Cyber Crime : An Introduction and prevention
A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal activity by using computers and networks. It can range from fraud to unsolicited emails (spam). It can include the distant theft of government documents or corporate secrets records and many other important and private data through criminal trespass into remote systems around the world. Most cybercrimes cannot be placed into a single crime area it may be many areas. Cybercrime includes non-money offenses, such as creating viruses on other computers or posting confidential business information on the Internet and much more things which one we discuss one by one. First of all I am going to introduces you about fake sites this is most usable thing in cybercrime.
What is a fake site?
Fake as per name it is not a genuine websites it is used to confuse a user. Many fake sites take many forms, but all work on similar principles. Fake websites exist purely to enrich the scammers who run them. Along with the theft of your initial outlay (the money you pay for your order), many will also retain your credit card details for use in other fraudulent transactions elsewhere. As a result, being duped by a fake site could turn out to be a costly mistake. They’re designed to mimic an established retailer so that shoppers are convinced that there is nothing wrong. The other common factor is that any bank offers, goods or services on offer will never be delivered, and even if something does turn up in the mail, it will be an inferior (and possibly even illegal) counterfeit.
Fake websites are generally operated by organized gangs of criminals. The open nature of the Internet means that scammers anywhere can quickly create a site designed to trick shoppers. It is also believed that fake websites are sometimes us.
Some Important Cyber Crime Prevention Tips
As we know that in these days the whole world is interconnected via using internet or computer. Yet, for all its advantages, increased connectivity brings increased risk of theft, fraud, and abuse. so I am trying tell you some important point to avoid becoming a Victim of Cyber Crime?
- if you are using internet then first of all you must secure your computer. If your computer does not have proper security controls, it is vulnerable to access by criminals, who may be able to steal information stored on it. Make sure your computer has the latest security updates installed. Check that your antivirus and antispyware software are running properly and are receiving automatic updates from the vendor. If you haven’t already done so, install and enable a firewall.
- Always use strong passwords. Cyber criminal programmers have developed programs that automate the ability to guess your passwords by using a program. To protect yourself, passwords must be difficult for others to guess, but at the same time, easy for you to remember. Passwords should have a minimum of eight characters and include upper case (capital letters), lowercase letters, numbers, and symbols. Make sure you use a different password for each of your accounts and do not use the same passwords for many accounts. In your password never set your name, address, street no, date of birth, family members name because it is easy to guess by hackers.
- Cleanup your data. Information that is under your control includes your social networking profiles. In addition, there could be information about you on old blog postings, postings on a friend’s web site, an old dating profile, picture sharing account, or any other services that you used but no longer find necessary.
- Don’t not use internet banking or banking transactions at public places such as internet cyber café, office, park, crowded place or anywhere else. For any banking related login or transactions you must use your personal computer or laptop, when ever your work is over you must log off your account each and every time. In the time of login never click on the remember password option or keep me login option.
- Never note down your banking user id, login password and transaction passwords in your mobile, laptop, dairy or in any cheat. All made that password which is easy to remember and need not to write anywhere. But it must not be very easy.
- Carefully select the sites you visit. Know the site. Know the company. Do not visit a site by clicking on a link sent in an email, found on someone’s blog, or on an advertisement. The website you land on may look just like the real site, but it may be a well-crafted fake.
- Look Yourself Up. Search engines will help you to do a quick query of your public information. You can also take a proactive approach to set up alerts for search terms of your name. Data service sites have massive amounts of data compiled from a variety of sources, including public records and social networking sites. This data can be used by criminal profilers, and others for any number of purposes, not necessarily intended by the data service providers.
- Never send sensitive or personal information in an email. It may be intercepted and read by criminals. Legitimate businesses will not ask users to send their sensitive personal information through email.
- Review your social media accounts. You basically have three options-remove the data, modify the privacy settings, and/or request that the account be deleted. If you are going to request that the account be deleted, be sure to remove all of the data first. Also, request that the account be deleted rather than deactivated.
- Be cautious about all communications you receive including those purported to be from “trusted entities” and be careful when clicking links contained within those messages. If in doubt, do not click.
- Do not respond to any spam-type emails. Don’t open attachments in emails that you’re not expecting they could contain a virus or code that would allow someone to control your computer?
- Do not input your information in a pop-up. If you are interested in an offer that you see advertised in a pop-up ad, contact the retailer directly through its homepage, retail outlet, or other legitimate contact method.