cyber crime essay in odia

45,000+ students realised their study abroad dream with us. Take the first step today

Meet top uk universities from the comfort of your home, here’s your new year gift, one app for all your, study abroad needs, start your journey, track your progress, grow with the community and so much more.

cyber crime essay in odia

Verification Code

An OTP has been sent to your registered mobile no. Please verify

cyber crime essay in odia

Thanks for your comment !

Our team will review it before it's shown to our readers.

Leverage Edu

  • School Education /

✍️Essay on Cybercrime: Free Samples in 100, 200, 300 Words

cyber crime essay in odia

  • Updated on  
  • Apr 26, 2024

Essay on Cybercrime

The 21st century is a digital age, where any and every task is done on the internet. All thanks to the developments in technology which have been the main factor to ease human life on earth and maybe on other plants in future. But with the benefits of technology, there are several harmful effects, one of them which has recently gained popularity; Cyber Crime. 

Cybercrime has emerged as pervasive and evolved as one of the most dangerous threats to humans. There are several users on the internet who indulge in illegal and criminal activities, using computers and networks. To guide you through this hot debate topic, below we have discussed essays on cybercrime.

Table of Contents

  • 1 Essay on Cybercrime in 100 Words
  • 2 Essay on Cybercrime in 200 Words
  • 3 Essay on Cybercrime in 300 Words
  • 4 Short Essay on Cybercrime

Also Read: Essay on Student Life

Essay on Cybercrime in 100 Words

Cybercrime involves illegal activities like hacking, ransomware, cyberbullying, online fraud, etc. People who are involved in cybercrime or any similar activities are called hackers, scammers or fraudsters. Cybercrime leads to financial loss for individuals who have fallen victim to one. Cybercrime often invades a person’s privacy by stealing their personal details, including sensitive data, photos, and communication records, which can be used for blackmailing or any malicious purpose.

There are several governmental and non-government organizations which are working 

To tackle cybercrime by raising awareness among the masses, cyber security training, implementing robust security protocols, and enacting comprehensive cybercrime laws.

Also Read: I Love My India Essay: 100 and 500+ Words in English for School Students

Also Read: How to Prepare for UPSC in 6 Months?

Essay on Cybercrime in 200 Words

Cybercrime is a criminal activity done online using a computer, network and internet. With the increasing use of the internet and mobile phones, the number of criminal activities has also gained pace.  These criminal-minded people steal the personal details of a person, which leads to financial losses and damages the reputation of the victims. Various scams and fraudulent schemes are offered on the internet like online auctions, advance fees, or any investment scam, which are all aimed at deceiving individuals into parting with their money.

Cybercrime is not limited to financial losses or reputational damage, a more discrete term has emerged; cyberbullying.  In cyberbullying, a person is harassed, humiliated, or threatened online. This can have severe psychological and emotional consequences. Ethical hackers or white hat hackers can help organizations identify vulnerabilities in their systems before malicious hackers exploit them. 

Cybercrime doesn’t have any boundaries and is an international issue and international cooperation is crucial for tracking and prosecuting cybercriminals who operate across borders. To combat cybercrime effectively, a multi-faceted approach is required, involving education, technology, legislation, and international cooperation. As technology continues to advance, our efforts to combat cybercrime must keep pace to protect our increasingly interconnected world.

Also Read : Essay on Winter Season

Essay on Cybercrime in 300 Words

Economists have termed cybercrime as ‘ A Hidden Threat to the Digital World.’ Modern humans are relying on the internet for their day-to-day activities and every macro and micro activity. In this sense, the term cybercrime comes to the front. Cybercrime refers to criminal activities conducted through the use of computers, networks, and the Internet. 

Cybercrime consists of various malicious activities like hacking, phishing, ransomware attacks, identity theft, online fraud, and cyberbullying. Hackers, fraudsters, scammers, criminals, and even state-sponsored actors exploit vulnerabilities in digital systems to steal sensitive information, disrupt operations, and cause financial and emotional harm to victims.

The consequences of cybercrime are far-reaching. Financial losses run into 10 digits annually, affecting individuals and organizations alike. Personal privacy is invaded as cybercriminals steal sensitive data, photos, and communication records. In cases of cyberbullying and harassment, victims suffer reputational damages, psychological distress, and emotional trauma, particularly in cases of cyberbullying and harassment.

It’s necessary to look for a multifaceted approach to deal with cybercrime, some of which are.

  • Raising public awareness through campaigns where people are informed about the risks of cybercrime and educate them on best practices for online safety.
  • Individuals and organizations should implement robust security protocols, regularly update software, and use multi-factor authentication to protect their digital assets.
  • Governments should enact and enforce cybercrime laws, providing law enforcement agencies with the resources and expertise needed to prosecute cybercriminals effectively.
  • Looking at the global nature of cybercrime, international collaboration is vital. Countries should work together to share threat intelligence and cooperate in the investigation and prosecution of cybercriminals.
  • Ethical hackers can help organizations identify and rectify vulnerabilities in their systems before malicious actors exploit them.

Tackling cybercrime requires proactive measures, including education, strong cybersecurity practices, legislation, international cooperation, and the active involvement of ethical hackers.

Also Read: Essay on Green Energy PDF: 150 and 250 Words

Short Essay on Cybercrime

Find the short essay on cyber crime from below:

Cybercrime is an illegal and unethical activity which is done by hackers and fraudsters to gain financial or any other benefits for themselves.

To tackle cybercrime, several measures can be taken. Some of these measures are education and public awareness, research and innovation, ethical hacking, etc.

To write an essay on cybercrime, you need to give details on how it works and the level of danger it poses to humans. Cybercrime consists of various malicious activities like hacking, phishing, ransomware attacks, identity theft, online fraud, and cyberbullying. Hackers, fraudsters, scammers, criminals, and even state-sponsored actors exploit vulnerabilities in digital systems to steal sensitive information, disrupt operations, and cause financial and emotional harm to victims.

Related Articles

For more information about such informative articles, visit our essay writing page and make sure to follow Leverage Edu .

' src=

Shiva Tyagi

With an experience of over a year, I've developed a passion for writing blogs on wide range of topics. I am mostly inspired from topics related to social and environmental fields, where you come up with a positive outcome.

Leave a Reply Cancel reply

Save my name, email, and website in this browser for the next time I comment.

Contact no. *

cyber crime essay in odia

Connect With Us

45,000+ students realised their study abroad dream with us. take the first step today..

cyber crime essay in odia

Resend OTP in

cyber crime essay in odia

Need help with?

Study abroad.

UK, Canada, US & More

IELTS, GRE, GMAT & More

Scholarship, Loans & Forex

Country Preference

New Zealand

Which English test are you planning to take?

Which academic test are you planning to take.

Not Sure yet

When are you planning to take the exam?

Already booked my exam slot

Within 2 Months

Want to learn about the test

Which Degree do you wish to pursue?

When do you want to start studying abroad.

January 2024

September 2024

What is your budget to study abroad?

cyber crime essay in odia

How would you describe this article ?

Please rate this article

We would like to hear more.

Have something on your mind?

cyber crime essay in odia

Make your study abroad dream a reality in January 2022 with

cyber crime essay in odia

India's Biggest Virtual University Fair

cyber crime essay in odia

Essex Direct Admission Day

Why attend .

cyber crime essay in odia

Don't Miss Out

My Views on Cyber Crime, published on Leading Odia News paper, The Samaja, 14.03.2021

Chandra Sekhar Biswal at Biju Patnaik University of Technology

  • Biju Patnaik University of Technology

Discover the world's research

  • 25+ million members
  • 160+ million publication pages
  • 2.3+ billion citations
  • Recruit researchers
  • Join for free
  • Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up

Ayodhya Ram Mandir Inauguration

  • Bhubaneswar
  • International
  • Photo Gallery
  • Cyber Security

Increasing trend of cyber crime, a headache for Odisha police 

According to the information shared by the Odisha police, in 2019-20, 1,475 cyber crime cases were registered.

Pradeep Pattanayak

  • Pradeep Pattanayak
  • Published: Sunday, 01 January 2023
  • Last updated: 01 January 2023, 10:29 PM IST

Increasing trend of cyber crime, a headache for Odisha police 

Cyber Crime and Economic Offence Police Station

Recommended Stories

Aiims-bhubaneswar opd ticket racket: five miscreants arrested , lady je’s body recovered from locked house in balasore; probe begins, kolkata rape-murder: polygraph test on main accused, 6 others begins, osrtc financial advisor and cao arrested in da case after detection of rs 1.47 crore deposits, bunglow in kerala, odisha man used technology to extort money posing as naxal commander; arrested by malkangiri police, swami lakshmanananda saraswati murder case: demand grows for cbi probe.

The increasing cases of cyber crime in Odisha may emerge as a big challenge for the Odisha police in 2023. 

According to the information shared by the Odisha police, in 2019-20, 1,475 cyber crime cases were registered. The year 2020-21 witnessed a slight increase as a total of 1,931 cases were registered. However, the number of cases crossed 2,000-mark in 2022-23. A total of 2,036 cases were registered in the year. However, it has been alleged that the actual cases of cyber crime are much more than what the police department is sharing. 

During these three years, a total of 5,443 persons fell prey to the cyber fraudsters and lost Rs 91,65,00,000 to them. Of the duped money, the police managed to recover only Rs 1,37,00,000, resulting in people losing their faith in the police. 

When asked, DGP Sunil Bansal ascribed the upward trend of cyber crime to the increase in the digital transactions. 

“Besides digital banking, people’s online trading and online payment are also increasing. This is why there is a surge in the cyber crime cases,” said Bansal. 

“To control the cyber crime, new police stations have been established. We are providing them with the latest technology to deal with cyber crimes. Our officers are also receiving training in and outside the State,” he added. 

If the cyber experts are to be believed, a cyber fraud is taking place in every 10 seconds. A corresponding trend is also being witnessed in Odisha. 

According to these experts, since the cyber criminals keep using new tricks to dupe people, the police should have information not after the crime but before it. They are of the opinion that there should be helpline number so that people can inform the police about the attractive offers cyber criminals are offering. 

“To protect ourselves from such frauds, we have to increase the ambit of our awareness. The cyber fraudsters generally use 20 to 30 fixed modus operandi. So we have to know them,” said Prashant Sahu, cyber expert.    Meanwhile, the Economic Offence Wing (EOW) have busted a job fraud racket and arrested the mastermind identified as Zafar Ahmed (25), a resident of Aligarh, who is an engineer (B Tech) by profession. The racket allegedly duped as many as 50,000 aspirants in five states including Odisha. 

(Reported by Atulya Baut from Bhubaneswar, OTV)  

cyber crime essay in odia

OTV News is now on Whatsapp

Join and get latest news update delivered to you via whatsapp

  • Cyber Crime

Pisces

  • Daily horoscope for Pisces for Aug 24, 2024: Business people might gain profits
  • Aug 23,2024

Aquarius

  • Daily horoscope for Aquarius for Aug 24, 2024: Desired results could be achieved with minor efforts

Capricorn

  • Daily Horoscope for Capricorn, Aug 24, 2024: Progress in studies, business improvements

NEWSLETTERS SIGNUP

morningnews

The Lookout

eveningnews

Hashtag today

Evening primetime

Raison d'etre

Top stories.

SUBHADRA 1st instalment on Sep 17: Odisha Deputy CM Pravati Parida

  • SUBHADRA Yojana
  • SUBHADRA 1st instalment on Sep 17: Odisha Deputy CM Pravati Parida
  • Aug 24,2024

Pigs feed on ‘Arpan Rice’! Outrage erupts over inaction

  • Pigs feed on ‘Arpan Rice’! Outrage erupts over inaction

Potato Mission will be successful in Odisha: CM

  • Potato Mission will be successful in Odisha: CM

BJP, BJD in war of words over action against IPS officers Ashish Singh, DS Kutey 

  • BJP, BJD in war of words over action against IPS officers Ashish Singh, DS Kutey 

AICC to decide next chief of Odisha Pradesh Congress Committee soon

  • Odisha Congress
  • Who will lead Congress in Odisha?

live tv Now playing On OTV

otv live

Testing static taboola ad

Copyright © 2024 - Odisha Television Limited All Rights Reserved.

Cyber Security Essay for Students and Children

Cyber security essay.

Cybersecurity means protecting data, networks, programs and other information from unauthorized or unattended access, destruction or change. In today’s world, cybersecurity is very important because of some security threats and cyber-attacks. For data protection, many companies develop software. This software protects the data. Cybersecurity is important because not only it helps to secure information but also our system from virus attack. After the U.S.A. and China, India has the highest number of internet users.

cyber security essay

Cyber Threats

It can be further classified into 2 types. Cybercrime – against individuals, corporates, etc.and Cyberwarfare – against a state.

Cyber Crime

Use of cyberspace, i.e. computer, internet, cellphone, other technical devices, etc., to commit a crime by an individual or organized group is called cyber-crime. Cyber attackers use numerous software and codes in cyberspace to commit cybercrime. They exploit the weaknesses in the software and hardware design through the use of malware. Hacking is a common way of piercing the defenses of protected computer systems and interfering with their functioning. Identity theft is also common.

Cybercrimes may occur directly i.e,  targeting the computers directly by spreading computer viruses. Other forms include DoS attack. It is an attempt to make a machine or network resource unavailable to its intended users. It suspends services of a host connected to the internet which may be temporary or permanent.

Malware is a software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It usually appears in the form of code, scripts, active content, and other software. ‘Malware’ refers to a variety of forms of hostile or intrusive software, for example, Trojan Horses, rootkits, worms, adware, etc.

Another way of committing cybercrime is independent of the Computer Network or Device. It includes Economic frauds. It is done to destabilize the economy of a country, attack on banking security and transaction system, extract money through fraud, acquisition of credit/debit card data, financial theft, etc.

Hinder the operations of a website or service through data alteration, data destruction. Others include using obscene content to humiliate girls and harm their reputation, Spreading pornography, threatening e-mail, assuming a fake identity, virtual impersonation. Nowadays misuse of social media in creating intolerance, instigating communal violence and inciting riots is happening a lot.

Get the huge list of more than 500 Essay Topics and Ideas

Cyber Warfare

Snowden revelations have shown that Cyberspace could become the theatre of warfare in the 21st century. Future wars will not be like traditional wars which are fought on land, water or air. when any state initiates the use of internet-based invisible force as an instrument of state policy to fight against another nation, it is called cyberwar’.

It includes hacking of vital information, important webpages, strategic controls, and intelligence. In December 2014 the cyberattack a six-month-long cyberattack on the German parliament for which the Sofacy Group is suspected. Another example 2008 cyberattack on US Military computers. Since these cyber-attacks, the issue of cyber warfare has assumed urgency in the global media.

Inexpensive Cybersecurity Measures

  • The simplest thing you can do to up your security and rest easy at night knowing your data is safe is to change your passwords.
  • You should use a password manager tool like LastPass, Dashlane, or Sticky Password to keep track of everything for you. These applications help you to use unique, secure passwords for every site you need while also keeping track of all of them for you.
  • An easy way for an attacker to gain access to your network is to use old credentials that have fallen by the wayside. Hence delete unused accounts.
  • Enabling two-factor authentication to add some extra security to your logins. An extra layer of security that makes it harder for an attacker to get into your accounts.
  • Keep your Softwares up to date.

Today due to high internet penetration, cybersecurity is one of the biggest need of the world as cybersecurity threats are very dangerous to the country’s security. Not only the government but also the citizens should spread awareness among the people to always update your system and network security settings and to the use proper anti-virus so that your system and network security settings stay virus and malware-free.

Customize your course in 30 seconds

Which class are you in.

tutor

  • Travelling Essay
  • Picnic Essay
  • Our Country Essay
  • My Parents Essay
  • Essay on Favourite Personality
  • Essay on Memorable Day of My Life
  • Essay on Knowledge is Power
  • Essay on Gurpurab
  • Essay on My Favourite Season
  • Essay on Types of Sports

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Download the App

Google Play

Logo

Odisha Police’s first cyber crime campaign in all districts

BHUBANESWAR: In a first-of-its-kind initiative in the country, Odisha Police will soon launch massive cyber crime awareness campaigns in all districts of the state. Sources said the campaign will be a bigger version of ‘Paree Pain Katha Tiye’, a successful state-wide awareness initiative against child sexual abuse launched in 2018. “The campaign on cyber safety will be held at the grassroots level. The plan is to roll ‘cyber rathas; (chariots) across the state and spread messages on cyber safety to ensure people do not fall prey to fraudsters,” said sources.

The mass social campaign is expected to be launched both online and offline. Government departments like Schools and Mass Education, Higher Education, Skill Development and Technical Education, Mission Shakti, Women and Child Development along with Anganwadi and Asha workers will be part of the campaign.

Sources said the two-week long campaign will likely be held in all the districts between October 2 and 15. It will be organised during the global Cyber Security Awareness Month, held in October every year.“Videos have been created on different cyber crimes and ways to remain safe. The videos will be played and pamphlets/brochures on cyber safety distributed during the campaign. The initiative will cover students, households, government employees, and others,” said a senior police officer.

As part of the initiative, police will reach out to all age groups and sections of the society. The campaign will be held at a time when the state is witnessing a rise in cyber crimes. Odisha had earned the dubious distinction of reporting the maximum number of incidents of cyber crimes against women in 2021.

As per the National Crime Records Bureau (NCRB), around 565 women became victims of cyber crimes in the state during the period, followed by 458 in Assam and 276 in Uttar Pradesh. Cyber crimes against children also remain a cause of concern in the state. In August, the Crime Branch in collaboration with Unicef launched a three-day training programme - ‘Tools and Techniques for Investigating Cyber Crimes against Children’ at Cyber Complex here.

The aim of the training programme was to enhance the skills and knowledge of police officers which would help them in investigating cyber crimes. The training covered issues like the evolving nature of cyber crimes, technical skills, digital forensics, legal issues, collaboration and information sharing with other agencies, and extending support to the victims, among others.

Unique initiative

The campaign will be a larger version of ‘Paree Pain Katha Tiye’ ‘Cyber rathas’ to be rolled across the state as part of the initiative The campaign is likely to be launched both online and offline

Follow The New Indian Express channel on WhatsApp  

Download the TNIE app to stay with us and follow the latest

Related Stories

Cybercrime: Victimization, Perpetration, and Techniques

  • Published: 10 November 2021
  • Volume 46 , pages 837–842, ( 2021 )

Cite this article

cyber crime essay in odia

  • James Hawdon   ORCID: orcid.org/0000-0002-0273-2227 1  

12k Accesses

6 Citations

5 Altmetric

Explore all metrics

Avoid common mistakes on your manuscript.

The creation of the World Wide Web revolutionized communication. At the turn of the twenty-first century, roughly 413 million people used the internet (Roser & Ortiz-Ospina, 2015 ). A mere 21 years later, nearly 4.7 billion people, or about 60% of the world’s population, actively use the internet (We Are Social, & DataReportal, & Hootsuite, 2021 ). The pace of innovation in information technology, from the introduction of email in the 1960s to the rise of multiple social media platforms in the early 2000s to the rise of the Internet of Things (Iot) and 5 g, has been astonishing. It is now almost inconceivable to imagine life without access to the internet. Yet the IT revolution, like all technological revolutions, has been a dual-edge sword. Indeed, the internet’s many benefits and drawbacks have been discussed in numerous forums, and these discussions will undoubtedly continue as long as we remain dependent on this technology. This special edition of the American Journal of Criminal Justice contributes to those discussions by considering one of the drawbacks: cybercime.

Cybercrime, or the use of computer technology or online networks to commit crimes, ranges from fraud and identity theft to threats and intimidation. Cybercrime and its many manifestations has clearly increased over the past 20 years. For example, cybercrime costs increased from approximately $3 trillion in 2015 to more than $6 trillion in 2021, and these are expected to increase to over $10.5 trillion by 2025 (Morgan, 2020 ). In the U.S. alone, approximately 23 percent of households experience some sort of cybercrime annually (Reinhart, 2018 ; Hawdon et al., 2020 ). Indeed, in the same way that larceny characterized the twentieth century, cybercrime is characterizing the twenty-first century (Albanese, 2005 ). And these facts just reflect the economic costs of cybercrime and do not account for the non-monetary harms caused by cyberviolence. Cyberstalking, online sexual exploitation, cyber-harassment and bullying, threats of violence, and online violent extremism are also commonly committed acts of cyberviolence (FBI, 2021 ).

In many ways, it is unsurprising that cybercrime has increased in recent years. As technology becomes more sophisticated, so do cybercriminals, and cybercriminals now target individuals, businesses, healthcare facilities, educational institutions, and governments. As more people engage in an ever-increasing variety of online activities and more businesses conduct their affairs online, it is predictable that there would be a rise in cybercrime. To use the familiar language of Routine Activity Theory (Cohen & Felson, 1979 ), we have a lot more suitable targets in insufficiently guarded space being victimized by an increasing number motivated offenders. It is also unsurprising that there is a growing body of literature dedicated to cybercrime as scholars scramble to understand the ever-evolving phenomena. Entire journals are now dedicated to its study, and new academic disciplines have been created to try to prevent it. While our understanding of cybercrime has accumulated quickly and impressively, there is so much about cybercrime that we still do not know. This special issue of the A merican Journal of Criminal Justice offers nine new articles to help fill that knowledge gap.

The articles included in this issue reflect three broad areas of cybercrime research: cybercrime victimization, cybercrime perpetration, and techniques and facilitators of cybercrime. While there is some overlap, the issue includes three papers focused on each of these three areas.

The first area covered in the special issue focuses on cybercrime victimization. This area has generated the most research to date. In part because victims of cybercrime are relatively easy to find, considerable research has been conducted on cybervictimization across a variety of cybercrimes. Three of the articles in this special issue focus on cybervictimization, and they add to the literature in interesting ways by providing cross-national perspectives, building on theoretical traditions, or providing systematic summaries of the state of field at this time.

The first article in this section by Michelle Wright and a team of colleagues investigates how adolescent from China, Cyprus, the Czech Republic, India, Japan, and the United States explain being a victim of cyberbully. The investigation compares if how adolescents explain victimization varies by setting (private vs. public), medium (offline vs cyber), and severity and if cultural differences alter these relationships. Their findings suggest the need for prevention and intervention efforts to consider the role of setting, medium, severity, and cultural values if they are to be successful.

The second paper focusing on victimization builds on the frequent finding that problematic social media use is associated with negative life experiences and provides empirical support for a theoretical link between problematic social media use and cybervictimization. The analysis, conducted by colleagues Eetu Marttila, Aki Koivula, and Pekka Räsänen, is framed in Routine Activity Theory/Lifestyle-Exposure Theory. The results indicate that not only is problematic social media use strongly correlated with cybervictimization in a between-subject analysis, but within-subject analyses also reveal that problematic social media use has a cumulative effect on victimization.

The third paper bridges research on cybercrime victimization and cybercrime perpetration and provides a glimpse at the state of knowledge about a specific form of cyberviolence. Catherine Marcum and George Higgins conduct a systematic review of literature investigating both offending and victimization of cyberstalking, cyberdating abuse, and interpersonal electronic surveillance. Using a number of electronic databases, the authors focus on 31 studies to identify correlates of involvement in these cybercrimes. Victims are disproportionately female. Other correlates of victimization include overall social media use, risky online behavior, and negative external factors such as being attached to abusive peers. Correlates of perpetration provide support for a number of leading criminological theories as perpetrators tend to have low levels of self-control, associate with delinquent peers, and have low levels of parental supervision. As more research is conducted, there is a great need for more systematic literature reviews so we can begin to better refine our understanding and identify the theoretical approaches that provide the most insight into the world of cybercrime.

There are another three articles included in this special issue that focus on cybercrime perpetration. All three articles test traditional criminological theories and find support for them. In the first, Adam Bossler uses Sykes and Matza’s ( 1957 ) techniques of neutralization to examine the effects of techniques of neutralization on college students’ willingness to commit cybercrime, specifically hacking websites to deface them or compromise foreign and domestic financial and government targets. An overall techniques of neutralization scale significantly predicts being willing to commit cyberattacks even after controlling for other relevant factors. In addition to the theoretical implications of finding strong support for Sykes and Matza’s framework, the findings also have implications for situational crime prevention efforts aimed at removing excuses for offenders.

In another article focusing on perpetration, Thomas Dearden and Katalin Parti use a national online sample of 1,109 participants and find strong support for social learning theory as measures of both online and offline social learning correlate with a measure of cyber-offending. However, the authors also argue that self-control will interact with social learning variables to further influence the likelihood of cyber-offending. Overall, they find that both social learning and self-control, individually and as an interaction, are good predictors of cyber-offending.

In the final article dedicated to investigating the perpetration of cybercrime, Ashley Reichelmann and Matthew Costello use a nationally representative sample to explore how various dimensions of American national identity relate to producing online hate materials. The analysis reveals that higher levels of salience and public self-regard are weakly related to producing online hate. However, the findings suggest that understanding the nuances of “what it means to be American” is important for fully understanding the phenomenon of cyberhate, especially in this polarizing time when what it means to “be American” is frequently questioned.

Another three articles deal with perpetrating cybercrimes or “pseudo-cybercrimes,” but their focus is on how these crimes are committed. That is, the investigations deal with using the Dark Web or the surface web to make illegal or pseudo-legal purchases of illegal or quasi-legal substances. In the first paper in the section, Eric Jardine provides a crime script for purchasing drugs on the Dark Web. The script involves four generic stages (i.e. Informational Accumulation; Account Formation; Market Exchange; Delivery/Receipt) and provides an opportunity to review known law enforcement interventions that have effectively targeted each stage of the script to reduce the use of these online markets. The paper highlights numerous steps that law enforcement could take to effectively reduce the illegal selling and purchasing of drugs on the Dark Web.

Next, Robert Perdue engages in green criminology and focuses on the illegal trade of endangered species. Noting that regulating this trade is a critical, and very difficult, challenge for conservationists and law enforcement agents, Perdue examines the role the Internet plays in critically endangered plant transactions, but instead of focusing on the Dark Web, he investigates eBay to understand the extent to which such trades occur in plain sight. He finds that nearly a third of the critically endangered plant species examined were for sale in some form on eBay. Yet, despite the evidence that there is a high degree of open trading in these species, the complexity of the international legal frameworks regulating these transactions makes it difficult to ascertain their legality. Nevertheless, at least a subset of these sales are probably unlawful.

Finally, J. Mitchell Miller and Holly Ventura Miller provide insight into the computer-facilitated gray market of pseudo-legal marijuana sales in Los Vegas, Nevada. The ethnographic study reveals how various cannabis products are illegally diverted from legal markets to the gray market, and how brokers use the Internet in clever ways to advertise their products and services to a public that is likely unaware that they are engaging in illegal activities by skirting the regulations and tight control of the legal market.

Taken together, these three papers highlight the tremendous difficulties with regulating e-commerce. While the Dark Web provides an environment to conduct illegal transactions with minimal risk, it turns out that the Dark Web may be unnecessary for many illegal cyber-purchases. Given the surface web is convenient, widely available, and scarcely policed, many cybercriminals simply commit their crimes in the open. Using the language of Routine Activity Theory again, the internet—Dark or Surface—is an environment largely devoid of capable guardians.

As a whole, I believe these nine papers speak to the current state and future promise of cybercriminology. Currently, we are building a large body of empirical studies that speak to patterns of victimization and perpetration. With respect to victimization, we have learned a lot about who is likely to be victimized and how the patterns of victimization vary by type of cybercrime. We also have a good understanding of the activities that increase the likelihood of victimization, the emotional and financial costs of being a victim, and how people view victims depending on the setting and type of victimization. The body of evidence supporting a slightly modified version of Routine Activity Theory/Lifestyle-Exposure Theory is increasingly impressive, and the papers by Marttila, Koivula, and Räsänen as well as the article by Marcum and Higgins offer additional support for aspects of this theoretical approach.

Similarly, our understanding of cybercrime perpetration has expanded exponentially in recent years. While finding samples of cybercriminals is always a challenge, the growing body of evidence suggests that the behavior of cybercriminals is largely explained by the same set of factors that can account for the behavior of more traditional criminals. That is, cybercriminals tend to have low levels of self and social control, are largely unsupervised, experience strains, and learn the how, when, and why of their crimes from their associates. The papers in this issue offer additional support for techniques of neutralization, social learning theory, and self-control theory. While there are nuanced differences in how some criminogenic factors play out in the virtual and offline worlds, our existing theories appear to be robust as many of our theories apply to both online and offline criminal behavior. A number of the differences that exist largely relate to the asynchronous nature of many online interactions. The fact that online interactions can occur synchronously as well as asynchronously expands our networks and provide additional opportunities for others beyond our immediate environment to influence us and for us to commit crimes. The full ramifications of these changes in social networks, criminogenic forces, and criminal opportunities are not understood; however, we understand these far better today than we did even just a few years ago.

We also have a far greater understanding of the techniques of committing cybercrimes. We know considerably more about the use of the Dark Web to find and purchase illegal goods and services, and we have learned that the Surface Web plays a significant role in computer-dependent crimes. Moreover, as the article by Miller and Miller highlights, information technology has helped blur the line between legal, pseudo-legal, and illegal behaviors. What work in this area really highlights is how difficult it is to monitor and police the internet. While there is certainly social control exercised on the internet, there are limits to the effectiveness of this control (see Hawdon et al., 2017 ). Yet, by understanding the patterns of victimization, the underlying causes of perpetration, and the techniques that facilitate cybercrime, we become better armed in designing strategies to prevent it, defend against it, mitigate its adverse effects, and prosecute those who commit it. All of the articles included in this issue further that understanding.

The Special Issue

The process of selecting the articles for this special issue was perhaps unusual but also rather intensive. The process began by me inviting a group of scholars to submit manuscripts for the special issue. I selected these scholars because I knew of their work and was confident they would submit quality papers that covered a wide range of topics in the area of cybercrime. After discussing their planned submissions with the authors to assure there would be good topic coverage, the authors submitted their paper. An anonymous scholar and I reviewed these initial submissions (the anonymous scholar served as a typical double-blind reviewer). Each contributing author also reviewed one or two of the included articles. Authors then revised their work based on the reviewers’ comments and resubmitted the papers. Each contributing author was then asked to read all nine revised papers. Then, the authors and I took advantage of the brief pause in the COVID-19 pandemic and gathered for a two-day workshop in Asheville, North Carolina as part of the Center for Peace Studies and Violence Prevention’s annual research workshop program. The lone exception to this was our Finnish colleagues who were unable to get a special visa to visit the U.S. at that time. These colleagues joined the workshop via Zoom. The authors/workshop participants then discussed and provided feedback on all of the articles. The authors then made final revisions to their papers based on these discussions. Thus, these papers have been through three rounds of revisions. As the editor of the special edition, I am proud of the finished product.

Albanese, J. S. (2005). Fraud: The characteristic crime of the 21st Century. Trends in Organized Crime, 8 , 5–16.

Article   Google Scholar  

Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44 (4), 588–608.

Federal Bureau of Investigation. (2021). 2020 Internet crime report . U.S. Government Printing Office.

Google Scholar  

Hawdon, J., Costello, C., Ratliff, T., Hall, L., & Middleton, J. (2017). Conflict management styles and cybervictimization: An extension of routine activity theory. Sociological Spectrum, 37 (4), 250–266.

Hawdon, J., Parti, K., & Dearden, T. E. (2020). Cybercrime in America amid COVID-19: The initial results from a natural experiment. American Journal of Criminal Justice, 45 , 546–562.

Morgan, S. (2020). Cybercrime to cost the World $10.5 Trillion Annually by 2025. Cybercrime Magazine , November 13, 2020. https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/

Reinhart, R. J. (2018). One in four Americans have experienced cybercrime. Gallup Politics . https://news.gallup.com/poll/245336/one-four-americans-experienced-cybercrime.aspx

Roser, M. H. R. & Ortiz-Ospina, E. (2015). "Internet". Published online at OurWorldInData.org. Retrieved from: ' https://ourworldindata.org/internet ' [Online Resource]

Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22 (6), 664–670.

We Are Social, & DataReportal, & Hootsuite. (2021). Global digital population as of January 2021 (in billions) [Graph]. In  Statista . Retrieved September 24, 2021, from https://www.statista.com/statistics/617136/digital-population-worldwide/

Download references

Author information

Authors and affiliations.

Virginia Tech, Blacksburg, VA, USA

James Hawdon

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to James Hawdon .

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Hawdon, J. Cybercrime: Victimization, Perpetration, and Techniques. Am J Crim Just 46 , 837–842 (2021). https://doi.org/10.1007/s12103-021-09652-7

Download citation

Received : 03 July 2021

Accepted : 03 August 2021

Published : 10 November 2021

Issue Date : December 2021

DOI : https://doi.org/10.1007/s12103-021-09652-7

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Find a journal
  • Publish with us
  • Track your research

Examples

Essay on Cyber Crime

Essay generator.

In the digital age, the rapid advancement of technology has reshaped the way we live, work, and interact. However, alongside the countless benefits, this evolution has given rise to a darker phenomenon known as cyber crime. Cyber crime encompasses a wide range of malicious activities carried out through digital means, affecting individuals, organizations, and even nations. This essay delves into the intricacies of cyber crime, exploring its types, causes, impacts, and measures to combat it, offering a comprehensive overview for students participating in essay writing competitions.

Cyber Crime

Cyber crime refers to any criminal activity that involves a computer, networked device, or a network. While most cyber crimes are carried out to generate profit for the criminals, some are done to harm or intimidate individuals, governments, or entire societies. The anonymity, vast reach, and speed of the internet have made cyber crime a highly effective and dangerous tool in the hands of criminals.

Types of Cyber Crime

Cyber crime can be broadly categorized into three types: crimes against individuals, crimes against property, and crimes against governments or society at large.

  • Phishing: Phishing involves sending fraudulent emails or messages that appear to be from legitimate sources to deceive individuals into revealing sensitive information, such as passwords, credit card numbers, or personal details.
  • Ransomware: Ransomware is a type of malware that encrypts a victim’s files or data, rendering them inaccessible. The attacker demands a ransom payment from the victim to provide the decryption key.
  • Malware: Malware (malicious software) includes viruses, Trojans, worms, and spyware designed to infect and compromise computer systems, steal data, or disrupt operations.
  • Identity Theft: Cybercriminals steal personal information, such as Social Security numbers or financial data, to impersonate victims for financial gain, fraudulent activities, or accessing accounts.
  • Cyberbullying: Cyberbullying involves using digital platforms, such as social media or messaging apps, to harass, threaten, or intimidate individuals, often leading to emotional and psychological distress.
  • Online Scams: Various online scams deceive individuals into parting with their money, including advance-fee fraud, lottery scams, and romance scams. These scams exploit trust and gullibility.
  • Data Breaches: Data breaches occur when cybercriminals gain unauthorized access to databases or systems, exposing sensitive information, such as customer data, financial records, or trade secrets.
  • Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks: These attacks overwhelm a target system, website, or network with excessive traffic, rendering it unavailable to legitimate users.
  • Cyber Espionage: State-sponsored or corporate espionage involves infiltrating computer systems to steal sensitive information, trade secrets, or government intelligence.
  • Child Exploitation: Child exploitation includes online activities like child pornography, grooming, or sextortion, targeting minors and causing severe harm to victims.
  • Hacking and Unauthorized Access: Unauthorized access to computer systems, networks, or accounts for the purpose of data theft, vandalism, or disruption is considered hacking.
  • Financial Cybercrimes: Financial cybercrimes involve fraud, embezzlement, or theft of funds through various digital means, such as credit card fraud, online banking fraud, or investment scams.
  • Online Harassment and Stalking: Cybercriminals engage in online harassment, stalking, or doxxing (publishing private information) to harass and intimidate victims.
  • Social Engineering: Social engineering techniques manipulate individuals into divulging confidential information or performing actions that compromise security, often through impersonation or pretexting.
  • Botnets and Cyber Attacks: Cybercriminals create botnets, networks of compromised devices, to launch coordinated cyberattacks, such as spam distribution, information theft, or credential stuffing attacks.
  • Cryptojacking: Cryptojacking involves using a victim’s computer or device to mine cryptocurrencies without their consent or knowledge, causing system slowdowns and increased energy consumption.
  • Online Copyright Infringement: Copyright infringement on the internet involves illegally sharing or distributing copyrighted content, such as movies, music, or software, without authorization.
  • Deepfake and Manipulated Media: Deepfake technology creates convincing but fabricated a, video, or text content, leading to misinformation, impersonation, and reputational harm.

Causes of Cyber Crime

Several factors contribute to the prevalence of cyber crime, including:

  • Anonymity: The internet provides a level of anonymity that emboldens criminals, making it challenging to trace illegal activities back to the perpetrators.
  • Global Reach: Cyber criminals can operate from any location, targeting victims worldwide without ever crossing physical borders.
  • Technological Complexity: The complexity and rapid evolution of technology can outpace security measures, leaving vulnerabilities that can be exploited.
  • Lack of Awareness: Many users are unaware of the risks associated with their online activities, making them easy targets for cyber criminals.

Impacts of Cyber Crime

The effects of cyber crime are vast and varied, affecting individuals, organizations, and nations.

  • Financial Loss: Cyber crime costs the global economy billions of dollars annually through fraud, theft of intellectual property, and other financial crimes.
  • Psychological Impact: Victims of cyber crime, such as cyberbullying or identity theft, can experience significant emotional distress.
  • Reputation Damage: Businesses and governments can suffer reputational damage due to data breaches, undermining public trust.
  • National Security Threats: Cyber attacks on critical infrastructure can pose significant threats to national security, potentially leading to chaos and crisis.

Combating Cyber Crime

Addressing the challenge of cyber crime requires a multi-faceted approach, involving individuals, businesses, governments, and international bodies.

  • Legislation: Implementing comprehensive cyber crime laws and regulations is crucial to defining and deterring illegal online activities.
  • Cybersecurity Measures: Individuals and organizations must adopt robust cybersecurity practices, including the use of firewalls, antivirus software, and strong passwords.
  • Education and Awareness: Raising awareness about the risks of cyber crime and promoting safe online behaviors can significantly reduce vulnerability.
  • International Cooperation: Cyber crime is a global issue that necessitates international collaboration to develop strategies for prevention, investigation, and prosecution.

Future Directions

As technology continues to evolve, so too will the nature of cyber crime. The rise of artificial intelligence, the Internet of Things (IoT), and other emerging technologies will introduce new vulnerabilities and challenges. Future efforts to combat cyber crime must focus on advancing cybersecurity technologies, enhancing international legal frameworks, and fostering a culture of security awareness among all internet users.

In conclusion, Cyber crime is a pervasive issue that poses significant challenges to the security, privacy, and well-being of individuals and societies worldwide. Understanding the complexities of cyber crime is the first step toward developing effective strategies to combat it. By fostering collaboration among various stakeholders and embracing a proactive approach to cybersecurity, we can hope to mitigate the risks associated with our increasingly connected world. For students aspiring to make a difference, participating in essay writing competitions on topics such as cyber crime not only raises awareness but also encourages the development of innovative solutions to safeguard our digital future.

Twitter

Text prompt

  • Instructive
  • Professional

Generate an essay on the importance of extracurricular activities for student development

Write an essay discussing the role of technology in modern education.

Drishti IAS

  • Classroom Programme
  • Interview Guidance
  • Online Programme
  • Drishti Store
  • My Bookmarks
  • My Progress
  • Change Password
  • From The Editor's Desk
  • How To Use The New Website
  • Help Centre

Achievers Corner

  • Topper's Interview
  • About Civil Services
  • UPSC Prelims Syllabus
  • GS Prelims Strategy
  • Prelims Analysis
  • GS Paper-I (Year Wise)
  • GS Paper-I (Subject Wise)
  • CSAT Strategy
  • Previous Years Papers
  • Practice Quiz
  • Weekly Revision MCQs
  • 60 Steps To Prelims
  • Prelims Refresher Programme 2020

Mains & Interview

  • Mains GS Syllabus
  • Mains GS Strategy
  • Mains Answer Writing Practice
  • Essay Strategy
  • Fodder For Essay
  • Model Essays
  • Drishti Essay Competition
  • Ethics Strategy
  • Ethics Case Studies
  • Ethics Discussion
  • Ethics Previous Years Q&As
  • Papers By Years
  • Papers By Subject
  • Be MAINS Ready
  • Awake Mains Examination 2020
  • Interview Strategy
  • Interview Guidance Programme

Current Affairs

  • Daily News & Editorial
  • Daily CA MCQs
  • Sansad TV Discussions
  • Monthly CA Consolidation
  • Monthly Editorial Consolidation
  • Monthly MCQ Consolidation

Drishti Specials

  • To The Point
  • Important Institutions
  • Learning Through Maps
  • PRS Capsule
  • Summary Of Reports
  • Gist Of Economic Survey

Study Material

  • NCERT Books
  • NIOS Study Material
  • IGNOU Study Material
  • Yojana & Kurukshetra
  • Chhatisgarh
  • Uttar Pradesh
  • Madhya Pradesh

Test Series

  • UPSC Prelims Test Series
  • UPSC Mains Test Series
  • UPPCS Prelims Test Series
  • UPPCS Mains Test Series
  • BPSC Prelims Test Series
  • RAS/RTS Prelims Test Series
  • Daily Editorial Analysis
  • YouTube PDF Downloads
  • Strategy By Toppers
  • Ethics - Definition & Concepts
  • Mastering Mains Answer Writing
  • Places in News
  • UPSC Mock Interview
  • PCS Mock Interview
  • Interview Insights
  • Prelims 2019
  • Product Promos

Science & Technology

Make Your Note

Cyber Security

  • 10 Apr 2019
  • 13 min read
  • GS Paper - 3
  • Cyber Warfare
  • Challenges to Internal Security Through Communication Networks

According to EY’s latest Global Information Security Survey (GISS) 2018-19 – India edition, one of the highest number of cyber threats have been detected in India, and the country ranks second in terms of targeted attacks. Although Banking and Telecom are the most attacked sectors but Manufacturing, Healthcare, and Retail have also faced a significant number of cyber attacks.

  • Cyber Security is protecting cyber space including critical information infrastructure from attack, damage, misuse and economic espionage.
  • Cyber Space: A global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.
  • Critical Information Infrastructure: According to Section 70(1) of the Information Technology Act, CII is defined as a “computer resource, the incapacitation or destruction of which, shall have debilitating impact on national security, economy, public health or safety”.
  • Cyber Attack: It is a malicious and deliberate attempt by an individual or organization to breach the information system of another individual or organization.

Motives behind Cyber Attacks

  • To seek commercial gain by hacking banks and financial institutions.
  • To attack critical assets of a nation.
  • To penetrate into both corporate and military data servers to obtain plans and intelligence.
  • To hack sites to virally communicate a message for some specific campaign related to politics and society.

Types of Cyber Attacks

  • Malware, short for malicious software refers to any kind of software that is designed to cause damage to a single computer, server, or computer network. Ransomware, Spy ware, Worms, viruses, and Trojans are all varieties of malware.
  • Phishing: It is the method of trying to gather personal information using deceptive e-mails and websites.
  • Denial of Service attacks: A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.
  • Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when attackers insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can filter and steal data.
  • SQL (pronounced “sequel”) stands for Structured Query Language, a programming language used to communicate with databases.
  • Many of the servers that store critical data for websites and services use SQL to manage the data in their databases.
  • A SQL injection attack specifically targets such kind of servers, using malicious code to get the server to divulge information it normally wouldn’t.
  • Similar to an SQL injection attack, this attack also involves injecting malicious code into a website, but in this case the website itself is not being attacked.
  • Instead the malicious code the attacker has injected, only runs in the user's browser when they visit the attacked website, and it goes after the visitor directly, not the website.
  • Social engineering is an attack that relies on human interaction to trick users into breaking security procedures in order to gain sensitive information that is typically protected.

Latest Cases

  • WannaCry : It was a ransomware attack that spread rapidly in May, 2017. The ransomware locked users’ devices and prevented them from accessing data and software until a certain ransom was paid to the criminals. Top five cities in India (Kolkata, Delhi, Bhubaneswar, Pune and Mumbai) got impacted due to it.
  • Mirai Botnet: Mirai is malware that infects smart devices that run on ARC processors, turning them into a network of remotely controlled bots or zombies. This network of bots, called a botnet, is often used to launch Distributed Denial of Service (DDoS) attacks. In September 2016, Mirai malware launched a DDoS attack on the website of a well-known security expert.

Components of Cyber Security

  • Application Security: It encompasses measures or counter-measures that are taken during an application’s development process to protect it from threats that can come through flaws in the app design, development, deployment, upgrade or maintenance.
  • Information security: It is related to the protection of information from an unauthorized access to avoid identity theft and to protect privacy.
  • Network Security: It includes activities to protect the usability, reliability, integrity and safety of the network.
  • Disaster Recovery Planning: It is a process that includes performing risk assessment, establishing priorities, developing recovery strategies in case of an attack.

Need for Cyber Security

  • For Individuals: Photos, videos and other personal information shared by an individual on social networking sites can be inappropriately used by others, leading to serious and even life-threatening incidents.
  • For Business Organizations: Companies have a lot of data and information on their systems. A cyber attack may lead to loss of competitive information (such as patents or original work), loss of employees/customers private data resulting into complete loss of public trust on the integrity of the organization.
  • For Government: A local, state or central government maintains huge amount of confidential data related to country (geographical, military strategic assets etc.) and citizens. Unauthorized access to the data can lead to serious threats on a country.

International Mechanisms:

  • The International Telecommunication Union (ITU) is a specialized agency within the United Nations which plays a leading role in the standardization and development of telecommunications and cyber security issues.
  • Budapest Convention on Cybercrime: It is an international treaty that seeks to address Internet and computer crime (cybercrime) by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations. It came into force on 1 July 2004. India is not a signatory to this convention.
  • Internet Governance Forum (IGF): It brings together all stakeholders i.e. government, private sector and civil society on the Internet governance debate. It was first convened in October–November 2006.
  • Internet Corporation for Assigned Names and Numbers (ICANN): It is a non-profit organization responsible for coordinating the maintenance and procedures of several databases related to the namespaces and numerical spaces of the Internet, ensuring the network's stable and secure operation. It has its headquarters in Los Angeles, U.S.A.

Laws related to Cyber Security in India

Information Technology Act, 2000

  • The act regulates use of computers, computer systems, computer networks and also data and information in electronic format.
  • Tampering with computer source documents.
  • Hacking with computer system
  • Act of cyber terrorism i.e. accessing a protected system with the intention of threatening the unity, integrity, sovereignty or security of country.
  • Cheating using computer resource etc.

Strategies under National Cyber Policy, 2013

  • Creating a secure cyber ecosystem.
  • National Computer Emergency Response Team (CERT-in) functions as the nodal agency for coordination of all cyber security efforts, emergency responses, and crisis management.
  • Securing e-governance by implementing global best practices, and wider use of Public Key Infrastructure.
  • NCIIPC has been created under Information Technology Act, 2000 to secure India’s critical information infrastructure. It is based in New Delhi.
  • Promoting cutting edge research and development of cyber security technology.
  • Human Resource Development through education and training programs to build capacity.
  • Increased use of mobile technology and internet by people.
  • Proliferation of Internet of Things (IoT) and lack of proper security infrastructure in some devices.
  • Cyberspace has inherent vulnerabilities that cannot be removed.
  • Internet technology makes it relatively easy to misdirect attribution to other parties.
  • It is generally seen that attack technology outpaces defence technology.
  • Lack of awareness on Cyber security.
  • Lack of Cyber security specialists.
  • Increased use of cyberspace by terrorists.

Recent Steps taken by Government

  • Cyber Surakshit Bharat Initiative: It was launched in 2018 with an aim to spread awareness about cybercrime and building capacity for safety measures for Chief Information Security Officers (CISOs) and frontline IT staff across all government departments.
  • National Cyber security Coordination Centre (NCCC): In 2017, the NCCC was developed. Its mandate is to scan internet traffic and communication metadata (which are little snippets of information hidden inside each communication) coming into the country to detect real-time cyber threats.
  • Cyber Swachhta Kendra: In 2017, this platform was introduced for internet users to clean their computers and devices by wiping out viruses and malware.
  • Training of 1.14 Lakh persons through 52 institutions under the Information Security Education and Awareness Project (ISEA) – a project to raise awareness and to provide research, education and training in the field of Information Security.
  • International cooperation: Looking forward to becoming a secure cyber ecosystem, India has joined hands with several developed countries like the United States, Singapore, Japan, etc. These agreements will help India to challenge even more sophisticated cyber threats.

Way Forward

  • Real-time intelligence is required for preventing and containing cyber attacks.
  • Periodical ‘Backup of Data’ is a solution to ransomware.
  • Using Artificial Intelligence (AI) for predicting and accurately identifying attacks.
  • Using the knowledge gained from actual attacks that have already taken place in building effective and pragmatic defence.
  • Increased awareness about cyber threats for which digital literacy is required first.
  • India needs to secure its computing environment and IoT with current tools, patches, updates and best known methods in a timely manner.
  • The need of the hour for Indian government is to develop core skills in cyber security, data integrity and data security fields while also setting stringent cyber security standards to protect banks and financial institutions.

cyber crime essay in odia

  • India Languages
  • Secondary School

Cyber crime essay in odia

vikasbarman272

ଓଡିଆରେ ସାଇବର ଅପରାଧ ପ୍ରବନ୍ଧ |

ସାଇବର ଅପରାଧ ଆମ ସମାଜ ପାଇଁ ବ growing ୁଥିବା ବିପଦ। ଏହା ଯେକ any ଣସି ପ୍ରକାରର ଅପରାଧ ଯାହା କମ୍ପ୍ୟୁଟର କିମ୍ବା ଇଣ୍ଟରନେଟ୍ ବ୍ୟବହାର କରି କରାଯାଇଥାଏ | ଏଥିରେ ପରିଚୟ ଚୋରି, ଠକେଇ, ସାଇବର ଷ୍ଟଲ୍କିଂ ଏବଂ ହ୍ୟାକିଂ ଅନ୍ତର୍ଭୁକ୍ତ ହୋଇପାରେ |

ସାଇବର ଅପରାଧ ଏକ ଗୁରୁତର ସମସ୍ୟା କାରଣ ଏହା ପୀଡିତଙ୍କ ଉପରେ ଘାତକ ପ୍ରଭାବ ପକାଇପାରେ | ଉଦାହରଣ ସ୍ୱରୂପ, ପରିଚୟ ଚୋରି ଜଣେ ବ୍ୟକ୍ତିର କ୍ରେଡିଟ୍ ସ୍କୋରକୁ ନଷ୍ଟ କରିପାରେ ଏବଂ ଚାକିରି କିମ୍ବା loan ଣ ପାଇବା କଷ୍ଟକର ହୋଇପାରେ | ଜାଲିଆତି ଲୋକଙ୍କୁ ହଜାରେ ଟଙ୍କା ଖର୍ଚ୍ଚ କରିପାରେ | ସାଇବର ଷ୍ଟଲ୍କିଂ ପୀଡିତମାନଙ୍କୁ ନିଜକୁ ଅସୁରକ୍ଷିତ ମନେ କରିପାରେ ଏବଂ ଶାରୀରିକ ହିଂସା ମଧ୍ୟ କରିପାରେ | ଏବଂ ହ୍ୟାକିଂ ବ୍ୟବସାୟ ଏବଂ ସଂଗଠନକୁ ବାଧା ଦେଇପାରେ, ଏବଂ ସମ୍ବେଦନଶୀଳ ତଥ୍ୟ ଚୋରି ମଧ୍ୟ କରିପାରେ |

ସାଇବର ଅପରାଧରୁ ନିଜକୁ ରକ୍ଷା କରିବା ପାଇଁ ଅନେକଗୁଡ଼ିଏ ଜିନିଷ ଅଛି | ପ୍ରଥମେ, ଆମେ ଅନଲାଇନରେ ଅଂଶୀଦାର କରୁଥିବା ସୂଚନା ବିଷୟରେ ଯତ୍ନବାନ ହେବା ଆବଶ୍ୟକ | ଅପରିଚିତ ଲୋକଙ୍କୁ ଆମେ କେବେବି ଆମର ବ୍ୟକ୍ତିଗତ ସୂଚନା ଦେବା ଉଚିତ୍ ନୁହେଁ, ଏବଂ ଆମେ ସୋସିଆଲ ମିଡିଆରେ ଯାହା ପୋଷ୍ଟ କରୁଛୁ ସେଥିପ୍ରତି ଧ୍ୟାନ ଦେବା ଉଚିତ୍ |

ଦ୍ୱିତୀୟତ , ଆମକୁ ଦୃ ପାସୱାର୍ଡ ବ୍ୟବହାର କରିବା ଏବଂ ସେଗୁଡ଼ିକୁ ସୁରକ୍ଷିତ ରଖିବା ଆବଶ୍ୟକ | ବିଭିନ୍ନ ଖାତା ପାଇଁ ଆମେ ବିଭିନ୍ନ ପାସୱାର୍ଡ ବ୍ୟବହାର କରିବା ଉଚିତ ଏବଂ ଆମେ ସେମାନଙ୍କୁ ନିୟମିତ ପରିବର୍ତ୍ତନ କରିବା ଉଚିତ |

ତୃତୀୟତ we, ଆମେ କେଉଁ ଇମେଲ ଖୋଲୁ ଏବଂ କେଉଁ ୱେବସାଇଟ୍ ପରିଦର୍ଶନ କରୁ ସେଥିପ୍ରତି ଧ୍ୟାନ ଦେବା ଆବଶ୍ୟକ | ଆମେ କଦାପି ଅଜ୍ଞାତ ପ୍ରେରକଙ୍କ ଠାରୁ ଇମେଲ ଖୋଲିବା ଉଚିତ ନୁହେଁ, ଏବଂ ଇମେଲ କିମ୍ବା ୱେବସାଇଟରେ ଲିଙ୍କ ଉପରେ କ୍ଲିକ୍ କରିବା ଠାରୁ ଦୂରେଇ ରହିବା ଉଚିତ |

ଶେଷରେ, ଆମ କମ୍ପ୍ୟୁଟର ଏବଂ ମୋବାଇଲ୍ ଡିଭାଇସରେ ସୁରକ୍ଷା ସଫ୍ଟୱେର୍ ଇନଷ୍ଟଲ୍ ଏବଂ ଅପଡେଟ୍ କରିବା ଆବଶ୍ୟକ | ଏହା ଆମକୁ ମାଲୱେର୍ ଏବଂ ଅନ୍ୟ ସାଇବର ବିପଦରୁ ରକ୍ଷା କରିବାରେ ସାହାଯ୍ୟ କରିବ |

ସାଇବର ଅପରାଧର ମୁକାବିଲା ପାଇଁ ଓଡିଶା ସରକାର ଅନେକ ପଦକ୍ଷେପ ନେଇଛନ୍ତି। 2019 ରେ ସରକାର ସାଇବର ଅପରାଧର ତଦନ୍ତ ତଥା ମାମଲା ରୁଜୁ କରିବା ପାଇଁ ଓଡିଶା ସାଇବର କ୍ରାଇମ ସେଲ (OCCC) ଆରମ୍ଭ କରିଥିଲେ। ଓସିସିସିରେ ଉଚ୍ଚ ପ୍ରଶିକ୍ଷିତ ପୋଲିସ ଅଧିକାରୀ ଏବଂ ଫୋରେନସିକ୍ ବିଶେଷଜ୍ଞଙ୍କ ଏକ ଟିମ୍ ଅଛି, ଯେଉଁମାନେ ସାଇବର ଅପରାଧର ଅନୁସନ୍ଧାନ ପାଇଁ ଅତ୍ୟାଧୁନିକ ଜ୍ଞାନକ technology ଶଳ ସହିତ ସଜ୍ଜିତ ଅଟନ୍ତି।

ଜନସାଧାରଣଙ୍କୁ ସାଇବର ଅପରାଧ ତଥା ନିଜକୁ କିପରି ରକ୍ଷା କରାଯାଇପାରିବ ସେ ବିଷୟରେ ଶିକ୍ଷା ଦେବା ପାଇଁ ଓସିସିସି ଅନେକ ସଚେତନତା ଅଭିଯାନ ମଧ୍ୟ ଆରମ୍ଭ କରିଛି। ଏହି ଅଭିଯାନ ପ୍ରିଣ୍ଟ, ଟେଲିଭିଜନ ଏବଂ ସୋସିଆଲ ମିଡିଆ ସମେତ ବିଭିନ୍ନ ମାଧ୍ୟମ ମାଧ୍ୟମରେ କରାଯାଇଛି |

For more questions

brainly.in/question/6608135

brainly.in/question/56488308

New questions in India Languages

IMAGES

  1. cyber crime essay in odia || ସାଇବର ଅପରାଧ ରଚନା || saibar apradh essay || cyber crime odia rachana

    cyber crime essay in odia

  2. Cyber crime essay in odia

    cyber crime essay in odia

  3. cyber crime essay in odia, cyber safety essay odia, cyber security essay in odia

    cyber crime essay in odia

  4. ଭାବେ ବୃଦ୍ଧି ପାଇଛି

    cyber crime essay in odia

  5. cyber safety essay in odia || cyber suraksha odia essay || cyber

    cyber crime essay in odia

  6. cyber crime essay in odia| ଭାବେ ବୃଦ୍ଧି ପାଇଛି

    cyber crime essay in odia

COMMENTS

  1. cyber crime essay in odia || ସାଇବର ଅପରାଧ ରଚନା || saibar apradh essay

    #odiaessay#cybercrime#cybercrimeessay#odiarachana#englishessayThis video contains:-study essay speechcyber crime essay in odiacyber crime odia rachanasaibar ...

  2. ଭାବେ ବୃଦ୍ଧି ପାଇଛି

    ଭାବେ ବୃଦ୍ଧି ପାଇଛି | | cyber crime essay in odiayour queries:Cyber crime essay in odia pdfCyber crime essay in odia for class 10Cyber crime essay in odia for ...

  3. Cyber crime essay in odia

    Cyber crime essay in odia Cyber crime odia essay Cyber crime essay Cyber aparadha odia rachanaEssay on cyber crime Odia essay Odia speech #cybercrime#cyberap...

  4. ️Essay on Cybercrime: Free Samples in 100, 200, 300 Words

    Essay on Cybercrime in 100 Words. Cybercrime involves illegal activities like hacking, ransomware, cyberbullying, online fraud, etc. People who are involved in cybercrime or any similar activities are called hackers, scammers or fraudsters. Cybercrime leads to financial loss for individuals who have fallen victim to one.

  5. (PDF) My Views on Cyber Crime, published on Leading Odia News paper

    PDF | On Mar 14, 2021, Chandra Sekhar Biswal published My Views on Cyber Crime, published on Leading Odia News paper, The Samaja, 14.03.2021 | Find, read and cite all the research you need on ...

  6. Cyber Crime Essay for Students and Children

    500+ Words Essay on Cyber Crime. Cyber Crime Essay- Everybody thinks that only stealing someone's private data is Cyber Crime. But in defining terms we can say that 'Cyber Crime refers to the use of an electronic device (computer, laptop, etc.) for stealing someone's data or trying to harm them using a computer.

  7. Cyber Crime Essay in English

    500 Words Essay on Cyber Crime. Cybercrime is a type of crime in which illegal activities are carried out online or using computers. Cybercrime comes in a variety of forms which involves harassing online users. Cybercrime is the most serious and rapidly expanding type of crime in this day and age. Any person's life may be negatively impacted ...

  8. Odisha lost Rs 122.48 crore to cyber frauds in four years: Government

    19 Jul 2022, 2:15 am. 1 min read. BHUBANESWAR: Cyber criminals have swindled a whopping Rs 122.48 crore from Odisha over the last four years. Replying to a question of Khandapada MLA Soumya Ranjan ...

  9. Increasing trend of cyber crime, a headache for Odisha police

    Photo: OTV. Cyber Crime and Economic Offence Police Station. The increasing cases of cyber crime in Odisha may emerge as a big challenge for the Odisha police in 2023. According to the information shared by the Odisha police, in 2019-20, 1,475 cyber crime cases were registered. The year 2020-21 witnessed a slight increase as a total of 1,931 ...

  10. Cyber Security Essay for Students and Children

    Cyber Threats. It can be further classified into 2 types. Cybercrime - against individuals, corporates, etc.and Cyberwarfare - against a state. Cyber Crime. Use of cyberspace, i.e. computer, internet, cellphone, other technical devices, etc., to commit a crime by an individual or organized group is called cyber-crime.

  11. Odisha Police's first cyber crime campaign in all districts

    As per the National Crime Records Bureau (NCRB), around 565 women became victims of cyber crimes in the state during the period, followed by 458 in Assam and 276 in Uttar Pradesh.

  12. Cyber Crime

    What is Cyber Crime? About: Cybercrime is defined as a crime where a computer is the object of the crime or is used as a tool to commit an offense. Cybercrimes fall under State subjects as per the Seventh Schedule of the Constitution of India. It involves illegal or unauthorized activities that exploit technology to commit various forms of crimes.

  13. Cybercrime: Victimization, Perpetration, and Techniques

    Cybercrime, or the use of computer technology or online networks to commit crimes, ranges from fraud and identity theft to threats and intimidation. Cybercrime and its many manifestations has clearly increased over the past 20 years. For example, cybercrime costs increased from approximately $3 trillion in 2015 to more than $6 trillion in 2021 ...

  14. cyber crime essay in odia| ଭାବେ ବୃଦ୍ଧି ପାଇଛି

    cyber crime essay in odia| ଭାବେ ବୃଦ୍ଧି ପାଇଛି | cyber crime essay in odia

  15. Essay on Cyber Crime [Edit & Download], Pdf

    Cyber Crime. Cyber crime refers to any criminal activity that involves a computer, networked device, or a network. While most cyber crimes are carried out to generate profit for the criminals, some are done to harm or intimidate individuals, governments, or entire societies. The anonymity, vast reach, and speed of the internet have made cyber ...

  16. Cyber Security

    Cyber Security. According to EY's latest Global Information Security Survey (GISS) 2018-19 - India edition, one of the highest number of cyber threats have been detected in India, and the country ranks second in terms of targeted attacks. Although Banking and Telecom are the most attacked sectors but Manufacturing, Healthcare, and Retail ...

  17. Cyber Crime Portal

    Fake mails are being sent impersonating officials of Indian Cyber Crime Coordination Centre - CEO I4C, Intelligence Bureau and Delhi Police. The claim is FAKE. Learning Corner. CITIZEN MANUAL. It is a document to describe the functionalities and workflow that is provided to citizens on the cybercrime portal for reporting cybercrimes. ...

  18. PDF The Evolution of Odia Language : An Introspection

    The medieval period of Odia literature during the 15th, 16th and 17th centuries may be called the golden period. Modern Odia literature like other language and literatures emerged in the Nineteenth century. Odia prose, fiction, essay, drama modern poetry were rich and varied. The words in the voices of Jagannath Das in 'Bhagabata' and text

  19. cyber crime essay in odia, cyber safety essay odia, cyber security

    #odiaking#cybersecurity cyber crime essay in odia, odia essay cyber crime, odia essay on cyber crime, cyber security essay in odia, cyber suraksha odia essay... CBSE Exam, class 10

  20. CYBER CRIME EP 140

    OdishaTV is Odisha's no 1 News Channel. OTV being the first private satellite TV channel in Odisha carries the onus of charting a course that behoves its pio...

  21. Cyber crime essay in odia

    Cyber crime essay in odia Get the answers you need, now! ashmahajan2147 ashmahajan2147 08.10.2023 India Languages Secondary School answered • expert verified Cyber crime essay in odia See answer Advertisement

  22. AI voice cloning aids cyber-crimes, cops issue warning ...

    Kalinga TV is the fastest growing television channel in Odisha. Kalinga TV, being one of the most trusted channels in the state is always on attempt to bring...