a particular address.
  •  Sending threatening emails
  • Defamatory emails
  • Email frauds
  • IRC related Three main ways to attack IRC are: attacks, clone attacks, and flood attacks.
  • Addiction: Pornography provides a powerful sexual stimulant or aphrodisiac effect, followed by sexual release, most often through masturbation.
  • Escalation: Over time addicts require more explicit and deviant material to meet their sexual needs.”
  • Desensitization: What was first perceived as gross, shocking and disturbing, in time becomes common and acceptable.
  •  Acting out sexually: There is an increasing tendency to act out behaviors viewed in pornography.
  • It is cheaper than traditional terrorist methods.
  • Cyberterrorism is more anonymous than traditional terrorist methods.
  • The variety and number of targets are enormous.
  • Cyberterrorism can be conducted remotely, a feature that is especially appealing to terrorists.
  • Cyberterrorism has the potential to affect directly a larger number of people.

Image of Dr. Oliver Johnson

Cite this Essay

Let us write you an essay from scratch

  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours

Get high-quality help

author

Verified writer

  • Expert in: Law, Crime & Punishment Geography & Travel

writer

+ 120 experts online

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy . We’ll occasionally send you promo and account related email

No need to pay just yet!

Related Essays

2 pages / 947 words

4 pages / 1788 words

1 pages / 569 words

1 pages / 1357 words

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

121 writers online

Laws for Cyber Crimes in India Essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

Related Essays on Cyber Crimes

In our increasingly interconnected world, where technology is deeply woven into the fabric of our daily lives, the specter of computer threats looms large. From malware attacks to hacking and data breaches, the digital landscape [...]

Lee, S. (2017). Encrypted Messaging: Keeping Your Conversations Secure. Security Boulevard.Smirnoff, V., & Turner, S. (2019). Symmetric Encryption: Definition, Types, and Examples. SecurityTrails.Almeida, R. (2019). Asymmetric [...]

Cybersecurity has become a very familiar term that has drawn increasing awareness of the danger of leaving cybercrimes unpunished. Because the world is moving more toward online trading and e-commerce, and basically living [...]

Threats may come in many forms and this includes online threat as well. While we are using the internet, we are prone to be attacked by many viruses such as Identity theft, Trojan, Malware, Phishing and even more. Technology has [...]

Cyber-attacks have become a common phenomenon in the modern society. Three factors contribute towards launching a cyber-attack to an individual or a state. They are; vulnerability factor, fear factor and spectacular factor. The [...]

Hate crimes are crimes that are motivated by discrimination towards a targeted group. Perpetrators perform harmful acts towards victims and can be as dangerous as murder or death threats to spitting and name calling (Saucier, [...]

Related Topics

By clicking “Send”, you agree to our Terms of service and Privacy statement . We will occasionally send you account related emails.

Where do you want us to send this sample?

By clicking “Continue”, you agree to our terms of service and privacy policy.

Be careful. This essay is not unique

This essay was donated by a student and is likely to have been used and submitted before

Download this Sample

Free samples may contain mistakes and not unique parts

Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

Please check your inbox.

We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

Get Your Personalized Essay in 3 Hours or Less!

We use cookies to personalyze your web-site experience. By continuing we’ll assume you board with our cookie policy .

  • Instructions Followed To The Letter
  • Deadlines Met At Every Stage
  • Unique And Plagiarism Free

essay on cyber crime in india

  • Skip to main content

India’s Largest Career Transformation Portal

Essay on Cyber Crime for Students in English [Easy Words]

January 12, 2021 by Sandeep

Essay on Cyber Crime: Computer related networks that involve the use of computers, networks and gadgets can be interconnected to a cybercrime. In such crimes, the security of networks, persons, institutions or a whole nation could be at risk and threat. Hackers steal confidential data in unethical ways and utilize this information and data for spurious purposes. Cybercrimes are high functional frauds that can wipe off big online financial transactions and transfer the entire amount into criminal accounts.

Essay on Cyber Crime 500 Words in English

Below we have provided Cyber Crime Essay in English, suitable for class 6, 7, 8, 9 & 10.

Cyber Crime involves digital devices ( computer , hardware device, or network) as tools or targets. It can be defined as an unlawful act that is done to harm someone. It is one of the most complicated issues in the cyber world. Many people think cyber crime refers to targeting people and stealing their money. However, that is not the case.

Cybercrimes may include credit card frauds, voice phishing, distribution of viruses, cyber-stalking, child pornography, forgery, unauthorized access, etc. This is a fast-growing area of crime that happens over the internet . With the advancement in technology, we are leaning towards the internet all the more. It is needed for numerous activities like social networking, gaming, transaction, e-commerce, online studies, shopping, job seeking, etc.

The first case was recorded in 1820. It has been said that in these recent few years, at least 4000 cases have been filed in Malaysia. All of these cases consist of fraud, malware; file loss, hack threats, and denial of services. Major crime areas as per the government include piracy, cracking, and cyber-terrorism. Since more and more people are using computers, these types of cyber crimes will only keep increasing.

India and many other nations are dealing with the same crisis. An article reported China in itself has near about 300 million internet users. Criminals rely on computers as it is networked internationally. These criminals are organized and individual hackers. They mostly get involved for two reasons. The first one is that they want to prove themselves to be excellent at breaching computer software. The second reason is for monetary purposes. They mostly target big companies, organizations, or banks.

The increase in the speed of the internet has, in turn, increased the rate of circulation of data. The measures for investigation, control, and prevention of these illegal activities are very important to safeguard all the organizations. Highly skilled Cyber Crime expertise must be obtained by our Government. Doing so will help regulate this grave issue.

Types of Cyber Crimes

There is a range of activities that fall into the category of cyber crime. Let us take a look at them.

  • Hacking: It refers to breaking into a person’s computer system without his/her knowledge or consent. It is also known as unauthorized trespassing in the cyber world. Hackers can access sensitive information of the user (like identity details, passwords, and credit card information).
  • Cyber Stalking: This is one of the worst ways to harass a person. Victims of cyber-stalking are subjected to tons of messages and emails by the stalkers. Not responding to these often leads to grave outcomes.
  • Identity Theft: Here, the person’s identity gets stolen. This includes his/her name, bank details, social security number, birthday, credit or debit cards, etc. This information is misused by the criminals to commit fraudulent activities (like applying for new credit cards, getting medical services, collecting loans) which hamper the owner’s record.
  • Phishing: This is a kind of email fraud wherein various mails are sent to the people. The content of the mail mostly seeks financial information of the person. These emails might look like they are coming from an authentic source (but they are not).
  • Malware: It is Internet-based software that is programmed to damage a computer system.
  • Computer vandalism: This type of cyber crime destroys a computer’s data by transmitting viruses.
  • Theft: It occurs when a person violates copyrights regulation. This is mostly noticed while downloading music, movies, or even games.

Laws related to Cyber Crimes

The Government has come up with several strict laws related to cyber crimes. These laws will help safeguard our interests. Also, they will be beneficial for controlling these crimes. Now, the police stations are equipped with cyber cells that quickly monitor the problem. In India, cyber crimes are usually registered under three categories. These are the IT Act, The Indian Penal Code, and The State Legislation’s.

The Ministry of Home Affairs has advised the State government to include facilities like technical infrastructure and skilled manpower to curb the cases of cyber crimes. Cyber Crime Police Officers can now receive training at the Forensic Lab of CBI.

Kerala, Tripura, Assam, and many other Indian states have started the training procedures. The Ministry of Home Affairs has also come up with an open platform (I4C) to fight against these crimes. I4C (Indian Cyber Crime Coordination Centre) helps victims to raise their complaints.

How to Prevent Cyber Crime

Now that we have these cyber laws, it is our responsibility to take steps to prevent these crimes. Protection measures must be taken if we want to secure ourselves. First of all, we must be aware of our online transactions. We can lose important information if our computer has spyware (and we are unaware of it).

Essay on Cyber Crime in India

essay on cyber crime in india

Read this essay to learn about cyber crime in India and its prevention. After reading this essay you will learn about:- 1. Subject-Matter of Cyber Crime in India 2. Definition of Cyber Crime 3. Types of Cyber Crime 4. Cyber Crime in Schools 5. Pornography 6. Offensive Acts Committed outside India 7. Identity Theft 8. Few Cases of Cyber Crime in India 9. Cyber Crime Relating to Women in India and Other Details.

List of Essays on Cyber Crime in India and its Prevention

Essay Contents:

  • Essay on the Suggestions for dealing with Cyber Crimes in India

1. Essay on the Subject-Matter of Cyber Crime in India:

Cyber space is a gigantic community of millions, where people reach for schools, learn about movies, shops, listen to music, watch video games, make business transactions like buying and selling of stocks and shares—e-commerce.

Many also develop sites of their own. People buy tickets through internet, draw money from their banks through A.T.M’s, buy through credit cards, send information’s to friends and relations through e-mails and do hosts of other business.

Thus use of computers and internets are rapidly increasing at every corner of the world. This is evident from the mushrooming of Cyber Cafes in the various cities, towns, even semi towns. So this is called an “Age of computers”.

Because of the use of computers to-day people can be reached faster, jobs and works can be done quickly in a shorter time and with less hands. Manual labour is reduced to the minimum with the use of computers. Due to the global connectivity numerous changes and developments are seen in all spheres of human life. The internet has opened up a world of information for anyone with a computer and a connection.

Businessmen and consumers are increasingly using computers to create, transmit and store information’s in the electronic form instead of traditional paper documents and files. Information’s stored in electronic form has many advantages. It is cheaper, takes very less space and hence easier to store, retrieved and speedily communicated through electronic mail (e-mail).

International business and trade through e-commerce is growing very fast during the last 12-15 years and many advanced countries like U.S.A., U.K., Germany, Japan, Canada, Australia have switched over from traditional paper based business to electronic business.

Now a day’s more and more correspondences are made through e-mail than through post. It is also quick and less expensive. Information’s on tonnes of papers can be kept in a few computer discs. Is it not amazing? The computerization system, started about 26 years ago.

The density of personal computers in India is 1.8 per one thousand persons. India’s position in the world is 10th with 165 lakh internet users. India has been famous in the world because of its progress in the Information technology industry and because of large number of Indian I.T. professionals working abroad.

In-spite of the several usefulness of computer and internet, there are some disadvantages and negative implications such as on line addiction, cyber disorders, stressful life style and Cyber Crimes. These adverse effects of Cyber World on the users of internets are evident from several studies and observations.

To-day cyber security has become very important and the necessity of disciplinary regulation of Cyber Cafe and other internet service providers has become imperative. As more and more companies connect their networks to internet, awareness of computer crimes (Cyber Crimes) becomes critical.

2. Essay on the Definition of Cyber Crime:

What is a Cyber (Computer) Crime?

A Cyber Crime is any illegal behaviour directed by means of electrical operations that tries to harm the security of computer systems and the data processed by them. In a wider sense, however, a computer related crime may be any illegal behaviour committed by means of or in relation to a computer system or network.

In general, “Computer crime involves a number of issues ranging from the theft of information from a computer system or network, to the use of a computer as a tool during the commission of a crime.”

Virus attacks target the security of network health and should be coordinated with other security efforts. Even after taking several measures to avoid computer crime and protect the computers, still computer crimes do occur at some point or other.

Therefore highest priority should be given to prevention. Cyber Crime in simple terms refers to possible misuse arising out of transactions and other dealings concluded over the electronic medium and criminal liability for the contravention of the provisions of the proposed legislation.

3. Essay on the Types of Cyber Crime:

The tenth United Nation’s Congress on the prevention of crime and treatment of offenders, categorized five offenses as Cyber Crimes.

(1) Unauthorized access

(2) Damage to computer Data or programmes

(3) Sabotage to hinder the functioning of a computer system or net work

(4) Computer espionage

(5) Unauthorized interception of data to form and within a system or network.

The Cyber Crime and Intellectual property theft programme has tried to conduct research on six popular categories of cyber crime that have direct impact on consumers and citizens.

i. Financial:

Crimes are those which disturb or disrupt business ability to conduct electronic commerce. Information’s regarding business matters processed and stored on computer networks when leaked or stolen lead to financial crimes. Commercial transactions on line are heavily risked by viruses, cyber attacks or disturbed denial of service.

The ability of a company to participate in e-commerce depends greatly on its ability to minimize e-risk. Risks in the world of electronic transactions on line include viruses, cyber attacks, such as those which were able to bring Yahoo, e Bay and other Web sites to a halt in Feb, 2000 and e-forgery.

Similarly e-fraud and theft of proprietary information like demand for ransom are common Cyber Crimes under the financial category. The biggest case of e-fraud, an organized crime was recently caught attempting an online banking fraud that could have cost the Sicilian regional government over US $ 465 million.

In January 2000, a group of U.K. hackers broke in to the computer networks of at-least 12 multinational corporations and stole confidential files demanding up to £ 10 million in ransom. A preventive approach in addressing these financial Cyber Crimes is more desirable in view of the difficulty for law enforcement in tracing the offenders of these crime.

ii. Piracy:

The computer industry currently plays a leading role in creating products that have improved the standard of our life in a major way by improving our lives and work environment. Different printed and reading materials are available easily from the computer. But software theft or piracy is having a negative effect on the global market.

The ability to create new products is also suffering. Copying in the work place, counter feinting and various types of illegal distribution costs about $ 12 billion each year. Besides, the unauthorized electronic distribution and sale of copy righted works like valuable books and journals over the internet makes the crime more dangerous by bringing a huge loss to the authors, and publishers and owners.

To protect the creative works in computers from thefts legal and cultural frame works must be identified 1.0 prevent cyber piracy and to encourage creativity and research. More experts and consultants should be engaged to cheek and prevent this type of crime as it involves the interest of a larger number students, teachers, common man and intelligential.

iii. Hacking:

Hacking refers to defacing web sites. Who ever intentionally causes or likely to cause wrongful loss or damage to the public or any person, who destroys or deletes or changes any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means commits hacking.

As per the Indian I.T. Act (2000), anybody who commits hacking shall be punished with imprisonment up to 3 years or with fine which may extend up to 2 lakhs or with both.

Hacking may be done for mischievous reason, personal revenge or notoriety, for a challenge or for political enmity; it may also be a bad joke. But this new form of Cyber Crime is no joking matter. Along with the economic threats and loss due to hacking, there is also real physical danger caused by hacking into computer networks.

The General Accounting office in U.S.A. estimates that 64 percent of hacker attacks on the Department of Defense were successful in 1995 and surprisingly the majority of attacks remained undetected. A 16 year old.

Juvenile from Florida, (U.S.A.) was able to intercept electronic communications on military computer networks and break in to the NASA computer systems successfully forcing them to shut down for 21 days in July 1999 until the security breach was ended. This is purely a juvenile’s mischief. The juvenile was subsequently sentenced to six months in a juvenile detention home.

iv. Cyber Terrorism:

Terrorism is a heinous crime and cyber terrorism is more dangerous for the nation. Cyber terrorism is distinguished from other acts of commercial crimes like hacking on the basis of its severity and danger. According to Dorothy Danning “Violence against persons or property, at least cause enough harm to generate fear are to be considered as cyber terrorism attacks.”

Attacks that disrupt non essential services or that are mainly a costly nuisanse are not classified as cyber terrorist attacks as per the above definition. Recent world events have led to efforts to minimize cyber terrorist attacks. The recent appointment of Richard Clarke as special advisor to President Bush for Cyber space security is an effort in this regard.

4. Essay on Cyber Crime in Schools:

Internet has proved to be a very interesting and unique source for the education and recreation of children. Children world-wide are mostly fascinated by computers and internets. The internet has opened for kids a world of information’s.

But just as one should not send his children near a busy road without someone or some safety rules similarly, one should not send the children, to handle the computer or internet without clearly explaining them the rules of internet and how to handle them.

Too many dangers from pedophiles to conartists can reach children and also adults through internets. Explain the kids that although a person may be alone in a room using the computer, people skilled in using the computer can find out who you are doing and where you are.

They can even tap the information in your computers. Try to explore the computer and internet along with the child, visit areas of the World Wide Web that have special sites for the children.

Teach children about exploitation, pornography, hate literature, excessive violence and other issues of the world around so that they know how to respond, when they see these materials. Purchase blocking software and designs for your own safety system. Monitor your children when they are “on line” and monitor the time they spend on line.

Children must know how to safely and responsibly use computer. Steps must be taken to protect children “on line”.

Parents and teachers should be aware of cyber threats towards children’s physical safety like harmful and inappropriate content, pornographic materials, invasions of privacy leading to collection of personally identifiable information about individual children, commercialism and aggressive marketing targeted towards children, etc.

The basic aim of giving children an access to internet is to encourage empowering children through knowledge of law, their rights and duties and how best they can prevent misuse of the internet.

To prevent Cyber Crimes relating to school kids, tell your children:

(a) To always inform you at once when they find something threatening in the internet

(b) Never to give outsiders their name, parents name, address and phone number, school name. Pass Word, or any other personal information,

(c) Never to agree to meet face to face with someone they have met on line,

(d) Never to respond to messages that have bad word or scary words

(e) Never send their picture to anyone without permission.

The teachers or parents have also some responsibility here:

(1) They should be sure that the access to the internet at the children’s school is monitored by adults.

(2) They should know the friends of the child who have computer.

(3) If their child receives threatening E mails or pornographic materials, save the offensive material and contact the user’s internet service provider and your local law enforcement agency. Misuse and irresponsible use of internet by children whether intentionally or unintentionally can lead to dangerous consequences.

So it is essential that teachers and parents must educate children about the consequences associated with the misuse of the internet.

5. Essay on Pornography:

Pornography in internet is a Cyber Crime. Possessing or distributing child pornography is against federal law. Distributing pornography of any form to a minor is illegal in U.S.A. The internet is merely a novel medium to this old crime. But how to control this crime has led to a lot of controversy and discussion.

Survey shows that nearly one fifth of American children who use the internet have reported unwanted sexual advances from strangers. Senator Joseph Lieberonan has proposed to create a new “Sex” or “XXX” domain which would alert computers with fire wall protection in them to the site and block access to do so by a parent or guardian.

Besides the above Cyber Crimes commonly found in all countries including the most advanced country U.S.A. In Indian climate the Cyber Crimes more often found are discussed below. These crimes are punishable under Indian law.

a. Tampering with computer source documents:

Anybody, who knowingly or intentionally conceals, destroys or changes or intentionally or knowingly causes another to conceal, destroy or change any computer source used for a computer, computer programme, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, shall be punishable with imprisonment up to 3 years and with fine which may extend up to 2 lakhs or both.

b. Publishing obscene information’s in electronic form:

Whoever publishes or transmits or causes to be published any material in the electronic form (e-mail) which is obscene as per the Indian norms should be punished with imprisonment and fine. On first conviction the imprisonment may be up to 5 years with fine up to one lakh rupees. In the event of second or subsequent conviction the imprisonment may extend up to 10 years.

c. Mispresentation of materials, facts:

Any mispresentation to suppress any material fact from the certifying authority for obtaining any license or Digital signature certificate shall be punished with imprisonment.

d. Breach of confidentiality and privacy:

Assess to any electronic record, book, register, correspondence, information, document or other material without the consent of the person concerned, disclosing these to any other person shall be punished with imprisonment.

e. Penalty for publishing digital signature certificate false in certain particulars :

As per law no person shall publish a digital signature certificate or otherwise make it available to any person who has secured access to any electronic record without the consent of any other person shall be punished with imprisonment.

f. Publication for fraudulent purpose:

Any one who ever knowingly or intentionally creates, publishes or makes available a digital signature certificate for any fraudulent or unlawful purpose shall be punished with imprisonment and fine.

6. Essay on Offensive Acts Committed outside India:

Any offence committed outside India by any person irrespective of his nationality involving a computer or computer network located in India will be punished. If any computer, computer system, floppies, compact disks (C.Ds) tape or anything related to computer is contravened, shall be liable to confiscation.

In view of the rising Cyber Crimes in India, legal recognition has been provided to electronic commerce and electronic governance through the information technology Act-2000. The Act gives legal treatment to users of electronic communication with other conventional forms and envisages legalizing the electronic signatures on the net which would give sanctity to credit card transactions and boost e-commerce business.

The act is enacted to set up licensing, monitoring, and certifying authorities for enactment of Cyber laws. The authorities will monitor among other things Computer Crimes committed via Information Highways on Cyber Space.

The majority of e-commerce transactions in India are currently limited to business and business activities. When the buyers and sellers know each other, and have faith in each other, the e-commerce transactions go on well without any intrusion or disruption by an outsider. However an itruser can enter your computer and do harm to your business if you are not careful.

Power to Investigate Cyber Crime Offences inside India :

As per the criminal procedure Act 1973, a police officer, not below the rank of a Dy Suptd. of police (DSP) shall investigate any offence under this Act.

He has also the power to enter any public place or search and arrest without warrant any person who is suspected committing or having committed or being about to commit any offence under this act (Cyber Crime) companies in the similar way as individuals found guilty shall be punished accordingly.

Such powers cannot be delegated and will come under a judicial scrutiny. All Cyber Crimes in India do not come under the Information Technology Act, 2000. The following Cyber Crimes come under Indian Penal Code (IPC).

The relevant laws for various types of Cyber Crimes are given below:

1. Sending threatening messages by E-mail Sec. 503 IPC

2. Sending defamatory messages by e-mail Sec. 499 IPC

3. Forgery of electronic Records Sec. 463 IPC

4. Bogus Web Sites, Cyber Frauds Sec. 420 IPC

5. E-mail, spoofing Sec. 463 IPC

6. Web-jacking Sec. 383 IPC

7. On line sale of narcotics NDPS Act

8. On line sale of weapons Arms Act

9. Backing Sec. 66 IT Act

10. Pornography Sec. 67 IT Act

11. E.mail bombing Sec. 66 IT Act

12. Denial of Service Attacks Sec. 43 IT Act

13. Virus Attacks Sec. 43, 66 IT Act

14. Salami Attacks Sec. 66 IT Act

13. Logic bombs Sec. 43, 66 IT Act

The enactment of Information Technology Act 2000 has led to amendments in the Reserve Bank of India Act 1934, the Indian Penal Code 1861, the Indian Evidence Act 1872, the Indian Telegraph Act 1855; The Bankers Books Evidence Act 1891 and the General Clauses Act 1897.

Through the amendments of these Acts it will now be possible for courts to recognize digital signatures and electronic records and hence permit electronic commerce (e- commerce).

Other types of Cyber Crimes are related to Credit Card and A.T.M. Card. Using the number of your Credit Card ‘on line shopping’ may be made by frauds and thief’s. Many white Collar crimes are also committed through internets.

Credit Card Numbers should be kept secretly and should not be made public. The “password of the ATM Card” should also be kept strictly confidential to avoid illegal drawal of money by Cyber thieves.

7. Essay on Identity Theft:

“Identity theft is a criminal offence. It occurs when a person knowingly transfers or uses without lawful authority a means of identification of another person with the intent to commit or to aid or abet any unlawful activity that constitutes a violation of federal law or that constitutes a felony under any applicable state or social law.” (Identity Theft and Assumption Deterrence Act, 18 USC 1028 (a)(7).

The problem of identity theft is serious in U.S.A. The wide spread-ness of the problem can be understood from the following data. The FTC received 516740 complaints from consumers in 2003 while it was 404,000 in 2002, out of these complaints 42% i.e. 214905 were identity theft reports.

Appropriated identity information is used for Credit Card Fraud (33%), phone and utilities fraud (21%), bank fraud (17%), employment related Fraud (11%), government documents and benefits fraud (8%), loan fraud (6%), and other types of fraud (19%). Nearly 20% of all identity victims experience more than one type of identity theft.

Causes of Identity Theft :

Identity theft often occurs because someone has been casual and careless with personal information: By leaving personal information like name.

Credit Card Number, Pass Word of A.T.M., A.T.M Card, Social Security Number phone number, E.mail address or here and there or at home unsecured or by sharing personal data the Internet encourages potential identity thieves. Even by throwing out sensitive information such as bank accounts, tax forms or Credit Card information the identity thefts are invited.

Prevention of Identity Theft :

This can be avoided through regular check of bank accounts and inspection of bills, by being careful about one’s personal documents and personal information’s. All the documents mentioned above must be kept in a secured and safe place secretly and confidentially.

All the bills, receipts and discarded documents should not be thrown here and there or in the waste paper basket as this will help the identity thieves. If they are not required they should be destroyed and should not be disposed of at any lost.

The identity thieves look for personal data such as social security number, birth date, bank and Credit Card identifiers, stock or financial account information’s, maiden names, employment information, drivers license number or old identification Cards and Credit Cards. All these should not be made public to check identity theft.

By using paper shredders identity theft and fraud protection can be possible. The important prevention of identity theft is through the use of Paper Shredders. By destroying financial and other personal documents identity theft can also be checked. Carefulness regarding confidentiality of personal information stands at the top of prevention of identity theft.

In India though no objective data is available on identity theft it is observed that gradually it is increasing day by day. So every customer or consumer should be highly careful of his personal data and Credit Card, A.T.M. Card and Social security numbers and they should be maintained confidentially and carefully.

Give your Credit Card account number out to make a purchase or reservation, or for any other purpose only when you have made the call. Never give this information over a cellular phone. Never give your Credit Card to someone else to use on behalf of you. Watch your card when giving it to the cashier or store clerks to protect against extra imprints being made. Destroy any carbon papers from receipts.

Destroy them or tear them up, best would be to burn them. Don’t throw them in the waste paper basket in the purchase counter. Keep the actual charge slips in a safe place. Keep all the receipts and compare them with the monthly statement received from banks. Report to the authority at once, if there is any difference.

Keep a master list of all account numbers, card numbers in another secured place or with your spouse or adult children. In case cards are lost or stolen, the issuing company should be immediately informed.

In many cases by stealing mails from mail boxes, by stealing from the wallet or almirah, looking over your shoulder at A.T.M booths, and phone booths to get your PIN Number, searching the waste paper basket, and by ordering a copy of your Credit Card fraudulently. Identity theft are committed.

To avoid this don’t give your Social Security Number to any one (if there is one). Tear in to small pieces or burn all Credit Card offers, ATM receipts, bank statements and other printed materials having your account number. Use a paper shredder if possible.

Do not send personal information’s over internet, through e-mail or over cellular phones. A “pass word” that is not found in the dictionary would be better to check frauds. Pass words may be changed regularly and memorized. Don’t write your ‘Pass Word’ on your note book or stick it on your locker.

While using ATM Cards and Credit Cards the following precautions are to be taken.

Protecting your Personal Information Number (PIN) :

A PIN is a Confidential Code issued to you that helps you in getting an asset to your account. Memorize your PIN. Never give it to anyone, not even family members or bank employees. It is better if very few people have asses to your PIN.

Never write your PIN on your ATM Card or on a piece of paper and never fix it on your wallet. If both your wallet and card are lost or stolen, all money from your account can be stolen. While using the ATM machine be careful of others waiting behind you. Stand in-front of the key board to prevent anyone from seeing your PIN.

Cyber crime is becoming one of the Net’s growth business. Denial of service is one type of such attacks. Currently Cyber Criminals are stealing intellectual property, committing financial frauds. Frauds unleash viruses and acts of Cyber terrorism from which political groups or unfriendly governments get crucial information’s.

Snatching pass words have become a common case of theft. The FBI (U.S.A.) estimates computer losses up to $ 10 billion a year. In U.S.A. it is said that the biggest Cyber theft is from within. 60% of the breakings there are from employees.

The biggest disadvantage of a computer is that computer networks offer ready points of access for disgruntled employees, spies, thieves, sociopaths and bored teens.

Once they are in a corporate network, they can destroy data, lift intellectual property, sabotage operations and can even upset a particular deal or career. Any business in the computer can be a target, some say. Cyber sex is also a Sex Crime through electronic mail.

Eve teasing is also made through e-mail. Crimes in computer became so rampant in U.S.A. that on 15.7.1996 a “Presidents Commission on Critical Infrastructure Protection” was formed by the then President of U.S.A Bill Clinton and the Commission was ordered to study critical infrastructures that constitute the life support systems of the nation, determine their vulnerabilities and propose a strategy for protecting them in future.

The commission made detailed studies with respect to physical and cyber threats, accidents, error omissions, criminal activities spying, terrorism and other aspects of security of the computer and internet system and made detailed recommendations for infrastructure protection.

In our country, we also need such a commission who can prepare clear-cut policy and strategy to secure our information system and prevent Cyber Crime. Disciplinary Regulation of Cyber Cafe and other service providers are also essential.

8. Essay on the Few Cases of Cyber Crime in India:

i. “A Russian Internet Service provider has closed his two web sites that were engaged in selling pirated versions of the, “fluent” English self study books in the Fluency series by Prof Kev. Nair charging high price and high premium. This incident is considered significant against the back drop of a growing feeling among the developing countries that items of intellectual property having unique value are being systematically smuggled out…for mindless commercial exploitation.” —The Hindu

Commenting on the above, The New Indian Express writes, “These two copy right infringing Web Sites…had been built solely for carrying on commercial piracy in the globally sought after books in the “Fluency” series. The price quoted by the Web Sites for each of Nair’s books included a high premium and was four times the published price.”

ii. A Pakistani intelligence agents found plans for new attacks against the United States and Britain on a computer seized during the arrest of a senior all Qaeda suspect wanted for the 1998 twin U.S. embassy bombing in East Africa. The plans were found in e- mails on the computer of a Tanzanian arrested on 25.7.2004 after a 12 hour gun battle in the eastern city of Gujarat.

Information Minister Sheikh Rashid Ahmed said authorities have also arrested another top suspect believed to be a computer and communications expert and a militant who was cooperating and with the investigators. An intelligence official say the attack appeared to be centred on New York.

iii. The Pune Crime branch have arrested six people and busted a fake Credit Card racket amounting to Rs. 20 crores and spread across several states of the country. The police suspects a nexus between the gang and several traders from Mumbai and Pune. The police has also seized several blank Credit Cards, from the arrested person.

The use of an imported schemer machine by the gang to steal the data from the card stripe machines has baffled the police as this machine is not easily available in the country. 

iv. XIMB Cough in Cyber Crime Net. Cyber criminals appear to target educational institutions of Orissa. The students and staffs of Xavier Institute of Management, Bhubaneswar received many obscene e-mails from anonymous senders. An F.I.R was lodged by the institution in this connection. The police have referred the matter to cyber crime cell functioning at the office of the D.I.G. (computer), Bhubaneswar.

The authorities of the Institute feel that it is a purposeful mischief by unknown miscreants since all the students, teaching and administrative staff was the target. If this turns out to be the handiwork of professional hackers, then it is a matter to be worried because the Institute has a number of software solutions to its credit.

Perhaps it is the first such crime reported from an educational institution in Orissa. Before hand a city based internet domain Registration Company had complained hacking of its servers.

v. Recently two persons were arrested after they hacked in to the account of a customer of a private bank and illegally transferred Rs. 1.43 lakh through internet banking. They had some how managed confidential information on the account and committed the theft.

9. Essay on the Cyber Crime Relating to Women in India:

It is reported by Times of India (17.12.04) that 40% of Delhi cyber crime targets women. According to the investigation of Delhi Police almost half the cases reported have women at the receiving end of malice in cyber land. For instance, in October 2004 the crime branch was approached by the West Delhi based beautician who alleged that her photograph was flashed on a pornoportal along-with her Mobile number.

“Her face had been morphed on a naked woman’s body. Somebody had done it to trouble her. Consequently she received obscene messages and calls from several persons wanting to meet her including some from outside Delhi.” said a police officer. However till date the police could not trace the person responsible for this crime.

In-spite of the I.T. Act 2000 the cyber crime cell of Delhi Police has registered just 40 cases and 40 percent of the cases remain unsolved. During 2004 in Delhi 08 cases were registered but the police could workout, only 02. Analysis shows that almost 40% of the targets are innocent victims whose faces are morphed on pornographic Websites or posted on message boards to tarnish their image.

It is reported that the first cyber crime case was registered three years ago in which a class XI1 student was arrested for allegedly putting up obscene messages of his class teacher and a female class mate on a self created website.

The lacunae in the I.T. Act is blamed for the large number of untraced cyber crimes. It is said that the Act does not give the police enough teeth to initiate action against portals who function from abroad.

Further, in cases where the websites originate on a foreign server, it becomes difficult to persuade them to discharge with information. More and more cyber crimes relating to women are traced through-out India particularly in big cities.

10. Essay on the Cyber Crime among Teens (ages 13 to 18) than between (ages 8 to 12) in India:

Teens are more likely to illegally down load copy righted commercial software and other digital media like music, movies and games, through illegal on line file sharing net works. The above is the findings of a new Harris Interactive Poll conducted for the Business Software Alliance.

33 percent of the teens said they have illegally down loaded software while 33 percent of the teens admitted this practice. This result thus shows that ethical attitudes towards copy right law are significantly weaker among teen agers, pointing to a need for more education to the teen aged youths.

There is a need to educate the teen agers and provide them with guidance that will positively influence their growth as good Cyber Citizens and their respect for digital Copy Wright Works.

According to Diane Smiroldo—

“It is clear from the results of this study that by the time our young people are teens they are more likely to down load software and other types of digital copy righted media. Parents and teachers need to work together to emphasize to our young people the importance of using computers and the internet safely as well as respecting intellectual property.” In order to guide the parents and teachers in teaching children about respect for digital work on line. The Business Software Alliance (U.S.A) provides parents, teachers and students a variety of materials and tools on Cyber ethics including its curriculum, “Play it safe with Cyber Space.”

Many teen agers commit copy right crimes due to ignorance of law. In a study “students were surprised to learn that copy right laws apply in Cyber Space.” Sometimes without knowing its legal implications many teens consider it as a game.

Even laymen in India dealing with personal computers are not aware of the Cyber ethics and rules and laws governing cyber activities. Many non professionals and non experts in computer Science even do not know what is cyber crime and cyber activities in the computer lead to crime. Therefore awareness in this regard can be created through various curriculum, literature and electronic media.

A booklet in this regard should also be provided at the time of buying a computer. Anti piracy and cyber ethics education is key to ethical behaviour. It is seen that kids take big risks to steal software and they perceive it as a victimless crime.

Therefore, parents should supervise their kids activities on line since much of this behaviour takes place at home. By becoming good Cyber Citizens children can do right things as they grow older. Parents and teachers should take an active role in teaching computer ethics and safe computer use and respect for creative work.

When a personal computer is connected to a conventional phone modem, it receives a new internet address each time the user dials on to the net. This stands as a barrier to hackers of computer crimes. Conversely, cable and DSL modems help the hackers as these modems are always connected to the Net and hence usually have a fixed address which can be read from e-mail messages and news group postings.

Home security systems called personal fire walls are extensively available for cable and DSL subscribers. But unless they reach 100 percent penetration they will not prevent intrusions.

Most of the Cyber Crimes go undetected and so they are spreading. More than 60% of the 520 companies and institutions of U.S.A. undergoing survey have reported unauthorized use of computer systems over one year, up from 50% in 1997.

Secondly only 15 percent of the Cyber attacks are reported to the law enforcement agencies because this may go against them, their reputation may go downward. When Russian organised crime used hackers to break in to Citi Bank to steal 10 million of which only $ 4, 00,000 was recovered, the competitors used the news in marketing campaigns against the bank.

11. Essay on the Methods of Investigation of Cyber Crime:

The problem of computer crime has reached such dimension that it needs systematic investigation so that computer crimes can be prevented. Before starting an investigation it is necessary to make a careful examination of all potentially affected systems.

As a first step of investigation it has to be determined if the offender still has Control of the relevant computer. If it is so, it may be decided whether to terminate the user so that it would be easy to identify the intruder or the attacker of the computer. On the other hand, if the investigator decides to lock the user out and disconnect the system from the network, the damage to the computer can be limited.

When the connection is terminated logic bombs, an advanced hacker technique can automatically erase tracks which mean all data in the computer will be erased. So the choice of terminating or not terminating the connection is a difficult one.

A popular method of detecting an attack is to compare mathematical results from a similarly configured machine. If there is a difference it indicates that someone has attacked the computer with malicious intention. As a principle, an investigator should not let the attacker know that he is being disconnected or tracked due to unauthorized access to the computer.

Disconnection will generally alert the attacker and he will try to erase signs of his presence. In case the computer owner or the company wishes to know more about the intruder, he way ask the security expert to carefully watch what the intruder is doing. This type of investigation requires a large amount of skill to prevent alerting the attacker while still providing the company with security.

Like an investigation of any crime, a computer crime investigator must assess the amount of damage, identify systems which may have been compromised and analyze what crimes may have been committed. As a consequence, various leads appear. But care must be taken not to reach a premature conclusion.

For a full proof investigation, different investigative techniques will be used. Factors like how the criminal gained access to the computer, whether the intrusion is malicious or accidental is to be investigated.

Experienced legal counsel should be consulted for advice and further action to prevent Cyber Crime. If it is proved prima facie that the crime has been committed or a changeable crime has been committed the concerned authorities should be contacted to take action as deemed fit. Special attention should be paid for preservation and custody of evidence.

In each case of Cyber Crime, the company needs to assess and control costs based on time spent on investigation, expenses of the lawyer, loss of productivity etc. The recommendations of the investigating authority may be discussed with any outside consulting firm and then a final decision is taken on action to be taken.

The qualified forensic science computer investigation firm may be selected that will quickly and efficiently investigate the crime and professionally assemble the series of reports. In case of investigations dealing with computer crimes, time is most important. All necessary steps should be outlined and reviewed before any breach of security occurs.

In spite of the security measures taken, a determined individual can and will do the mischief by intruding in to another person’s computer. But if the companies are well prepared and alert, the damage may be less.

In-spite of the security measures computer crimes are still spreading. The job of detecting such crimes has become very difficult and more difficult is the law enforcement. Companies electrically attacked don’t usually talk to the press.

Even when data are recovered companies sometimes feel reluctant to claim their property. Secret service Agent Bob Weaver recently confiscated a disk containing intellectual property belonging to a large Japanese Software Company. Weaver called the’ company but got no response.

For any Cyber Crime, thieves don’t even need a computer. In many cases lots of information required for digital break INS is available in the physical world i.e., from the garbage, dumpster diving and other sources. Such information’s can help the attackers to crack the computers or convince some one at the company to give them more access.

Attacks from hackers working in computer security firms, attacks from overseas, particularly eastern European Countries, are rising. The problem was so disturbing for America that it cut its connection to Russia in 1996. It is very difficult to nab the overseas computer thieves.

In 1998 intruders broke in to the ISP and knocked them off the Net for 4 days. Steve Hardin, Director of systems engineering for the ISP discovered the hackers and found messages in Russian. He reported to the F.B.I but the hackers could not be traced. On line frauds are also on the rise.

Experts say that the first step for companies is to secure their systems by searching for hacker programmes that might be used in such attacks. They also suggest formal security policies that can be distributed to employees letting them to know how often to change Pass Words or what to do in case of an attack.

Constantly updating software with the latest versions and security patterns is also essential. Down the road techniques than can filter and trace malicious software sent over the web may make it difficult to knock businesses off the Net.

According to Novell Inc. CEO Eric Schmidt:

“Security is a race between the lock makers and the lock pickers”.

Regulators say that Cyber Crime thrives or spreads because people accord the internet far more credibility than it deserves.” You can get a lot of good information from the internet-95% of what you do is bonafide” says Rutledge deputy Chief Counsel of the Pennsylvania Securities Commission.

“Unfortunately that creates openings for fraud.” If black Oats and other types of Cyber Crimes are to be avoided, then Net Security is essential.

12. Essay on the Suggestions for dealing with Cyber Crimes in India:

Dr. Anand Kumar, Tewari IPS, Assistant Director (Training) Bureau of Police Research and Development, New Delhi has suggested the following for dealing with Cyber Crimes in India.

According to him an electronic crime investigation division is necessary to investigate:

1. Cyber Crimes like network intrusion, hacking, financial fraud etc. This investigation division would also recover data from electronic media to be used as evidences in criminal cases. A separate Computer Crime Research centre should be set up in India. Kerala, West Bengal and Tamil Nadu have proposed to set up Cyber Police Station.

2. Every state police should have a separate computer Forensic Laboratory or Computer Crime Unit fully equipped with hardware and software required for investigation and manned by computer experts, persecutors and police officers. Separate centre for Cyber forensics is required in states. Development of technical forensic and Cyber forensic is required in India.

3. The maximum penalty for hackers is only Rs. 3 lakhs as per the Indian Information Technology Act 2000. This is very low according to Dr. Kumar compared to the damages they cause. He suggests that ideally the penalty should be over and above the damages caused.

4. The IT Act 2000 also does not have specific mention of frauds related to the misuse of Credit Card numbers.

5. There is lack of skilled personnel’s and experts on computer Forensics to investigate in to Cyber Crimes.

Hence training is necessary in the area of software piracy, wiretapping, Cyber or e theft, Cyber terrorism technology, Cyber smuggling, Cyber stalking/Cyber threat, Cyber Fraud, Wire fraud, Cyber porn, pornography and public indecency, obscene materials, targeting computer and electronic records, investigation of cases of identity theft and fraud in which criminals having a personal computer use the personal information of other people to open credit cards accounts, make bank loans, etc.

Skilled investigators are also required in other areas of Cyber crime like Spamming, Spooling, inter world wide web crimes, insurance fraud, letter of credit fraud, distribution of pornography auction fraud, e mail bombing, consumers scams, sale of stolen data, sale of pirated materials, sale of pornography materials, sale of stolen credit card number etc.

For investigation of digital crimes, (Credit Card Fraud, Stock market, scam, hacker attack on government computers and networks and insurance fraud) training on data mining is required says Dr. Kumar.

Though Cyber crime in India has not reached that height like U.S.A. and other developed countries, gradually it is on the rise. India having the 10th position in the world in the use of computers should be careful and use safety measures to prevent Cyber Crime.

For this purpose training of personnel’s to investigate Cyber Crimes correctly and give suggestions on its prevention and control is essential. India should have its own team of investigators and experts to deal firmly with Cyber Crime, as Cyber Crime is not less dangerous for a developing country like India than any other crime.

Nevertheless, India has made a good start to combat cyber crimes by being one of the few countries of the world to have adopted the Information Technology (IT) Act 2000. The IT Act defines among other thing, what constitutes tampering with the computer, source hacking of computer document systems and publishing of obscene information. Issues like cyber stalking or child abuse have not been covered in this act.

Due to the continuous fierce attack of computer related viruses implemented World Wide; security of computers has become a major concern for consumers as well as students. According to research firm MCAfee about 100,000 viruses were identified in the first half of 2004.

AMD, the $ 2.7 billion company has identified Cyber security as a major growth area and is currently developing processors that could fight very well malicious viruses, Computer worms and Trojan horses. The new range of Athlon and Opteron 64-bit processors from AMD helps protect computers specifically from buffer overflow attacks. More than half of the Computer Viruses are executed by buffer overflow attacks.

The AMD 64-processors combined with Windows XP Service Pack 2 (SPz) are designed to help render viruses in operable and prevent them from replicating and spreading to other systems. The products are expected to hit the market sometime next year, added its General Manager.

Spyware, software designed to track one’s movements surreptitiously and occasionally to report your behaviour back to advertisers has alarmed and enraged the personal computer users around the world.

“These deceptive applications compromise users’ control over their own computers and Internet Connections and over the collection and sharing of their personal information.” said Jerry Berman, President of U.S. based Centre for Democracy and Technology, in a recent testimony to a subcommittee of the U.S. Senate that is looking in to the problems.

Bills are pending in the U.S. to address the Spyware epidemic. Anyone who is on the internet has Spyware. It is almost guaranteed. Spyware sneaks on to your computer while you are on line and plants itself on your hard drive without your knowledge.

Once installed it can collect information about where you go on line, which web sites you look at and what you buy. That information can then be passed back to advertisers. But spyware is almost by definition sneaky, your contact spyware unknowingly, by down loading free software on line or by unwittingly agreeing to have it installed on your P.C.

The spyware can record or transmit your passwords and Credit Card Numbers, it can reset your browser, and it can interfere with the compatibility of your systems components. Probably, the most popular piece of antispyware is Ad-aware made by the Swedish Company Lavasoft. Ad-aware scans your entire system in search of all types of spy ware.

Conclusion:

Like the physical world, the world of cyber crime consists of people, various financial, professional, business and educational transactions, e-commerce, money and finally crime. Analysis of cyber crime reflects crime in the physical world.

But it is more dangerous and sometimes more difficult to trace compared to crime in the physical world. Identity theft, fraud, pornography, impersonation, extortion, prostitution, call girl racket, child abuse, espionage and even old fashioned plain stealing, all these and many more crimes happen in the cyber world.

Of course, cyber crime introduces some new and electronically determined elements to crime. In-spite of all technological progresses and steps taken to prevent cyber crime it would continue to exist as long as the human society exists.

New and technologically introduced elements to the cyber world would make cyber crime one of the most dangerous problems of the modern society. Those who do not use a computer and internet they may not be affected by cyber crime directly, but of course indirectly. However it affects almost everybody who uses the internet.

Various organisations and governments spend billions of dollar to counter the threat of viruses and malicious code. The attack on cyber world also comes from remote areas. Therefore the law for cyber crime should be made more strict and it should cover all types of cyber crime. Cyber threats and cyber criminals, operating from other countries should also be covered under the I.T. Act.

Unless India can convincingly demonstrate her ability to withstand attacks from cyber threats, we would suffer greatly in terms of dollar and in terms prestige and recognition.

Computer users and internet connectivity is growing very fast in India. So it will be a very hard task to curb and control cyber crime. India has to make its I.T. Act (2000) more comprehensive to cover all fields of cyber crime and ensure stringent enforcement to the highest level. Besides, the common public and computer users should be made aware and conscious of various types of cyber crimes.

Not only better laws, but strict enforcement of these laws, education and self control should be basic to control cyber crime. Finally, people should be made aware about I.T. Act, so that they will not dare to commit computer crimes.

Related Articles:

  • Essay on Cyber Security | India
  • Essay on Terrorism and Organised Crime | India
  • Essay on Money Laundering | Crime | India
  • Essay on Organised Crime | India

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

Cyber Crime in India: An Introspection

Profile image of Dr. T. Sadashivam

2020, Studies in Indian Place Names

With the increase use of Information and Communication Technology (ICT) in society, there emerge a new form of crime in cyber space which is called Cyber Crime. The cyber crime is different from any other crime happening in the society. The reason being, it has no geographical boundaries and the cyber criminals are unknown. So, in the present time, cyber crime emerges as an important challenge for all countries including India. It is affecting all the stakeholders from government, business to citizens alike. In India, in the last few years, cyber crime is increasing with increase usage of ICT. Therefore, this article tries to study and analyse the cyber crime happening in India (States/UTs-wise) in the last five years. Further, it discusses some important initiatives of Government of India, to overcome cyber crime in the country.

Related Papers

International Research Journal Commerce arts science

The Rise in internet access has resulted in an increase in internet users. Thus, India has become a 'safe haven' for online fraudsters. From the past after the independence India has major issues such as poverty, the fuel crisis, political instability, cultural instability and crimes. As a result, the fight against cyber crime is very slow. The lack of IT awareness by the public and the absence of suitable legal frameworks to deal with cyber crime at state levels is major problem. Many attempts are being made by India to aware the public about cyber crime. The Indian government has taken steps in introducing cyber legislation to mitigate cyber crime. India has adopted the IT act 2000 to mitigate cyber crime. In this article, I shall examine what is cyber crime and measures addressing cyber crime in India.

essay on cyber crime in india

Sreeramana Aithal

Information Technology is one of the important general purpose Technologies in today " s age for several reasons. Today it is used in almost all the organizations, institutions, and people. The advancement of IT brings so many facilities to us; but also brings so many problems and challenges too and out of which Cyber Crime is a kind of offence which deals with the cyber world which includes computer security, information security, and mobile security too. The increasing number of crimes in the field of Information Technology brings a big attraction to Cyber Crime to everyone. Cyber Crime is an important and valuable illegal activity nowadays. Initially internet and email are treated as the main tools of crime; however, over the time the number of weapons, tools, and happenings are increasing in this field. This paper discusses about Cyber Crime including nature, characteristics, and issues.

Chief E D I T O R IJRISAT

In this age of information and technology, Internet plays the pivotal role for the exchange of huge amount of information. It influences not only all spheres of human life but also all age groups of man. Even if the internet has changed our society fundamentally, the information over internet is not free from any illegal access or harm. Thus the security and safety of information has become the major challenge of the present time. With the rapid growth of users, the cyber crime cases are also increasing and are not restricted by any geographical limitations or national boundaries in the world. Over the past few years India has witnessed many cyber crime cases. And it is a matter of great concern as it has direct negative impact on economic and social lives of people. Our research work is based on the quantitative analysis of cyber crime cases under the IT Act and Indian Penal Code in top vulnerable states and cities in India. Further the cyber crime cases committed by the people of different age group have been analyzed. And along with the description of different motives of cyber crime activities and the offences, the important remedial measures have been suggested that need to be taken to minimize the cyber crime cases.

Complexity International Journal(CIJ)

CIJ complexity international

Computer Technology is one of the important general purpose Technologies in today's age for several reasons. Today it is used in almost all the organizations, institutions, and people. Computer technology makes the life so speedy and fast, but hurled under the eclipse of threat from the deadliest type of criminality termed as 'Cyber crime'. The advancement of IT brings so many facilities to us; but also brings so many problems and challenges too and out of which Cyber Crime is a kind of offence which deals with the cyber world which includes computer security, information security, and mobile security too. The increasing number of crimes in the field of Information Technology brings a big attraction to Cyber Crime to everyone. This paper discusses about Cyber Crime including nature, characteristics, and issues.

Cybercrimes are the Offences that are committed by individuals or groups of individuals with a criminal motive to intentionally harm the victim using telecommunication networks such as Internet [1]. They are responsible for creating the disturbance in normal computer functioning and create many problems for companies. This research paper aims to discuss following aspects of Cybercrimes: the definition, why they occur, methods of committing cyber crimes, year wise record of cyber crimes and their comparison. Also, this report will display statistical data which will give an idea of how far cybercrimes has increase over the period of five years.

Cybercrime is evolving at an astounding pace, following the same dynamic as the inevitable penetration of computer technology and communication into all walks of life. Whilst society is inventing and evolving, at the same time, criminals are deploying a remarkable adaptability in order to derive the greatest benefit from it. To avoid giving cybercriminals the initiative, it is important for those involved in the fight against cybercrime to try to anticipate qualitative and quantitative changes in its underlying elements so that they can adjust their methods appropriately.

Dr. Santanu Koley

IJIRIS Journal Division

Despite technological measures being adopted by corporate organizations and individuals, we have witnessed that the frequency of cyber crimes has increased over the last decade. Since users of computer system and internet are increasing worldwide in large number day by day, where it is easy to access any information easily within a few seconds by using internet which is the medium for huge information and a large base of communications around the world. The objective of this paper is to discuss about the cyber crime and its categories, professions giving birth to cyber crimes and its impact on businesses and the preventive measures to be taken to control the cyber crime

Dinesh Yadav , Prof (Dr) Gurinder Singh

There has been enormous growth of Internet and mobile smart phone in the recent years. This has made the information access very easy for the end user and hence has emerged as medium of tremendous amount of information and communication worldwide. The exponential growth of internet, usage of communication devices and I.T. enabled services has led to growth of cybercrimes across the world. This research paper provides an overview of patterns in cyber-crime data. This paper explored the patterns of cybercrime in India using time series and regression analysis. Analysis is based on National Crime Record Bureau, Ministry of Home Affairs, Govt. of India data on cyber-crime collected under the heads of offences registered under IT act, 2000, IPC related to cyber-crimes and Special and Local Laws (SLL) related to cyber-crimes. An attempt was made to see the patterns and trends of Cyber-crimes and their relationship with growth in Internet users in India.

International Journal IJRITCC

—No stones are untouched by technology which gives rise to various refined crimes performed by so called intellectual criminals. The crimes performed using technology is termed as cybercrime. This paper tries to give insight on the broader areas effected by cybercrime in India. It also tries to associate various laws under various sections of IT Act 2000 which can be levied upon the culprit. It focuses on three categories of crime, viz. crime against individual, crime against property and crime against government. The paper tries to give insight on the loopholes as well as statistics of various cybercrimes in India.

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024
  • My Shodhganga
  • Receive email updates
  • Edit Profile

Shodhganga : a reservoir of Indian theses @ INFLIBNET

  • Shodhganga@INFLIBNET
  • Aligarh Muslim University
  • Department of Law
Title: Cyber crime and cyber terrorism in India
Researcher: Iqbal, Syed Mohd Uzair
Guide(s): 
Keywords: Conceptual Analysis, Cyber Crime, Defamation, Economic Offence, Hacking, Cyber Pornography, Cyber Terrorism
University: Aligarh Muslim University
Completed Date: 2013
Abstract: Abstract available newline newline
Pagination: ix, 330p.
URI: 
Appears in Departments:
File Description SizeFormat 
Attached File207.14 kBAdobe PDF
944.25 kBAdobe PDF
151.82 kBAdobe PDF
84.24 kBAdobe PDF
137.41 kBAdobe PDF
119.66 kBAdobe PDF
71.23 kBAdobe PDF
793.93 kBAdobe PDF
2.04 MBAdobe PDF
3.06 MBAdobe PDF
1.39 MBAdobe PDF
1.98 MBAdobe PDF
2.5 MBAdobe PDF
742.33 kBAdobe PDF
3.54 MBAdobe PDF
390.62 kBAdobe PDF

Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Shodhganga

  • भारत सरकार Government of india
  • गृह मंत्रालय Ministry of Home Affairs

Accessibility Dropdown

राष्ट्रीय साइबर अपराध रिपोर्टिंग पोर्टल National Cyber Crime Reporting Portal

amritmahotsav.nic.in

Women/Children Related Crime

essay on cyber crime in india

FINANCIAL FRAUD

essay on cyber crime in india

OTHER CYBER CRIME

Learning Corner

essay on cyber crime in india

CITIZEN MANUAL

It is a document to describe the functionalities and workflow that is provided to citizens on the cybercrime portal for reporting cybercrimes.

essay on cyber crime in india

CYBER SAFETY TIPS

To stay safe in the online world, it is important to follow important cyber safety practices which may help in protecting ourselves and our families from imminent threats that may harm our data and devices.

essay on cyber crime in india

CYBER AWARENESS

Cyber awareness is an ongoing process of educating employees and citizens about the threats that lurk in cyberspace and how to act responsibly.

essay on cyber crime in india

DAILY DIGEST

Comprehensive document prepared by Indian Cybercrime Coordination Centre (I4C) to aware employees and citizens about cyber fraud modus operandi.

Media Gallery

Video/Image Gallery

gallery thumbnail

  • Website Policies
  • Privacy Policy

EssayBanyan.com – Collections of Essay for Students of all Class in English

Essay on Cyber Crime

Cyber crime is the result of technological advancements. It is a dangerous crime involving the use of internet and computers. Cybercrime is undetectable at the initial phase but comes to notice with the consequences. Through this, the illegal transfer of data and information is made, which is of confidential value to an individual or a group.

Short and Long Essays on Cyber Crime in English

Essay on Cyber Crime for students of class 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 and class 12 in English in 100, 150, 200, 250, 300, 500 words. Also find short Cyber Crime essay 10 lines.

Cyber Crime Essay 10 Lines (100 – 150 Words)

1) The crime done with the help of a computer network is termed as cybercrime.

2) Cybercrime can harm your privacy and security.

3) Cybercrime is an illegal act that tends to hack your private data.

4) Cybercriminals try to gain money through illegal methods.

5) Phishing, DoS attack, spoofing, etc are some common cybercrimes.

6) With the increasing use of the internet, cybercrimes are on the rise.

7) Cybercrime makes the victim helpless by stealing their money and credentials.

8) One should be conscious while using the internet.

9) Cybercrimes can affect a person, an organization, or even the government.

10) Cybercrime is the misuse of advanced technologies.

Essay 1 (250 Words) – Cyber Crime: A Threat to Society

Introduction

Crime is a word used for wrong deed or offence, but when it comes to cybercrime then, it can be defined as a crime done by internet to cause an immeasurable loss to the individual, organization, or the government. Cyber crime is a punishable offence committed by cyber criminals .

Cyber Crime – A Threat to Society

Cyber crime is the criminal act which takes place over the internet through computers as tools or targets or other smart devices meant for making our work easier. The hacker or criminals are having various motives of the crime. They may be involved to cause a loss to an individual, some organization or government.

Several examples of cyber crime include frauds, identity theft, cyberstalking, creating and sending malware like viruses for destroying the systems or steal the data to make money. People involved in such activities find them as an easy way of making money. Even many of the well-educated and knowledge full persons are involved in such activities. Instead of using their mind in a positive way they employ themselves in cyber crime activities. Day by day this is becoming a great threat to our society and nation.

Cybercrime is the most prevailing crime in the present scenario, done through the internet. It causes a severe loss to the victim. Therefore some of the measures should be taken by us to avoid such crimes. The vigilant behaviour and following the safety protocols are only helping aids which can reduce the occurrence of cybercrime.

Essay 2 (400 Words) – Cyber Crime: Classification and Impacts

Man has been innovative and inventive by nature, since early ages. The different needs gave rise to new devices, tools, and technologies. Technology is also a discovery of man for making work easier. The advancement in technology is useful on one side and on the other side has some devastating effects. Cybercrime is also a negative aspect of these technological developments. The individual, organization and groups are involved in committing such criminal activities.

Classification of Cyber Crimes

  • Crime Against an Individual – Crime committed against an individual by use of an individual’s credit card details, confidential data and sending of spam emails. This crime is mainly done for making money.
  • Crime Against an Organization – This is done against a firm, company or organization to get unauthorized access to the data. This is done either to reveal the important data and employee details of the company or for money-making.
  • Crime Against Government – This is the crime against the nation, by getting access to the national data and records. This crime is of main concern as it concerned with the safety of the people of the nation.

Impacts of Cyber Crime

Cyber crime has ruined up the lives of many. The people involved in cyber crime are called hackers.

  • If we discuss on an individual level, the people affected with this are still trying to adjust the loss. Some have opted to commit suicide. The ultimate loss of money and any data which is confidential make the person helpless and left out in a painful situation.
  • On an organization level, the loss is made by stealing the data of the company or destroying the system by malware so that it may not work till the terms and conditions of the criminal get fulfilled. The companies are at a greater loss as their strategies and important data is stolen and leaked out.
  • The government is also the victim of this offence. Much confidential data is leaked as the result of cyber crime at the government level, risking the nation’s sovereignty. This is a serious issue as it may happen that the lives of people of the nation are threatened and frightened.  The loss can be economical too. Many lakh and crore have been lost from the nation because of these cyber crimes.

Cyber crime is an offence related to the use of the internet. It is dealt with some important information to be leaked in public or money-making in an easy way. Therefore we should be practicing some safety measures and security applications to prevent the crime.

Essay 3 (500 – 600 Words) – Cyber Crime

Cybercrime can be mentioned as illicit use of the internet and computers. The computers are either the target of the crimes or used as a weapon for the crime. These crimes have become a common part of our daily lives. Each and every day one or the other person is becoming the victim of cybercrime. Internet is accessed by a number of people at the same time for various purposes, these hackers make their way out of these opportunities.

Different Types of Cyber Crimes

  • Phishing – This involves obtaining the personal information of the user by sending spam emails or by means of phishing website which resembles the same as authorized website.
  • Identity Theft – This involves getting the information about credit or debit cards or bank details, further unwanted money can be easily deducted after the information is hacked.
  • Malware Attacks – Malware is the hostile software which is designed to damage the computer or systems. This is done to access meaningful information or for doing some crime by using that system.
  • ATM Frauds – The ATM machine is totally hacked in this crime. The criminals have developed the way to access both the data on the card along with the pin, further they are successful in making the duplicate of the cards and use the same to withdraw money.
  • Cyber Stalking – The criminal is involved in following the person through online measures. They can even send malware to damage the systems to get the exact information. It involves harassment of the user.
  • Pornography – The act of presenting sexual activity containing video, through pornographic websites.
  • Spoofing – In this, an email is received and appears to be from some authentic source, but it is not the same. It is corrupted.
  • Piracy – It is unauthorized access to the information which is confidential. Many of the times the government websites are hacked and files are pirated containing important data.

The First National Conference on National Crime Investigation and Crime Forensics

  • Our nation India, for the first time had a national conference on national crime investigation held in New Delhi at headquarters of CBI (Central Bureau of Investigation) on 4 and 5 September 2019.
  • The main motive of the conference was to create a common platform for the investigators,   forensic teams and other officials involved to discuss various methods and ways to tackle the cyber-related crimes. The conference was of 2 days i.e. 4th and 5th September.

Cyber Crime Awareness

Different security measures should be followed to be safe from the dreadful act of cyber crime.

  • Strong passwords should be used. The password must be a complex one, could not be possible to guess.
  • Use antivirus programmes to keep the system free of malware.
  • Continuously update the system.
  • Be vigilant and use the presence of mind to avoid identity thefts.
  • Make your children aware of the internet, so that they can state any misuse or harassment if they are going through.
  • Maintain privacy settings over social media.

Cyber Security

Cyber security is saving our system, network, devices, and programmes from the attack of malicious software. Thus the illegal accessing of data can be stopped.

Importance – The information regarding any important issue of the nation or any data which is meant to be used personally, if gets shared will create several problems. Therefore if there will be a security check imposed at several levels, the information and important data can be saved from leaking.

Types of Cyber Security

  • Network Security – Protects the network from being attacked by malware and thus using a secure network .
  • Cloud security – Meant for safeguarding the data in the cloud resources .
  • Information security – Helps in protecting the data from unauthorized or illegal access.
  • End-user security – The user should be conscious of while inserting any external devices in the system, opening any mail or links.
  • Application security – helps in keeping the system and software free of any threat .

Cyber crime is spreading its arms day by day. The most appropriate way of being safe from becoming the victim of its ill effects is following security measures. There are various ways by which we can protect our confidential information from being leaked. We should always focus on awareness as – ‘Prevention is better than cure’, especially when the cure is not available.

FAQs: Frequently Asked Questions

Ans . Cybercrime started in the world in the 1970s.

Ans . Ian Murphy was the first cybercriminal in the world.

Ans . Karuppannan Jaishankar is regarded as the father of Cyber criminology.

Ans . The Yahoo v. Akash Arora case was the first cybercrime case in India that happened in 1999.

Ans . The United States of America has the highest number of cybercrimes in the world.

Related Posts

Essay on digital india, cashless india essay, essay on child is father of the man, essay on causes, effects and prevention of corona virus, essay on dr. sarvepalli radhakrishnan, durga puja essay, essay on summer vacation, essay on my plans for summer vacation, essay on holiday, leave a comment cancel reply.

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

Menu

Subscribe Now! Get features like

essay on cyber crime in india

  • Latest News

Crickit

  • Entertainment
  • Real Estate
  • ENG vs SA Live Score
  • Big Boss OTT 3 LIVE
  • International Yoga Day Live
  • T20 World Cup 2024
  • Crickit Predictor
  • World Cup Schedule 2024
  • England vs South Africa Live Score
  • World Cup Most Wickets
  • World Cup Points Table
  • Budget 2024
  • The Interview
  • Web Stories
  • Virat Kohli
  • Mumbai News
  • Bengaluru News
  • Daily Digest
  • Election Schedule 2024

HT

NEET in crisis, NET junked, now CSIR-NET pushed back

Nta postpones csir-ugc-net amidst controversy over medical entrance test irregularities, raising questions about agency processes and sparking political row..

The National Testing Agency (NTA) on Friday postponed the joint Council of Scientific and Industrial Research (CSIR) and University Grants Commission (UGC) National Eligibility Test (NET), adding more fire to an already raging controversy over alleged irregularities in the medical entrance test and the cancellation of the UGC-NET earlier this week.

Congress workers protest against the irregularities in NEET 2024 in Lucknow, on Friday. (Deepak Gupta/HT Photo)

NEET fiasco is a test of the govt’s outreach skills

The decision by NTA to cancel the June edition of the CSIR-UGC-NET — the exam for postgraduatescience students is held twice a year — will raise further questions about the role of the agency and the processes followed by it, and stoke an already stormy political row.

The move came two days before the first session of the 18th Lok Sabha where the irregularities around three premier examinations, which affect a total of 3.5 million students across the country — 2.4 million who sat for NEET, 900,000 who appeared for NET, and 200,000 who registered for CSIR-NET — is likely to be a major flashpoint between the government and the Opposition.

“The joint CSIR-UGC-NET Examination June-2024 which was scheduled to be held between 25.06.2024 to 27.06.2024 is being postponed due to unavoidable circumstances as well as logistic issues. The revised schedule for the conduct of this examination will be announced later through the official website,” NTA said in a circular on Friday evening.

A senior NTA official said on the condition of anonymity that with the cancellation of the UGC-NET, and the retest of the National Eligibility cum Entrance Test for 1,563 candidates, it was not possible to conduct another examination immediately.

“NTA will soon reschedule the exam and declare results at the earliest so that the academic session does not get affected,” added the official.

But this is unlikely to douse the fire surrounding allegations of mismanagement, corruption and paper leaks that is now dogging not only three premier examinations but also NTA.

The joint CSIR-UGC-NET is conducted to screen Junior Research Fellowships (JRF), assistant professors and doctoral admissions in select science courses.

The exam — which is independent from UGC-NET and is considered tougher — is conducted twice a year in June and December in five subjects: Chemical Sciences; Earth, Atmospheric, Ocean and Planetary Sciences; Life Sciences; Mathematical Sciences; and Physical Sciences in computerised format.

The results of the test are accepted for admissions in all premier institutions offering PhD courses in these disciplines, including IITs, Indian Institutes of Science Education and Research (IISERs) and top research institutes funded by CSIR.

The December 2023 edition of the exam saw 175, 000 students take the test. This time, more than 200,000 students had registered for it. Their futures will now be in limbo until NTA announces new exam dates.

The controversy began with this year’s NEET after allegations surfaced that in one centre in Rajasthan, students appearing for the Hindi medium test got question papers in English amid reports of torn OMR sheets and delay in distribution of question papers. A case was lodged in Patna over an alleged paper leak, after which the police arrested 13 people involved in solving question papers and supplying answers as part of a racket. The arrested people include four examinees.

For weeks, protests swept across India as thousands of students hit the streets amid allegations of question paper leaks, inflated marking and arbitrary allowance of grace marks, even as opposition parties called for a Supreme Court-monitored probe into the allegations. The Supreme Court, which allowed NTA to withdraw grace marks to 1,563 students and conduct a retest for them on June 23, is set to hear a raft of petitions on the issue on July 8.

NEET-UG, UGC-NET row: 'BJP's corruption weakening country,' says Priyanka Gandhi Vadra

Then, on Wednesday evening, the education ministry cancelled the UGC-NET examination and said the integrity of the process may have been compromised. The June edition of the exam was held on June 18 with 908, 580 candidates appearing at 1,200 centres, taking the test 83 subjects using pen and paper on OMR sheets.

But 24 hours later, the ministry said that UGC, India’s higher education regulator, received certain inputs from the National Cyber Crime Threat Analytics Unit of Indian Cyber Crime Coordination Centre (I4C) under the home ministry on the examination.

On Thursday, Union education minister Dharmendra Pradhan shed further light on the decision. He said that the agency that tracks cyber crime for the Union home ministry informed UGC at 3pm on Wednesday that a specific question paper of UGC-NET set was leaked on the darknet.

“We tallied the questions on darknet with the original UGC-NET questions and they matched. We immediately decided to cancel the paper, and order a CBI inquiry into the matter. All these activities take place on Telegram these days. It is a challenge to track the complex nature of Telegram without a high level investigation,” the minister said.

The debacle prompted the Opposition to call for his resignation. The Central Bureau of Investigation has filed a first information report (FIR) against “unknown persons” on the complaint of K Sanjay Murthy, education secretary, and handed over the probe to its Anti-Corruption Branch, Delhi unit.

On Friday, Congress leader Rahul Gandhi met a group of NEET aspirants and vowed to take up the exam issue “personally” in Parliament.

“I want to talk to the 24 lakh NEET students. From the streets to Parliament, we are with you. I want to tell you that you are not alone. In the last ten years, 70 times exam papers have been leaked and two crore youth have suffered. We will fight together and win it,” Gandhi said in a video message.

NEET UG Re-test: 1,563 candidates to appear for re-exam on Sunday, NTA, Education Ministry officials to be present

Congress general secretary Jairam Ramesh told HT that the party also wanted a Supreme Court-monitored probe and the system adopted by NTA to be reviewed thoroughly. “Power is in your hands,” Gandhi said in his message to all NEET aspirants, “Your aspirations, your vision will become the country’s vision. If the government can’t protect you, the Opposition will.”

Get World Cup ready with Crickit ! From live scores to match stats, catch all the action here. Explore now!

Get Current Updates on India News , Budget 2024 , Weather Today along with Latest News and Top Headlines from India and around the world.

  • National Testing Agency
  • University Grants Commission
  • National Eligibility Test

Join Hindustan Times

Create free account and unlock exciting features like.

essay on cyber crime in india

  • Terms of use
  • Privacy policy
  • Weather Today
  • HT Newsletters
  • Subscription
  • Print Ad Rates
  • Code of Ethics

healthshots

  • Live Cricket Score
  • India Squad
  • T20 World Cup Schedule
  • Cricket Teams
  • Cricket Players
  • ICC Rankings
  • Cricket Schedule
  • Points Table
  • T20 World Cup Australia Squad
  • Pakistan Squad
  • T20 World Cup England Squad
  • India T20 World Cup Squad Live
  • T20 World Cup Most Wickets
  • T20 World Cup New Zealand Squad
  • Other Cities
  • Income Tax Calculator
  • Petrol Prices
  • Diesel Prices
  • Silver Rate
  • Relationships
  • Art and Culture
  • Taylor Swift: A Primer
  • Telugu Cinema
  • Tamil Cinema
  • Board Exams
  • Exam Results
  • Competitive Exams
  • BBA Colleges
  • Engineering Colleges
  • Medical Colleges
  • BCA Colleges
  • Medical Exams
  • Engineering Exams
  • Horoscope 2024
  • Festive Calendar 2024
  • Compatibility Calculator
  • The Economist Articles
  • Lok Sabha States
  • Lok Sabha Parties
  • Lok Sabha Candidates
  • Explainer Video
  • On The Record
  • Vikram Chandra Daily Wrap
  • EPL 2023-24
  • ISL 2023-24
  • Asian Games 2023
  • Public Health
  • Economic Policy
  • International Affairs
  • Climate Change
  • Gender Equality
  • future tech
  • Daily Sudoku
  • Daily Crossword
  • Daily Word Jumble
  • HT Friday Finance
  • Explore Hindustan Times
  • Privacy Policy
  • Terms of Use
  • Subscription - Terms of Use

Login

essay on cyber crime in india

  • OUR CENTERS Bangalore Delhi Lucknow Mysuru Srinagar Dharwad Hyderabad

Call us @ 08069405205

essay on cyber crime in india

Search Here

essay on cyber crime in india

  • An Introduction to the CSE Exam
  • Personality Test
  • Annual Calendar by UPSC-2024
  • Common Myths about the Exam
  • About Insights IAS
  • Our Mission, Vision & Values
  • Director's Desk
  • Meet Our Team
  • Our Branches
  • Careers at Insights IAS
  • Daily Current Affairs+PIB Summary
  • Insights into Editorials
  • Insta Revision Modules for Prelims
  • Current Affairs Quiz
  • Static Quiz
  • Current Affairs RTM
  • Insta-DART(CSAT)
  • Insta 75 Days Revision Tests for Prelims 2024
  • Secure (Mains Answer writing)
  • Secure Synopsis
  • Ethics Case Studies
  • Insta Ethics
  • Weekly Essay Challenge
  • Insta Revision Modules-Mains
  • Insta 75 Days Revision Tests for Mains
  • Secure (Archive)
  • Anthropology
  • Law Optional
  • Kannada Literature
  • Public Administration
  • English Literature
  • Medical Science
  • Mathematics
  • Commerce & Accountancy
  • Monthly Magazine: CURRENT AFFAIRS 30
  • Content for Mains Enrichment (CME)
  • InstaMaps: Important Places in News
  • Weekly CA Magazine
  • The PRIME Magazine
  • Insta Revision Modules-Prelims
  • Insta-DART(CSAT) Quiz
  • Insta 75 days Revision Tests for Prelims 2022
  • Insights SECURE(Mains Answer Writing)
  • Interview Transcripts
  • Previous Years' Question Papers-Prelims
  • Answer Keys for Prelims PYQs
  • Solve Prelims PYQs
  • Previous Years' Question Papers-Mains
  • UPSC CSE Syllabus
  • Toppers from Insights IAS
  • Testimonials
  • Felicitation
  • UPSC Results
  • Indian Heritage & Culture
  • Ancient Indian History
  • Medieval Indian History
  • Modern Indian History
  • World History
  • World Geography
  • Indian Geography
  • Indian Society
  • Social Justice
  • International Relations
  • Agriculture
  • Environment & Ecology
  • Disaster Management
  • Science & Technology
  • Security Issues
  • Ethics, Integrity and Aptitude

InstaCourses

  • Indian Heritage & Culture
  • Enivornment & Ecology

Print Friendly, PDF & Email

Internal Security Questions – UPSC Mains (GS-3)

  • Discuss the types of organised crime. Describe the linkages between terrorists and organised crime that exist at the national and transnational levels.
  • What are the maritime security challenges in India? Discuss the organisational, technical and procedural initiatives taken to improve the maritime security.
  • What are the different elements of cyber security? Keeping in view the challenges in cyber security examine the extent to which India has successfully developed a comprehensive National Cyber Security Strategy.
  • Naxalism is a social, economic and developmental issue manifesting violent internal security threat. In this context, discuss the emerging issues and suggest a multilayered strategy to tackle the menace of Naxalism.
  • Keeping in view India’s internal security, analyse the impact of cross-border cyber attacks. Also discuss defensive measures against these sophisticated attacks.
  • Analyse the multidimensional challenges posed by external state and non-state actors, to the internal security in India. Also, discuss measures required to be taken to combat these threats.
  • Analyse the complexity and intensity of terrorism, its causes, linkages and obnoxious nexus. Also suggest measures required to be taken to eradicate the menace of terrorism.
  • Discuss different types of cyber crimes and measures required to be taken to fight the menace.
  • For effective border area management, discuss the steps required to be taken to deny local support to militants and also suggest ways to manage favourable perception among locals.
  • What are the sound determinants of left-wing extremism in Eastern part of India? What strategy should Government of India, civil administration and security forces adopt to counter the threat in the affected areas?
  • Analyze internal security threats and transborder crimes along Myanmar, Bangladesh and Pakistan borders including Line of Control (LoC). Also discuss the role played by various security forces in this regard.
  • The banning of ‘Jamaat-e – islaami’ in Jammu and Kashmir brought into focus the role of over-ground workers (OGWs) in assisting terrorist organizations. Examine the role played by OGWs in assisting terrorist organizations in insurgency-affected areas. Discuss measures to neutralize the influence of OGWs.
  • The Indian government has recently strengthened the anti-terrorism laws by amending the unlawful activities (Prevention) Act (UAPA), 1967, and the NIA Act. Analyze the changes in the context of the prevailing security environment while discussing the scope and reasons for opposing the UAPA by human rights organizations.
  • Cross-border movement of insurgents is only one of the several security challenges facing the policing of the border in North-East India. Examine the various challenges currently emanating across the India-Myanmar border. Also, discuss the steps to counter the challenges.
  • What is the CyberDome Project? Explain how it can be useful in controlling internet crimes in India.
  • The China-Pakistan Economic Corridor (CPEC) is viewed as a cardinal subset of China’s larger ‘One Belt One Road’ initiative. Give a brief description of CPEC and enumerate the reasons why India has distanced itself from the same.
  • Left Wing Extremism (LWE) is showing a downward trend, but still affects many parts of the country. Briefly explain the Government of India’s approach to counter the challenges posed by LWE.
  • Data security has assumed significant importance in the digitized world due to rising cyber crimes. The Justice B.N. Srikrishna Committee Report addresses issues related to data security. What, in your view, are the strengths and weaknesses of the Report relating to protection of personal data in cyber space?
  • India’s proximity to the two of the world’s biggest illicit opium growing states has enhanced her internal security concerns. Explain the linkages between drug trafficking and other illicit activities such as gunrunning, money laundering and human trafficking. What counter measures should be taken to prevent the same?
  • Discuss the potential threats of Cyber attack and the security framework to prevent it.
  • The North-Eastern region of India has been infested with insurgency for a very long time. Analyze the major reasons for the survival of armed insurgency in this region.
  • Mob violence is emerging as a serious law and order problem in India. By giving suitable examples, analyze the causes and consequences of such violence.
  • The scourge of terrorism is a grave challenge to national security. What solutions do you suggest to curb this growing menace? What are the major sources of terrorist funding?
  • The terms ‘Hot Pursuit’ and ‘Surgical Strikes’ are often used in connection with armed action against terrorist attacks. Discuss the strategic impact of such actions.
  • ‘Terrorism is emerging as a competitive industry over the last few decades.” Analyse the above statement.
  • Border management is a complex task due to difficult terrain and hostile relations with some countries. Elucidate the challenges and strategies for effective border management.
  • Use of internet and social media by non-state actors for subversive activities is a major security concern. How have these been misused in the recent past? Suggest effective guidelines to curb the above threat.
  • Discuss the advantages and security implications of cloud hosting of servers vis-a-vis in-house machine-based hosting for government businesses.
  • Human right activists constantly highlight the view that the Armed Forces (Special Powers) Act, 1958 (AFSPA) is a draconian act leading to cases of human rights abuses by the security forces. What sections of AFSPA are opposed by the activists? Critically evaluate the requirement with reference to the view held by the Apex Court.
  • Religious indoctrination via digital media has resulted in Indian youth joining the ISIS. What is ISIS and its mission? How can ISIS be dangerous to the internal security of our country?
  • The persisting drives of the Government for development of large industries in backward areas have resulted in isolating the tribal population and the farmers who face multiple displacements. With Malkangiri and Naxalbari foci, discuss the corrective strategies needed to win the Left Wing Extremism (LWE) doctrine affected citizens back into the mainstream of social and economic growth.
  • Considering the threats cyberspace poses for the country, India needs a “Digital Armed Forces” to prevent crimes. Critically evaluate the National Cyber Security Policy, 2013 outlining the challenges perceived in its effective implementation.
  • “The diverse nature of India as a multi-religious and multi-ethnic society is not immune to the impact of radicalism which is seen in her neighbourhood.” Discuss along with strategies to be adopted to counter this environment.
  • International civil aviation laws provide all countries complete and exclusive sovereignty over the airspace above their territory. What do you understand by ‘airspace? What are the implications of these laws on the space above this airspace? Discuss the challenges which this poses and suggest ways to contain the threat.
  • How does illegal transborder migration pose a threat to India’s security? Discuss the strategies to curb this, bringing out the factors which give impetus to such migration.
  • In 2012, the longitudinal marking for high-risk areas for piracy was moved from 65 degrees east to 78 degrees east in the Arabian Sea by the International Maritime Organization. What impact does this have on India’s maritime security concerns?
  • China and Pakistan have entered into an agreement for development of an economic corridor. What threat does this pose for India’s security? Critically examine.
  • Money laundering poses a serious security threat to a country’s economic sovereignty. What is its significance for India and what steps are required to be taken to control this menace?
  • What are social networking sites and what security implications do these sites present?
  • Cyber warfare is considered by some defense analysts to be a larger threat than even Al Qaeda or terrorism. What do you understand by Cyber warfare? Outline the cyber threats which India is vulnerable to and bring out the state of the country’s preparedness to deal with the same.
  • Article 244 of the Indian Constitution relates to administration of scheduled areas and tribal areas. Analyse the impact of non-implementation of the provisions of the Fifth schedule on the growth of Left Wing extremism.
  • How far are India’s internal security challenges linked with border management particularly in view of the long porous borders with most countries of South Asia and Myanmar?

Left Menu Icon

  • Our Mission, Vision & Values
  • Director’s Desk
  • Commerce & Accountancy
  • Previous Years’ Question Papers-Prelims
  • Previous Years’ Question Papers-Mains
  • Environment & Ecology
  • Science & Technology

TOI logo

  • Fresh exam soon: 'Leaked UGC-NET paper found on darknet, Telegram'

Fresh exam soon: 'Leaked UGC-NET paper found on darknet, Telegram'

Fresh exam soon: 'Leaked UGC-NET paper found on darknet, Telegram'

Visual Stories

essay on cyber crime in india

  • Magazine Cover Story Editor's Note Deep Dive Interview The Buzz
  • BT TV Market Today Easynomics Drive Today BT Explainer
  • Market Today Trending Stocks Indices Stocks List Stocks News Share Market News IPO Corner
  • Tech Today Unbox Today Authen Tech Tech Deck Tech Shorts
  • Money Today Tax Investment Insurance Tools & Calculator
  • Mutual Funds
  • Industry Banking IT Auto Energy Commodities Pharma Real Estate Telecom
  • Visual Stories

essay on cyber crime in india

INDICES ANALYSIS

Mutual funds.

  • Cover Story
  • Editor's Note
  • Market Today
  • Drive Today
  • BT Explainer
  • Trending Stocks
  • Stocks List
  • Stocks News
  • Share Market News
  • Unbox Today
  • Authen Tech
  • Tech Shorts
  • Tools & Calculator
  • Commodities
  • Real Estate
  • Election with BT
  • Economic Indicators
  • BT-TR GCC Listing

Telegram was epicentre of UGC-NET paper leak, question papers sold for Rs 5,000-10,000: Report

Telegram was the epicentre of the leak while several groups were created to maximise profits through advertisements. screenshots of telegram groups, chats and payment screenshots have also been doing the rounds on social media. .

Business Today Desk

  • Updated Jun 21, 2024, 7:50 PM IST

Following the announcement of the UGC-NET exam cancellation, massive protests erupted nationwide.

The question paper for the UGC-NET exam, which was held on June 18, was leaked and sold on encrypted social media platforms, according to reports. 

The UGC-NET June 2024 exam paper was widely leaked on Telegram and was being sold for anywhere between Rs 5,000 and Rs 10,000, News18 reported. 

Related Articles

  • Students left in limbo, public money wasted: Kerala CM Pinarayi Vijayan criticises govt over 'gross inefficiencies' in NEET, UGC-NET
  • 'UGC-NET paper leaked on Darknet': CBI files FIR, Central panel to review NTA's role
  • 'Modi ji can stop Ukraine war but not exam paper leaks': Rahul Gandhi launches scathing attack on PM Modi over UGC-NET paper leak controversy

According to the report, a routine input that included initial details of analysis by the Ministry of Home Affairs’ I4C triggered the cancellation of the UGC-NET exam conducted by the National Testing Agency (NTA). 

The input mentioned the compromise of the exam’s integrity and with that the exam paper was available on Telegram before the test was conducted. 

As per the report, Telegram was the epicentre of the leak while several groups were created to maximise profits through advertisements. Screenshots of Telegram groups, chats and payment screenshots have also been doing the rounds on social media. 

NTA UGC NET paper leaked one day before exam, paper cancelled. NTA as an agency has no integrity. #UGC_NET #ugc #NET_JRF #NTA_ही_अपराधी #NTA pic.twitter.com/8pV7ErNvKV — Harshiee (@harshiee_26) June 19, 2024

Social media platform Telegram said it has blocked all channels involved in leaking the University Grants Commission-National Eligibility Test (UGC-NET) paper, which forced the cancellation of the competitive exam, the report added. 

The UGC-NET, 2024, exam for the selection of junior research fellows, assistant professors and PhD scholars was conducted by the National Testing Agency (NTA) on June 18 in two shifts across the country. 

The next day, the UGC received inputs from the National Cyber Crime Threat Analytics Unit of the Indian Cyber Crime Coordination Centre (l4C) that the paper was available on the darknet. 

On June 20, the CBI registered an FIR into the UGC-NET paper leak case against unidentified persons on a reference from the Union Education Ministry. 

Addressing a press conference, Union Education Minister Dharmendra Pradhan had confirmed that the leaked question paper circulated on Telegram matched the original. 

TOP STORIES

bt logo

  • Advertise with us
  • Privacy Policy
  • Terms and Conditions
  • Press Releases

Copyright©2024 Living Media India Limited. For reprint rights: Syndications Today

businesstoday

Add Business Today to Home Screen

India's Modi criticised for exam irregularities amid lack of jobs

  • Medium Text

Students holding placards protest outside the Ministry of Education against the cancellation of the UGC-NET examination at New Delhi

Sign up here.

Reporting by Krishna N. Das in New Delhi and Sahiba Chawdhary in Prayagraj Editing by Tomasz Janowski

Our Standards: The Thomson Reuters Trust Principles. New Tab , opens new tab

essay on cyber crime in india

Thomson Reuters

Krishna is the editor for politics and general news in India. He was a member of teams that won the Society of Publishers in Asia (SOPA) awards in 2024 for Reuters coverage of the global toxic cough syrup scandal, in 2018 for the Rohingya refugee crisis and in 2017 for the Bangladesh Bank heist. He served as Malaysia bureau chief in 2019 and 2020 before returning home.

Delhi Chief Minister Arvind Kejriwal addresses supporters

World Chevron

Reuters logo

Two people killed, several wounded in shooting in Arkansas - media

At least two people were killed and several wounded, including a police officer, in a shooting at a supermarket in Arkansas on Friday, local media reported.

Montenegro braces for the first heatwave of the summer

IMAGES

  1. Essay on Cyber Crime & Its Impact in Our Life

    essay on cyber crime in india

  2. (PDF) A STUDY ON TYPES OF CYBER CRIMES AND CYBER ATTACKS IN INDIA

    essay on cyber crime in india

  3. (PDF) CYBER CRIMES IN INDIA AND THE MECHANISM TO PREVENT THEM

    essay on cyber crime in india

  4. Cyber Crime in India and its Prevention : EduMound

    essay on cyber crime in india

  5. Data Story : Cyber Crimes In India

    essay on cyber crime in india

  6. (PDF) Types of Cyber Crimes & Cyber Law in India

    essay on cyber crime in india

VIDEO

  1. ## new study short## essay cyber security## all classes ##

  2. Cyber Crime

  3. साइबर अपराध पर निबंध

  4. How to report cyber crime online in India

  5. 🔥Cyber Crime से बचने का सबसे आसान तरीका

  6. साइबर अपराध पर निबंध

COMMENTS

  1. Cyber Crime Essay for Students and Children

    Cyber Crime Essay- Everybody thinks that only stealing someone's private data is Cyber Crime. In this Essay on Cyber Crime will discuss Types and Ways of Cyber Crime ... Get the huge list of more than 500 Essay Topics and Ideas. Cyber Crime in India. Web world or cyberspace is a massive community of millions and billions of users and websites ...

  2. Cyber Crime Essay in English

    500 Words Essay on Cyber Crime. Cybercrime is a type of crime in which illegal activities are carried out online or using computers. Cybercrime comes in a variety of forms which involves harassing online users. Cybercrime is the most serious and rapidly expanding type of crime in this day and age. Any person's life may be negatively impacted ...

  3. Cyber Crime Essay

    Learn about speech on Cyber Crime Essay topic of english in details explained by subject experts on vedantu.com. Register free for online tutoring session to clear your doubts. ... India, many movies before their releases are leaked on the movie download. sites. In other words, theft is also called privacy, ...

  4. Essay on Cybercrime: Free Samples in 100, 200, 300 Words

    Essay on Cybercrime in 100 Words. Cybercrime involves illegal activities like hacking, ransomware, cyberbullying, online fraud, etc. People who are involved in cybercrime or any similar activities are called hackers, scammers or fraudsters. Cybercrime leads to financial loss for individuals who have fallen victim to one.

  5. PDF Cybercrime and Cybersecurity in India: Causes, Consequences and

    Crime, Law and Social Change, 66 (3), 313-338. ***© Springer Netherlands. Reprinted with permission. No further reproduction is ... In order to provide insights into the low rates of prosecution and conviction for cyber-offenders in India, it is necessary to look at formal and informal institutions. Past researchers have

  6. Growing Cyber Crimes in India: Reasons, Challenges, and Way Forward

    NCRB Data on Cyber Crimes in India. According to the report 'Crime in India', 65,893 cases were registered under cybercrime, showing an increase compared to 52,974 cases in 2021. Over 24,000 complaints were registered with the Delhi Police till June 2023. During the same period in 2022, the cops had received 7,500 complaints.

  7. Cyber Crime

    What are the Government Initiatives to Cope with Cyber Crimes in India? Indian Cyber Crime Coordination Centre (I4C): This center coordinates efforts to tackle all types of cyber-crimes across the country. National Cyber Forensic Laboratory: It provides early-stage cyber forensic assistance to Investigating Officers of all State/UT Police through both online and offline modes.

  8. Essay on Cyber Crime

    As technology evolves, so do cyber threats. Ongoing research and innovation in cybersecurity are essential to staying ahead of cybercriminals. Conclusion of Essay on Cyber Crime. In conclusion, cybercrime is a digital menace that affects us all. Whether it's hacking, scams, or cyberbullying, the consequences can be devastating.

  9. CYBER CRIMES IN INDIA: TRENDS AND PREVENTION

    The essay attempts to study the threat of cyber crime in the globalized world with an emphasis on Bangladesh. Finally, the article will offer policy options for ensuring cyber security in the country.

  10. India's Cybersecurity Challenge: Threats and Strategies

    National Cyber Crime Forensic Laboratory Ecosystem; Platform for Joint Cyber Crime Investigation Team. Cyber Swachhta Kendra (Botnet Cleaning and Malware Analysis Centre): This centre was launched in 2017 to create a secure cyberspace by detecting botnet infections in India and notifying, enabling cleaning and securing systems of end users to ...

  11. Cybercrime: Definition, Seriousness and Laws in India

    Cybercrime: Notes for UPSC GS-III. Cybercrime is a crime that involves a computer and a network. The computer may have been used to commit the crime and in many cases, it is also the target. Cybercrime may threaten a person or a nation's security and financial health. Cybercrime is a topic featured in the GS-III section of the IAS Exam.

  12. Cyber Crime Essay for School Students in English in 500 Words

    Cybercrime. Cybercrime is a risky attack that can happen to a person or a business. Numerous instances exist when a cyber assault caused a firm or a person to suffer a significant loss as a result of a data breach. In today's technologically advanced world, computers have become the primary source of all information.

  13. Essay on Cyber Crimes

    An Essay on Cyber Crimes 250 Words is as follows. The nature of crime has evolved with technology. Earlier, crimes used to be conducted physically at a place. Now, however, crimes are carried out from a distance using the cyberspace. Such crimes are called cyber crimes. Over the past few decades, humans have become increasingly dependent upon ...

  14. A Study on Cyber Crime and its Legal Framework in India

    Cyber-crime mainly involves activities that use internet and computers as a tool to extract private information of an individual either directly or indirectly and disclosing it on online platforms without the person's consent or illegally with the aim of degrading the reputation or causing mental or physical harm. With the advancement in technology a steep increase in the rate of cyber ...

  15. PDF Cyber Crime in India: An Empirical Study

    India has seen a 457% increase in cybercrime incidents under the Information Technology (IT) Act, 2000 from 2011 to 2016, according to a recent joint study by ASSOCHAM-NEC. This type of attack involves altering the raw data before the computer processes them and then changes them again after processing is complete.

  16. Laws for Cyber Crimes in India: [Essay Example], 2132 words

    Introduction. Cyber crimes are unlawful acts wherein the computer is either a tool or a target or both. Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also specified origin to a ...

  17. Essay on Cyber Crime for Students in English [Easy Words]

    Essay on Cyber Crime: Computer related networks that involve the use of computers, networks and gadgets can be interconnected to a cybercrime. In such crimes, the security of networks, persons, institutions or a whole nation could be at risk and threat. ... these types of cyber crimes will only keep increasing. India and many other nations are ...

  18. PDF Cyber Crime and Laws in India

    Chapter IV Cases related to the cyber crime in India 42-55 Bois Locker Room case 42 Pune Citibank MphasiS Call Center Fraud 45 46sony.sambandh.com case 4The Bank NSP Case 7 4SMC Pneumatics (India) Pvt. Ltd. vs. Jogesh Kwatra 7 4Tamil Nadu Vs Suhas Katti AIR 2004 8

  19. Essay on Cyber Crime in India

    Learn about the definition, types, causes and cases of cyber crime in India and its prevention. Read various essays on cyber crime in schools, pornography, identity theft, offensive acts and more.

  20. Cyber Crime in India: An Introspection

    Cyber Crime is an important and valuable illegal activity nowadays. Initially internet and email are treated as the main tools of crime; however, over the time the number of weapons, tools, and happenings are increasing in this field. This paper discusses about Cyber Crime including nature, characteristics, and issues.

  21. Shodhganga@INFLIBNET: Cyber crime and cyber terrorism in India

    Title: Cyber crime and cyber terrorism in India: Researcher: Iqbal, Syed Mohd Uzair: Guide(s): Ahmad, Shakeel: Keywords: Conceptual Analysis, Cyber Crime, Defamation ...

  22. Cyber Crime Portal

    OTHER CYBER CRIME. What's new. G 20 Videos G 20 Images Important Alert!!!! Fake mails are being sent impersonating officials of Indian Cyber Crime Coordination Centre - CEO I4C, Intelligence Bureau and Delhi Police. The claim is FAKE. Learning Corner ... Govt. of India. Best viewed in Mozilla Firefox, Google Chrome [D].

  23. Essay on Cyber Crime

    Cyber Crime Essay 10 Lines (100 - 150 Words) 1) The crime done with the help of a computer network is termed as cybercrime. 2) Cybercrime can harm your privacy and security. 3) Cybercrime is an illegal act that tends to hack your private data. 4) Cybercriminals try to gain money through illegal methods.

  24. NEET in crisis, NET junked, now CSIR-NET pushed back

    But 24 hours later, the ministry said that UGC, India's higher education regulator, received certain inputs from the National Cyber Crime Threat Analytics Unit of Indian Cyber Crime Coordination ...

  25. Internal Security Questions

    2022 Discuss the types of organised crime. Describe the linkages between terrorists and organised crime that exist at the national and transnational levels. What are the maritime security challenges in India? Discuss the organisational, technical and procedural initiatives taken to improve the maritime security. What are the different elements of cyber security? Keeping in view the challenges ...

  26. Fresh exam soon: 'Leaked UGC-NET paper found on ...

    "Based on information from the National Cyber Crime Threat Analytics Unit of Indian Cyber Crime Coordination Centre (I4C), prima facie it was found that there were question papers in the darknet.

  27. Telegram was epicentre of UGC-NET paper leak, question papers sold for

    The next day, the UGC received inputs from the National Cyber Crime Threat Analytics Unit of the Indian Cyber Crime Coordination Centre (l4C) that the paper was available on the darknet.

  28. India's Modi criticised for exam irregularities amid lack of jobs

    India's opposition parties and the country's students on Thursday hit out at the new government of Prime Minister Narendra Modi for irregularities in recent government-run tests for college ...

  29. Cyber-attack on London hospitals declared critical incident

    Cyber security expert Steve Sands, from the Chartered Institute for IT, said ransomware threat was now an "ever-present danger to critical institutions from schools to hospitals".