INVESTIGATION OF CYBER CRIMES

Computer crime represents one of the fastest growing crimes in the country. These can be separated into two categories
1. Where a computer is used to commit a crime
2. When a computer or a net work is the target of the committed crime.
The growth in technology has made it easier for the criminals in the acts. The sophistication of the said technology requires that the evidence is collected and handled carefully by professionals. Loss of evidence is a very common and expected problem as the all the data are routinely destroyed or altered. The disproportional growth of the technology when compared with the loss related to further aggravates the situation.
The types of crimes may be broadly defined as against
1. Government
2. Organisation
3. Individuals(Persons)
IN CASE OF AN INCIDENT FOR ORGANIZATIONS
1. Maintain the computer and other resources unaltered
2. Document the loss suffered and segregate the evident with the help of the professionals and Contact law enforcement authorities
IN CASE OF AN INCIDENT FOR PERSONS
1. Do not Panic
2. Do not delete or destroy message/ mail/ records
3. Do not try and resolve the issue by yourself
4. Get the help of the professionals to securing the evidence
5. Contact law enforcement authorities
Offering sexually explicit materials to minor
Investment fraud:-Plain & Pyramid schemes
 Identity theft:- Social networking sites
 Hacking:- Email, website, bank a/c 
Sexual offenses - other 
Stolen property offense 
Software piracy 
Sexual harassment 
Relationship Fraud
 Charity fraud
 Counterfeit
Transmitting obscene materials to minors
 Spam:- Astrology fraud, Medicine fraud
 Auction fraud : Fake & Non delivery 
Sexual solicitation with minors 
Terrorists Recruiting
 Gambling offences 
Employment fraud
 Narcotic offenses
 Luring/travelling
 Terrorist funding 
Black mail
Identity theft:- Social networking sites 
Auction fraud : Fake & Non delivery 
Hacking:- Email, website, bank a/c 
Obscene communication with minors
 Terrorist threat 
Sexual abuse 
Music piracy 
Drug traffic
 Prostitution
 Extortion
 Spoofing

Comments

Popular posts from this blog

CYBER CRIMES

Different Ways to Protect Yourself in the Cyber World