BSSS Journal of Computer, Volume XI, Issue-I

 

Cyber Crime analysis on Social Media

 

Swati Sharma1, Vikash Kumar Sharma2

1Assistant Professor, BSSS College Bhopal, Madhya Pradesh (India)

Email: swati_98sharma@yahoo.co.in, 9425660713

2Assistant Professor, OIST Bhopal, Madhya Pradesh (India)

Email:vikas.16sharma@gmail.com, 8959233302

 

 

ABSTRACT

Cyber Crime is a crime which is difficult to detect and stop once occurred leave a long term effect on victims. Cyber Crime is increasing day by day due to over use of social media, online shopping, and internet banking which need sensitive financial and personal data.The development in emerging internet technology and its wide spread knowledge leads to security issues, cyber crime, internet hackers and intruders. The charm of internet enhances the network structure that construct vast online theft, fraud are called as cyber attacks or cyber crime. In order to keep ourselves free from cyber crime we need to know how to protect ourselves from cyber crime. In this paper we propose different mode of cybercrime and the types of its illegal activities over the internet. Either national or international cybercrime is creating huge negative impacts over society. By focusing on various techniques we examine the cybercrime web data due to social media. Social networking websites are used as a medium of interaction and communication among all the people across the world. Due to over use and lack of awareness leads to increase the cyber crimes by several aspects.

 

 Key Word:Cyber crime, Social media, Internet technology.

 

INTRODUCTION

 

As the crime is increasing day by day it become very hard to detect crime on internet.Cyber crime is a term which is used to generally illustrate criminal activity in which computers and computer network plays an important role or act as a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to enable the illegal activity. Cyber crime can also be described as the unauthorized access to the system data alteration, data destruction, theft of intellectual properly. The way crime is increasing so as the crime related data it’s becoming harder to analysis crime information day by day. It will be a time consuming and irritating procedure to collect crime news without an automated system.

 

CYBER CRIMES

There are different types of cybercrimes which makes the cyber world vulnerable to various threats. Some of the commonly used methods to hook people are Cyber-Stalking, Cyber Assassination, Bluffing and more. There is a need to have idea about these crimes to as to safely navigate in the cyber world.

Cyber-Stalking , a crime in which the mugger harasses a victim via electronic communication, such as e-mail, instant messaging, or messages posted to Web site or a consultation group [2]. A cyber stalker relies upon the facelessness afforded by the Internet to allow them to stalk their victim without being determined.

Cyber Assassination a specific criminal offence, malfeasance or tort, but rather assassination or smear conducted via digital media, usually through the Internet. Penalties for 'Cyber assassination' vary from country to country, but the fundamental rights covered in the UN Declaration of Human Rights and European Union Fundamental Human Rights.

Hacking gaining access (wanted or unwanted) to a computer and viewing, copying, or creating data without the aim of terminating data or spitefully damaging the computer. Hacker - Person who gains authorized/unauthorized access to a computer without the intention of causing damage.

Crackingby which a person attains unauthorized access to a computer with the aim of causing damage. Cracker - Person who attains unauthorized access to a computer with the aim of causing damage.

 E-Mail Bluffing, the creation of email messages with a fake sender address. Distributors of spam often use Bluffing in an attempt to get recipients to open, and possibly even respond to, their solicitations.

SMS Bluffing is a relatively new expertise which uses the short message service  available on most mobile phones and personal digital assistants, to set who the message appears to come from by replacing the originating mobile number (Sender ID) with alphanumeric text. Bluffing has both valid uses (setting the company name from which the message is being sent, setting your own mobile number, or a product name) and invalid uses (such as impersonating another person, company, and product).

Carding, a form of credit card scam in which a stolen credit card is used to charge pre-paid cards. [3] Carding typically involves the holder of the stolen card, buying store-branded gift cards, which can then be sold to others or used to buy other entities that can be sold for cash. Credit card robs who are involved in this type of scam are called carders.

Bot Networks, a collection of negotiated computers often referred to as ―zombies infected with virus that allows them mugger to control them [1].

Cerebral Property Crimes is the theft of material that is copyrighted, the theft of trade secrets, and trademark desecrations etc. A copyright is the legal right of an author, publisher, composer, or other person who creates a work.

Cyber Crouching is the act of registering, trading in, or using an Internet domain name with bad faith intent to profit from the favor of a trademark belonging to someone else. The cyber crouches then offers to sell the domain to the person or company who owns a trademark contained within the name at an extravagant price.

Theft Crimeshas become the most common kind of cybercrime. The most common fraud Credit/Debit Card Fraud which takes place more in numbers now a days this kind of fraud takes place when the unauthorized use of a debit/credit card to misleadingly attain money or belongings. Credit/Debit card numbers can be stolen either by an identity theft scheme or from some leaky websites[3]. This number can be hacked by machine also if we not used it carefully. Identity theft, when someone snatches another’s information without his or her awareness to commit fraud and theft. Identity can be hacked easily when we share our personal information on social networking sites without any privacy or security and it is noticed that by revealing sensitive private data to an open business, sporadically as a response to an email to streamline promoting or membership information.

Cyber Terrorism, one of the most dangerous forms of cybercrime is used to conduct violent acts through internet including acts of unhurried or large disrupting activities [4]. Cyber terrorism may be expressed to be the vigilant use of disrupting activities. Now this has extended its hands and Terrorist agencies are into Cyber brain warfare and are using Bain computing to influence human brain and use them for their motives.

Social Media Usage

So many people are using social networking site in access through their mobile phones, laptops or by any other gadgets. And people feel happy to show their expertise on uploading new videos and photos or by writing some text or comment. These sites are making the life of individuals so easy that on one finger movement they can connect with their friend but still most of the people are not aware with the drawback of using these sites in access basically we are sharing our all information with these sites and that can be misused anyway. Face book, what’s app, Instagram are the place where one can easily fetch your information regarding your location and your personal profile. However, the maximum part of users is covered by teenagers in India Gangopdhyay and Dhār have posted a document in which they have got noted that Social websites attract young adults and permit them opportunities to get along with regarded and unknown humans.

 As the graph shows that India is having so many social media users. The information of that person can be hacked by any person and that information can be misused by other people. Any of the people can make the new profile by your name and information, your photographs can be access by some unauthorized person and used for any of the purpose. Many people are not aware with the things which are running in background. Like in 2016 near about 3 billion yahoo account were hacked in one of the biggest breaches of all time.

This statistic provides information on the most popular networks worldwide as of October 2018, ranked by number of active accounts. Market leader Facebook was the first social network to surpass 1 billion registered accounts and currently sits at 2.23 billion monthly active users. Sixth-ranked photo-sharing app Instagram had 1 billion monthly active accounts.

 

Social networks

The leading social networks are usually available in multiple languages and enable users to connect with friends or people across geographical, political or economic borders. Approximately 2 billion internet users are using social networks and these figures are still expected to grow as mobile device usage and mobile social networks increasingly gain traction. 

Due to a constant presence in the lives of their users, social networks have a decidedly strong social impact. The blurring between offline and virtual life as well as the concept of digital identity and online social interactions are some of the aspects that have emerged in recent discussions.

 

CONCLUSION

Cyber crime is on peak as we all are using internet and social media but we are still lacking behind the drawbacks of using that in access. So many people are still not aware that what is happening behind the thing .Crime data is an insightful domain where effective awareness plays a vital role in crime analysis. In this paper specification of social media user and their awareness towards cyber crime is analyzed by using some data from internet. The crime data mining has a promising future for increasing the effectiveness and efficiency of criminal and intelligence analysis. Still so much awareness is required to make the world of internet crime free. As it’s an insight for us that how we can gather information regarding crime on system.

 

REFERENCES

1.      ASSOCHAM-Mahindra SSG study on Cyber and Network Security Framework in 2015.

2.      CSIS: Securing Cyberspace for the 44th Presidency, CSIS Commission on Cyber security, US Center for Strategic and International Studies (CSIS), Washington DC, December 2008

3.      AmmarYassir and SmithaNayak,Cybercrime: A threat to Network Security [IJCSNS International Journal of Computer Science and Network Security], VOL.12 Issue No.2,February 2012

4.      MayankR. kothawade, Prof. Dr. PreetiAgarwalCybercrimes: An Indian perspective 2016 IJESC Volume 6, Issue: 4 (IJESE 2016) V

5.      Conti M., Poovendran R., Secchiero M., Fakebook: Detecting fake profiles in on-line social networks, Proceedings of the International Conference on Advances in Social Networks Analysis and Mining (2012).

6.      SitaramAsur Social Computing Lab HP Labs Palo Alto, California 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology: “Predicting the Future WithSocial Media”.

7.      Explanatory Report to the Convention on Cybercrime, Para 304, https://rm.coe.int/16800cce5b.

8.      Cyber Crime Attack Source. available at:http://sharingvision.com/2014/ 06/indonesia-nomor-satu-sumber-serangan-cyber/ accessed on Friday at 10.02 AM 10 September 10, 2014.

9.      Stephenson, P.; Walter, R.; , "Cyber Crime Assessment," System Science (HICSS), 2012 45th Hawaii International Conference on , vol., no., pp.5404-5413,4-7 Jan. 2012 doi: 10.1109/HICSS.2012.190

10.  Mesko, G.; Bernik, I.; , "Cybercrime: Awareness and Fear: Slovenian Perspectives," Intelligence and Security Informatics Conference (EISIC), 2011 European , vol., no., pp.28-33, 12-14 Sept. 2011

11.  Birk, D.; Gajek, S.; Grobert, F.; Sadeghi, A.-R.; , "Phishing Phishers - Observing and Tracing Organized Cybercrime," Internet Monitoring and Protection, 2007. ICIMP 2007. Second International Conference on , vol., no., pp.3, 1-5 July 2007

12.  McCombie, S.; Pieprzyk, J., "Winning the Phishing War: A Strategy for Australia," Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second , vol., no., pp.79,86, 19-20 July 2010.