We are currently living in the Cyber Age where the Internet and computers have a significant impact on our lifestyle, social life and business.
The use of information technology has raised great security challenges and ethical issues in front of us. Like all positive and negative factors, the use of information technology is beneficial and uncertain.
With the rise of the Internet, network security is a major concern. Cybercrime has been rapidly occurring in recent years and has significant implications. Computer criminals do their best to steal money, hack into others' computers, confiscate intellectual property, spread viruses and worms for cyber-related computers and fraud.
Stopping cybercrime today is a big problem.
Computer criminals exploit the vulnerability of computer softwares and networks to their advantage.
Hacking or crack is a major cybercrime today. The hacker exploits weaknesses and loopholes in operating systems by destroying data and stealing important information from the victim's computer. Cracks are usually done using the backdoor program installed on the machine. Many crackers are also trying to access resources by using password crack software. Hackers can check what they are doing on your computer and import files on your computer. The hacker can install many programs on your system without knowing it. Such programs can be used to steal personal information such as passwords and credit card information. You can also break important company information to get secret information about your company's future plans.
Cyber-Theft: Using Computer and Communication Systems Steal information in electronic form. Hackers break into banking systems and transfer their own bank accounts. This is the most important problem because you can steal more money and transfer it illegally.
On the Internet, many newsletters are provided to investors with free advice on where to invest. Sometimes these recommendations are completely false and cause losses to investors. Credit card fraud is also very common. Most companies and banks do not realize that they are victims of cyber-theft because they are afraid of losing customers and sharing their owners. Cyber-theft is the most widespread and most common of all computer criminals. Cyber-theft is a popular cyber-crime, as it can quickly try the experienced cyber-criminal big cash. Furthermore, there is little chance that law enforcement will capture a professional computer criminal.
Viruses and Worms:
Viruses and worms are a major threat to normal users and businesses. Viruses are computer programs that damage computers. We call it a virus because it spreads from one computer to another as a biological virus. You must attach a virus to another program or documents through which you enter the computer. The worm typically uses loops to soft goods or the operating system. Trojan horse is checkered. It seems to be doing something but something else. The system can accept one thing. When executed, a virus, worm or logic bomb can be released. A logical bomb is an attack triggered by an event, such as a computer clock at a certain time. Chernobyl and Melissa viruses are the latest examples. Experts estimate that the Mydoom worm infected about a quarter of a million computers in one day in January 2004. In March 1999, the Melissa virus was so strong that it forced Microsoft and many other big companies to completely disable their email systems until the virus was removed.
An important question arises as to how to prevent these offenses. Numerous techniques and solutions have been introduced, but problems still persist and grow day by day.
Antivirus and antispyware software:
Antivirus software consists of computer programs that prevent and eliminate computer viruses and other malicious software. Anti-Spy Supporters are used to limit the backdoor program to be installed on your computer, Trojan and other spy devices
Firewall protects your computer network from unauthorized access. Network firewalls can be hardware devices, software programs, or a combination of these. A network firewall usually protects an internal computer network against malicious access outside the network.
Encryption is the encryption and decryption of information. Encryption is like sending a mail to another party that has an envelope code that is only known to the sender and recipient. Several cryptographic methods have been developed, and some of them have not cracked yet.
Cyber-ethics and Laws: Cyber-ethics and internet law are also being set up to stop cybercrime. It is everyone's responsibility to follow computer ethics and computer law that increasing computer crime will decrease. Security software, such as anti-virus and anti-spyware, must be installed on every computer to keep safe from cybercrime. ISPs should provide a high level of security on servers in order to secure customers from all types of viruses and malware.
Shaikh Mohsin Ayaz
Department of Computer Science of Karachi University