Cyber Crime analysis on Social Media
Swati Sharma1, Vikash
Kumar Sharma2
1Assistant
Professor, BSSS College Bhopal, Madhya Pradesh (India)
Email: swati_98sharma@yahoo.co.in,
9425660713
2Assistant
Professor, OIST Bhopal, Madhya Pradesh (India)
Email:vikas.16sharma@gmail.com,
8959233302
ABSTRACT
Cyber Crime is a crime which is
difficult to detect and stop once occurred leave a long term effect on victims.
Cyber Crime is increasing day by day due to over use of social media, online
shopping, and internet banking which need sensitive financial and personal data.The
development in emerging internet technology and its wide spread knowledge leads
to security issues, cyber crime, internet hackers and intruders. The charm of
internet enhances the network structure that construct vast online theft, fraud
are called as cyber attacks or cyber crime. In order to keep ourselves free
from cyber crime we need to know how to protect ourselves from cyber crime. In
this paper we propose different mode of cybercrime and the types of its illegal
activities over the internet. Either national or international cybercrime is
creating huge negative impacts over society. By focusing on various techniques
we examine the cybercrime web data due to social media. Social networking
websites are used as a medium of interaction and communication among all the
people across the world. Due to over use and lack of awareness leads to
increase the cyber crimes by several aspects.
Key Word:Cyber
crime, Social media, Internet technology.
INTRODUCTION
As the crime is
increasing day by day it become very hard to detect crime on internet.Cyber
crime is a term which is used to generally illustrate criminal activity in
which computers and computer network plays an important role or act as a tool,
a target, or a place of criminal activity and include everything from
electronic cracking to denial of service attacks. It is also used to include
traditional crimes in which computers or networks are used to enable the
illegal activity. Cyber crime can also be described as the unauthorized access
to the system data alteration, data destruction, theft of intellectual
properly. The way
crime is increasing so as the crime related data it’s becoming harder to
analysis crime information day by day. It will be a time consuming and
irritating procedure to collect crime news without an automated system.
CYBER CRIMES
There
are different types of cybercrimes which makes the cyber world vulnerable to
various threats. Some of the commonly used methods to hook people are
Cyber-Stalking, Cyber Assassination, Bluffing and more. There is a need to have
idea about these crimes to as to safely navigate in the cyber world.
Cyber-Stalking , a crime in which the mugger
harasses a victim via electronic communication, such as e-mail, instant messaging, or messages posted to Web site or a
consultation group [2]. A cyber stalker relies upon the facelessness afforded
by the Internet to allow them to stalk their victim without being determined.
Cyber Assassination a specific criminal offence,
malfeasance or tort, but rather assassination or smear conducted via digital
media, usually through the Internet. Penalties for 'Cyber assassination' vary
from country to country, but the fundamental rights covered in the UN
Declaration of Human Rights and European Union
Fundamental Human Rights.
Hacking gaining access (wanted or unwanted)
to a computer and viewing, copying, or creating data without the aim of
terminating data or spitefully damaging the computer. Hacker - Person who gains authorized/unauthorized access to a
computer without the intention of causing damage.
Crackingby which a person attains
unauthorized access to a computer with the aim of causing damage. Cracker - Person who attains unauthorized access to a computer with
the aim of causing damage.
E-Mail Bluffing, the creation of email messages with
a fake sender address. Distributors of spam often use Bluffing in an attempt to get recipients to open,
and possibly even respond to, their solicitations.
SMS Bluffing is a relatively new expertise which
uses the short message service available on most mobile
phones and personal digital assistants, to set who the message appears to
come from by replacing the originating mobile number (Sender ID) with
alphanumeric text. Bluffing has both valid uses (setting the company name from
which the message is being sent, setting your own mobile number, or a product
name) and invalid uses (such as impersonating another person, company, and
product).
Carding, a form of credit card scam in which a stolen credit card is used to charge
pre-paid cards. [3] Carding typically involves the holder of the stolen card,
buying store-branded gift cards, which can then be sold to others or used to buy
other entities that can be sold for cash. Credit card robs who are involved in
this type of scam are called carders.
Bot Networks, a collection of negotiated computers
often referred to as ―zombies infected with virus that allows them mugger
to control them [1].
Cerebral Property Crimes is the theft of material that is
copyrighted, the theft of trade secrets, and trademark desecrations etc. A
copyright is the legal right of an author, publisher, composer, or other person
who creates a work.
Cyber Crouching is the act of registering, trading
in, or using an Internet domain name
with bad
faith intent to
profit from the favor of a trademark
belonging to someone else. The cyber
crouches then offers to sell the domain to the person or company who owns a
trademark contained within the name at an extravagant price.
Theft
Crimeshas become the most common kind of cybercrime. The
most common fraud Credit/Debit Card Fraud which takes place more in numbers now
a days this kind of fraud takes place when the unauthorized use of a
debit/credit card to misleadingly attain money or belongings. Credit/Debit card
numbers can be stolen either by an identity theft scheme or from some leaky
websites[3]. This number can be hacked by machine also if we not used it
carefully. Identity theft, when someone snatches another’s information without
his or her awareness to commit fraud and theft. Identity can be hacked easily
when we share our personal information on social networking sites without any
privacy or security and it is noticed that by revealing sensitive private data
to an open business, sporadically as a response to an email to streamline
promoting or membership information.
Cyber
Terrorism, one of the most dangerous forms of cybercrime is
used to conduct violent acts through internet including acts of unhurried or
large disrupting activities [4]. Cyber terrorism may be expressed to be the
vigilant use of disrupting activities. Now this has extended its hands and
Terrorist agencies are into Cyber brain warfare and are using Bain computing to
influence human brain and use them for their motives.
Social
Media Usage
So many people are
using social networking site in access through their mobile phones, laptops or
by any other gadgets. And people feel happy to show their expertise on
uploading new videos and photos or by writing some text or comment. These sites
are making the life of individuals so easy that on one finger movement they can
connect with their friend but still most of the people are not aware with the
drawback of using these sites in access basically we are sharing our all
information with these sites and that can be misused anyway. Face book, what’s
app, Instagram are the place where one can easily fetch your information
regarding your location and your personal profile. However, the maximum part of users
is covered by teenagers in India Gangopdhyay and Dhār have posted a
document in which they have got noted that Social websites attract young adults
and permit them opportunities to get along with regarded and unknown humans.
As the graph shows
that India is having so many social media users. The information of that person
can be hacked by any person and that information can be misused by other
people. Any of the people can make the new profile by your name and
information, your photographs can be access by some unauthorized person and
used for any of the purpose. Many people are not aware with the things which
are running in background. Like in 2016 near about 3 billion yahoo account were
hacked in one of the biggest breaches of all time.
This statistic provides
information on the most popular networks worldwide as of October 2018, ranked
by number of active accounts. Market leader Facebook was the first social
network to surpass 1 billion registered accounts and currently sits at 2.23
billion monthly active users. Sixth-ranked photo-sharing app Instagram had 1
billion monthly active accounts.
Social networks
The leading
social networks are usually available in multiple languages and enable users to
connect with friends or people across geographical, political or economic
borders. Approximately 2 billion internet users are
using social networks and these figures are
still expected to grow as mobile device usage and mobile
social networks increasingly gain
traction.
Due to a constant presence in the lives of their users, social networks have a
decidedly strong social impact. The blurring between offline and virtual life
as well as the concept of digital identity and online social interactions are
some of the aspects that have emerged in recent discussions.
CONCLUSION
Cyber crime is on peak as we all are using internet and
social media but we are still lacking behind the drawbacks of using that in
access. So many people are still not aware that what is happening behind the
thing .Crime data is an insightful domain where effective awareness plays a
vital role in crime analysis. In this paper specification of social media user
and their awareness towards cyber crime is analyzed by using some data from
internet. The crime data mining has a promising future for increasing the
effectiveness and efficiency of criminal and intelligence analysis. Still so
much awareness is required to make the world of internet crime free. As it’s an
insight for us that how we can gather information regarding crime on system.
REFERENCES
1. ASSOCHAM-Mahindra
SSG study on Cyber and Network Security Framework in 2015.
2. CSIS: Securing
Cyberspace for the 44th Presidency, CSIS Commission on Cyber security, US
Center for Strategic and International Studies (CSIS), Washington DC, December 2008
3. AmmarYassir and
SmithaNayak,Cybercrime: A threat to Network Security [IJCSNS International
Journal of Computer Science and Network Security], VOL.12 Issue No.2,February
2012
4. MayankR. kothawade, Prof. Dr.
PreetiAgarwalCybercrimes: An Indian
perspective
2016 IJESC Volume 6, Issue: 4 (IJESE 2016) V
5. Conti M., Poovendran R., Secchiero
M., Fakebook: Detecting fake profiles in on-line social networks, Proceedings
of the International Conference on Advances in Social Networks Analysis and
Mining (2012).
6. SitaramAsur Social Computing Lab HP
Labs Palo Alto, California 2010 IEEE/WIC/ACM International Conference on Web
Intelligence and Intelligent Agent Technology: “Predicting the Future WithSocial
Media”.
7. Explanatory Report to the Convention on Cybercrime, Para 304, https://rm.coe.int/16800cce5b.
8. Cyber Crime Attack Source. available at:http://sharingvision.com/2014/ 06/indonesia-nomor-satu-sumber-serangan-cyber/ accessed on Friday at 10.02 AM 10 September 10, 2014.
9. Stephenson, P.; Walter, R.; , "Cyber Crime Assessment," System Science (HICSS), 2012 45th Hawaii International Conference on , vol., no., pp.5404-5413,4-7 Jan. 2012 doi: 10.1109/HICSS.2012.190
10. Mesko, G.; Bernik, I.; , "Cybercrime: Awareness and Fear: Slovenian Perspectives," Intelligence and Security Informatics Conference (EISIC), 2011 European , vol., no., pp.28-33, 12-14 Sept. 2011
11. Birk, D.; Gajek, S.; Grobert, F.; Sadeghi, A.-R.; , "Phishing Phishers - Observing and Tracing Organized Cybercrime," Internet Monitoring and Protection, 2007. ICIMP 2007. Second International Conference on , vol., no., pp.3, 1-5 July 2007
12. McCombie, S.; Pieprzyk, J., "Winning the Phishing War: A Strategy for Australia," Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second , vol., no., pp.79,86, 19-20 July 2010.