We are now in Cyber-age where Internet and computers have a major impact on our lives, social life and how we do business.
The use of information technology has created great security challenges and moral questions in front of us. Just as every thing has a positive and negative impact, the use of information technology is beneficial and insecure.
With the growth of the Internet, network security has become a major concern. Cyber crimes have emerged rapidly in recent years and have significant implications. Cyber criminals are doing everything from stealing money, hacking into another computer, stealing intellectual property, distributing viruses and worms to damaging computers connected to the internet and committing fraud.
Stopping crime is a major concern today.
Cyber criminals exploit vulnerabilities in soft merchandise and their networks for their use.
Hacking or Cracking is a major net offense committed today. Hackers make use of vulnerabilities and loops in operating systems to delete data and steal important information from the victim's computer. Violation is usually done using a backdoor program installed on your system. A lot of cookies also try to access resources using password cracking software. Hackers can also monitor what you do on your computer and can also import files on your computer. A hacker could install some programs on your computer without your knowledge. Such programs could also be used to steal personal information such as passwords and credit card information. Important business information can also be hacked to get covert information about your company's future plans.
Cyber-Theft is using computers and communication systems to steal information electronically. Hackers crack into bank systems and transfer money into their own bank accounts. This is a major concern, as larger amounts can be stolen and transferred illegally.
Many online newsletters provide investors with free advice on measuring stocks as they should invest. Sometimes these proposals are totally cheated and cause investors to lose. Credit card fraud is also quite common.
Most companies and banks do not disclose that they have been victims of cyber-theft for fear of losing customers and sharing their owners. Cyber-theft is the most common and most reported of all crime. Cyber-theft is a popular net crime because it can quickly bring in actual servers that are very crime-driven. Furthermore, there is little chance that a professional server will be arrested by law enforcement.
Viruses and worms:
Viruses and worms are a very serious threat to ordinary users and businesses. Viruses are computer programs designed to damage computers. It is called a virus because it spreads from one computer to another, such as a biological virus. Virus must be connected to other applications or documents as it enters the computer. Worm usually uses loops in a soft product or operating system. Trojan horse is dicey. It seems to be one thing but does something else. The system can accept it as one. In practice, it can solve virus, worms, or bomb logic. Logic bomb is an attack as a result of an event, such as a computer clock reaching a certain date. Chernobyl and Melissa viruses are recent examples.
Experts estimate that Mydoom worm infected about. four million million computers in one day in January 2004. Back in March 1999, the Melissa virus was so powerful that it needed Microsoft and a host of very large companies to completely turn off their email until the virus could be found.
An important question arises how to prevent these crimes. Some methods and solutions have been introduced but the problems are still there and are increasing day by day.
Antivirus and Anti Spyware Software:
Antivirus software consists of computer programs that try to identify, prevent and eliminate viruses and other malicious software. Anti spy product is used to limit backdoor applications, trojans and other spyware to install on the computer.
Firewall protects the computer network from unauthorized access. Network firewalls may be hardware devices, software or a combination of two. A network firewall usually protects the internal computer network from malicious access outside the network.
Encryption is the science of encryption and decryption of information. Encryption is like sending mail to another person with a lock code on the envelope which is known only to the sender and the recipient. Some encryption methods have been developed and some of them are still not crazy.
Code of Ethics and Law:
Cyber ethics and networks are also designed to prevent crime online. It is the responsibility of each person to follow the Internet protocol and network so that increased online fraud will be reduced. Security programs such as anti viruses and anti-spy products should be installed on all computers, to be safe from cyber crimes. Service providers also offer a high level of security on their servers to keep their customers safe from all types of viruses and mallicious applications.
Shaikh Mohsin Ayaz
Department of Computer Science, University of Karachi