INVESTIGATION OF CYBER CRIMES
Computer crime represents one of the fastest growing crimes in the country. These can be separated into two categories
1. Where a computer is used to commit a crime
2. When a computer or a net work is the target of the committed crime.
The growth in technology has made it easier for the criminals in the acts. The sophistication of the said technology requires that the evidence is collected and handled carefully by professionals. Loss of evidence is a very common and expected problem as the all the data are routinely destroyed or altered. The disproportional growth of the technology when compared with the loss related to further aggravates the situation.
The types of crimes may be broadly defined as against
1. Government
2. Organisation
3. Individuals(Persons)
IN CASE OF AN INCIDENT FOR ORGANIZATIONS
1. Maintain the computer and other resources unaltered
2. Document the loss suffered and segregate the evident with the help of the professionals and Contact law enforcement authorities
IN CASE OF AN INCIDENT FOR PERSONS
1. Do not Panic
2. Do not delete or destroy message/ mail/ records
3. Do not try and resolve the issue by yourself
4. Get the help of the professionals to securing the evidence
5. Contact law enforcement authorities
Offering sexually explicit materials to minor
Investment fraud:-Plain & Pyramid schemes
Identity theft:- Social networking sites
Hacking:- Email, website, bank a/c
Sexual offenses - other
Stolen property offense
Software piracy
Sexual harassment
Relationship Fraud
Charity fraud
Counterfeit
Transmitting obscene materials to minors
Spam:- Astrology fraud, Medicine fraud
Auction fraud : Fake & Non delivery
Sexual solicitation with minors
Terrorists Recruiting
Gambling offences
Employment fraud
Narcotic offenses
Luring/travelling
Terrorist funding
Black mail
Identity theft:- Social networking sites
Auction fraud : Fake & Non delivery
Hacking:- Email, website, bank a/c
Obscene communication with minors
Terrorist threat
Sexual abuse
Music piracy
Drug traffic
Prostitution
Extortion
Spoofing
Comments
Post a Comment