Close Menu
Global Counter Terrorism CouncilGlobal Counter Terrorism Council
    What's Hot

    Trump Tariffs on India: Economic Consequences and Strategic Crossroads Introduction

    August 7, 2025

    FIELD MARSHAL WITHOUT A BATTLEFIELD: PAKISTAN’S EMPTY TITLES IN AN AGE OF OPTICS

    May 21, 2025

    Pahalgam Attack: Rethinking Counter-Terrorism and Diplomacy in South Asia

    May 5, 2025
    Facebook X (Twitter) Instagram YouTube LinkedIn
    Global Counter Terrorism CouncilGlobal Counter Terrorism Council
    Facebook LinkedIn X (Twitter) Instagram YouTube
    Saturday, March 7
    • About Us
      • Partners
      • Objectives
      • Vision and Mission
      • Code of Ethics and Independence Policy
      • Who We Are
      • What Experts Say
    • Research
      • Research Areas
      • Research Articles
    • Events
      • Upcoming Conference
      • Past Conference
      • Upcoming Webinar
      • Past Webinar
    • Publications
      • Bioterrorism
      • Conference
      • International Development & Diplomacy
      • MoU
      • Post Confrenece
      • Security & Strategic Study
      • Defence Strategic & Planning
      • Policy & Governance
    • Media
    • Join Us
      • Membership
      • Career
    • Our Team
      • Our Patrons
      • Executive Council
      • Advisory Council
    • Contact Us
    • Other
    Global Counter Terrorism CouncilGlobal Counter Terrorism Council
    Home»Defense Strategic & Planning»Cyber Crime – Challenges and Solution

    Cyber Crime – Challenges and Solution

    0
    By admin on December 7, 2022 Defense Strategic & Planning
    Share
    Facebook Twitter LinkedIn WhatsApp
    Blanket More: In the world with population of over 7.8 Billion, almost every person have some electronic devices associated with themselves. It is reported that, number of connected devices that are in use worldwide are now more than 17 Billion, which is more than two times of the world’s total population. This number is estimated to be more than 20 Billion by 2030. Every device is directly or indirectly connected to one or more devices, which overall forms a huge network of devices.  These devices are used by people and they often share their valuable information while completing various day-to-day tasks. Caber Criminals tend to use this information against them in an offensive manner. Caber Crime is a very broad term. The simple way to explain this would be, “Any illegal activity which is done by making use of any computer and network”. These are some serious threats to one’s privacy. The depth of this can be understood by following example, DEFCON (Defense Readiness Condition) is world’s largest continuously run underground hacking conference. Ethical Hackers from all across the world actively participate in this. When this conference is held, all the security agencies are put on high alert. It is seen that the hackers are capable of hacking various devices from ATM Machine to a Car. There are many ways in which Caber Crime is carried out. Some of the commonly seen Caber Crimes are Hacking, Social Engineering, Identity Theft, Spreading Communal Hate, Encouraging Terrorism, Caber Bulling and many more.

    Hacking: The modern technology has made it possible to hack any device which is connected to other devices in the network. The simple example of this would be Wi-Fi Network. Wi-Fi hacking is very common but one should be concerned about this as there are chances that the whole Computer Network Security can be compromised. Common attacks include :
    SQL injection: Entering true SQL command which enables to access unauthorized data from database of the application.
    XSS: Cross Site Scripting refers to accessing the cookies or digital identity from the target’s server and carry out activity using target’s identity. In general, hacking is carried out by identifying the loop holes in the source code, written to program the software. The measures that can be taken to prevent this are securing the firewalls, avoid use of third-party applications and secure all the end points of the network.

    Social Engineering: Social Engineering basically refers to hacking into people’s mind. Here attacker tends to access data by manipulating the target psychologically. This can be carried out in many ways, one of them is by creating fake links and trick the target to click on it, which then allows the attacker to gain control over target’s system. One good example to explain this, is the well-known Tamara phishing scam, where the scamper retrieved the personal bank account details of people by manipulating them which resulted in money theft.

    Ransom attack: Breaching into person’s or organization’s personal data and encrypting it, so that the target can access his own data only with the help of key known by the attacker. One of many ways to counter this, is to avoid accessing malicious web applications. Such type of attacks may cost millions to a company. Recently, ‘Big Basket’ has reported a data leak of 15 GB from their database, which included user’s name, email, contact number, password hashes, location and their system’s IP address. Later, this data was made available for sale on Dark net, which is a part of internet, that can be accessed only with particular software and makes it difficult to trace the IP address or any communication protocol.

    Identity Theft: It refers to misuse of target’s personal identifying data without their consent to carry out some illegal activity. Sim Card Cloning: It refers in duplicating a legit sim card, which can be used in a similar way as original sim card. This is possible by extracting sim card’s IMSI (International Mobile Subscriber Identifier) and Authentication Key. Some basic measures in order to secure our networks are to make use of long passwords including special characters and numbers which makes it difficult to decrypt, Backup the data which can be useful in the scenario of Ransom attack, Keep on learning about the latest attacks and ways to tackle them, in case of an organization make sure to have a caber insurance. Government of India is actively working to prevent this and have an open portal to report a Caber Crime in India: cybercrime.gov.in For Women and Children: Complaint-mwcd@gov.in
    Featured
    Share. Facebook Twitter LinkedIn WhatsApp

    Related Posts

    Trump Tariffs on India: Economic Consequences and Strategic Crossroads Introduction

    August 7, 2025

    FIELD MARSHAL WITHOUT A BATTLEFIELD: PAKISTAN’S EMPTY TITLES IN AN AGE OF OPTICS

    May 21, 2025

    Pahalgam Attack: Rethinking Counter-Terrorism and Diplomacy in South Asia

    May 5, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Subscribe to Updates

    Get the latest sports news from SportsSite about soccer, football and tennis.

    STAY CONNECTED
    • Facebook
    • Twitter
    • Instagram
    • YouTube
    • LinkedIn
    Top Posts
    Connect With Us
    Connect With Us

    We're accepting new partnerships right now.

    Facebook X (Twitter) Instagram YouTube LinkedIn
    About Company
    • Objectives
    • Membership
    • Vision and Mission
    • Career
    • What Experts Say
    • Research Areas
    Quick Link
    • T&C
    • Term of Used
    • Write for Us
    • Code of Ethics
    • Privacy Policy
    Contact Us

    Global Counter Terrorism Council

    • Connect With Us B-30, Ground Floor, Sector -6,
      Noida Gautam Budh Nagar,
      Uttar Pradesh -201301, India
    • Connect With Us info@gctcworld.org
    • Connect With Us +91-9810875236 | +91-9811881997
    • Connect With Us 4788620 | 3111311 | 47000205
    • Connect With Us www.gctcworld.org

    © 2024 | Global Counter Terrorism Council | Website Designed & Maintained by Shadow infosystem (P) Limited

    Type above and press Enter to search. Press Esc to cancel.