Computer Crime, or Cyber Crime, is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be targeted.

Cyber crime has emerged as a new class of crimes, rapidly increasing due to extensive use of the internet and IT services.

Maximum Cyber crime cases, about 46%, were related to cyber pornography, followed by hacking. In over 60% of these cases, offenders between 18 to 30 years of age.

Cybersecurity is defined as the practice of protecting systems, networks, and programs from digital or virtual attacks.

These cyber-attacks tend to access, change or even destroy sensitive information to the extent of extorting money from users or causally interrupt a normal business process.

It is necessary to implement effective cybersecurity measures, considering the innovations in these attacks, and the upward graph of technology and its tools today.

The internet in India is growing rapidly.

It has given rise to new opportunities in every field we can think have be it entertainment, business, sports or education. 

There are two sides to a coin. Internet also has its own disadvantages is Cyber-crime illegal activity committed on the internet.

Types of Cyber Crime:

  • Hacking 
  • Denial of service attack 
  • Virus Dissemination 
  • Computer Vandalism 
  • Cyber Terrorism 
  • Software Piracy

Hacking: Hacking in simple terms means an illegal intrusion into a computer system and/or network.

Denial of Service Attack: Act by the criminal, who floods the bandwidth of the victim’s network. Is his e-mail box with spam mail depriving him of the service.

Virus Dissemination: Malicious software that attaches itself to other software. (Virus, worms, Trojan horse, web jacking, e-mail bombing etc.)

Computer Vandalism: Damaging or destroying data rather than stealing and transmitting viruses.

Cyber Terrorism: Use of Internet based attacks in terrorist activities. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.

Software Privacy: Theft of software through the illegal copying of genuine programs. Distribution of products intended to pass for the original.

Safety Measures:

  • Change the Passwords for every 15 days.
  • Don’t keep a single password to many apps, use different passwords.
  • Keep changing Debit/Credit Passwords regularly.
  • Activate the 2 Factor Verification in the email, WhatsApp and any other apps which allows you to activate the same.
  • Don’t share the OTP, ATM Pins, and Email Passwords with anyone.
  • Don’t share any personal photos in any Social Media Platforms, it’s been causing the new way of Cyber-crime and harassing the people.
  • Don’t post personal details in the Social Media, if needed, anybody can give the details in the Messenger app if you don’t have the Email or Phone number of a person.
  • Use the Faraday Bag or Faraday Wallets to avoid the chances for a cyber-crime.
  • Avoid the usage of Public Wi-Fi to avoid the Cyber Crimes. It may easily lead to crime because it is not secured one and can take any details from the mobile, especially the Banking Apps in the mobile, User ID and Passwords of any other apps.


Therefore it is necessary to take care of one’s security on the web. It can be done through following certain precautions and techniques like reviewing the browser setting and confirming that it is not storing and sharing user’s confidential information, using incognito browsing to protect oneself from harmful web data and cache, using a verified and authentic search engine, not storing the financial information on any online unverified online platform, not using malicious web sites, using VPN to protect the privacy of the user, using an active firewall to protect oneself against viruses and malware, and consulting appropriate authorities when anything suspicious happens online.

    • 10 months ago (Edit)

    […] drug trafficking, money laundering, extortion, human trafficking, illegal gambling, arms smuggling, cybercrime, and racketeering. These activities are carried out in a systematic manner and may involve complex […]

Leave feedback about this

  • Quality
  • Price
  • Service


Add Field


Add Field
Choose Image
Choose Video