{"id":10438,"date":"2012-06-09T05:08:00","date_gmt":"2012-06-09T05:08:00","guid":{"rendered":"http:\/\/dwarkaparichay.com\/blog\/2012\/06\/dos-and-dont-of-cyber-crime\/"},"modified":"2020-12-25T12:19:48","modified_gmt":"2020-12-25T06:49:48","slug":"dos-and-dont-of-cyber-crime","status":"publish","type":"post","link":"https:\/\/dwarkaparichay.com\/blog\/dos-and-dont-of-cyber-crime\/","title":{"rendered":"Dos and Don&#8217;t of Cyber Crime"},"content":{"rendered":"<div dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\">\n<div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong><em>Don&#8217;t<\/em><\/strong><\/div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<\/div>\n<p>*Expose yourself that you are not available in town or give your details about location and itinerary when email auto responder enabled. <a href=\"http:\/\/4.bp.blogspot.com\/_8BgY8JJh6wM\/S1XcscHXY_I\/AAAAAAAAD60\/fIqAWmBIpYo\/s1600-h\/CyberCrime4.jpg\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a href=\"http:\/\/3.bp.blogspot.com\/_8BgY8JJh6wM\/S1Xe1a1e2EI\/AAAAAAAAD68\/fx30QlEQH4E\/s1600-h\/CyberCrime4-crop.jpg\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a href=\"http:\/\/4.bp.blogspot.com\/_8BgY8JJh6wM\/S1ceSr64C-I\/AAAAAAAAD7E\/_1JO07EdqGI\/s1600-h\/CyberCrime5.jpg\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" alt=\"\" border=\"0\" id=\"BLOGGER_PHOTO_ID_5428841182194568162\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-layzr=\"http:\/\/dwarkaparichay.com\/blog\/wp-content\/uploads\/2012\/06\/CyberCrime5.jpg\" style=\"float: right; height: 278px; margin: 0px 0px 10px 10px; width: 325px;\" \/><\/a><br \/>\n*Hand over your credit card to any person.<br \/>\n*Auto-connect to open Wi-Fi (wireless fidelity) networks .<\/p>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n*Get confused, frightened or pressured into divulging information if you receive an e-mail purporting to be from your bank or credit card provider as criminal use scare tactics.<\/div>\n<p>*Keep passwords stored on your computer.<\/p>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n*Go online without virus protection and a firewall in place.<\/div>\n<p>*Open email attachment if you are not sure about it.<br \/>\n*Assume a company is legitimate based on &#8220;appearance&#8221; of the website.<\/p>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n*Be wary of investments that offer high returns at little or no risk.<\/div>\n<p>*Accept packages that you didn&#8217;t order.<\/p>\n<p><\/p>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong><em>Do&#8217;s<\/em><\/strong><\/div>\n<p>*Install and use a firewall, pop-up blocker and spyware detector.<\/p>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n*Ensure that your virus definitions are up to date and run anti-virus and spyware detectors\/cleaners regularly.<\/div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n*Make Backups of Important Files and Folders to protect important files and records on your computer if your computer malfunctions or is damaged by a successful attacker?<\/div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n*Use strong passwords &#8211; Easy to remember and difficult to guess type password. Use alphanumeric and special characters in your password. The length of password should be as long as possible (More than 8 characters).<\/div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n*Use a variety of passwords, not same for all of your accounts.<\/div>\n<p>*Be extremely wary of spam legitimate looking email asking for confidential information. Never ever click on the link given in the spam email.<br \/>\n*Always delete spam emails immediately and empty the trash box to prevent accidental clicking on the same link.<br \/>\n*Be wary of websites that require your card details up front before you actually place an order.<br \/>\n*Not to believe everything you read online.<br \/>\n*Take your time &#8211; do not rush into things.<\/p>\n<p>\n<strong><em>Know some terms:<\/em><\/strong><br \/>\n<strong>Adware:<\/strong> A program that displays advertising through pop-up or pop-under windows while you are browsing the net.<\/p>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong>Backdoor:<\/strong> An undocumented way of gaining access to a program, a computer system or network. The backdoor is usually implemented by the creator of the program, and is usually only known to him. A backdoor is a potential security risk.<\/div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong>Blue Box:<\/strong> A device used to hack into telephone systems.<\/div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong>Cracking:<\/strong> Cracking can be defined as modifying a program, to make it behave as you want it to behave and not behave as what its creator had wanted.<\/div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong>Cyberstalking:<\/strong> Stalking is a series of actions that puts a person in fear for their safety. A stalker may follow you, harass or black mail you. Cyberstalking is the act of stalking, but carried out with the aid of (or through) computers and the Internet.<\/div>\n<p><strong>Cyber punks:<\/strong> The stereotypical image of hackers, they are usually antisocial, socially inept, and burdened with angst directed towards the real world which was unfair to them.<br \/>\n<strong>Cyberterrorism:<\/strong> The act of carrying out terrorism using cyberspace, or in other words, the Internet. It is the hacking or attacking of networks and computers to obtain or modify information for political and\/or social objectives or rather, a way to quickly and easily distribute propaganda and get a lot of attention drawn to it.<br \/>\n<strong>Email flooding:<\/strong> The act of sending huge volumes of emails to a single user at any one time.<br \/>\nEncryption: The process of preventing an unauthorized person from reading or changing a particular data, by protecting the data.<br \/>\n<strong>Ethical hacking:<\/strong> Use of hacking knowledge to forcefully attempt to enter a network to find its weaknesses. It is also referred to as \u2018legalized hacking\u2019.<br \/>\n<strong>Hacking:<\/strong> In the olden days, hacking referred to basically exploring and figuring out how the wired world works. Geeks who did this were called hackers.<br \/>\nHowever, today, the term is often used to describe computer criminals who break into or harm computers. Purists want those who break into computers to be called as \u201ccrackers\u201d rather than \u201chackers\u201d.<br \/>\n<strong>Identity Theft: <\/strong>Identity theft occurs when an unscrupulous person obtains enough of your personal information to be able to impersonate you and use your identities to obtain financial gain.<br \/>\n<a href=\"http:\/\/www.blogger.com\/\" id=\"internetAfraud\" name=\"internetAfraud\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><strong>Internet auction fraud:<\/strong> Committing fraud by exploiting the internet auctions held by the many online auction sites, for mainly monetary reasons.<\/p>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong>Intrusion detection system (IDS):<\/strong> As its name implies, an IDS detects any intrusion into the system (i.e. an illegal entry attempt by a hacker). An IDS runs in the background and silently monitors the network for any suspicious activity.<\/div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong>Malware:<\/strong> Malware or malicious programs are written with the intention of causing various types of damages and nuisances to a computer and the information on the computer.<\/div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong>Nigerian letter scam:<\/strong> Another manifestation of the cyber fraud, which tries to rob innocent people of their money. Also known as the &#8220;Advance Fee Fraud&#8221; or &#8220;4-1-9&#8221; scheme (named after the relevant section of the Nigerian Criminal Code that it violates).<\/div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong>Password crackers:<\/strong> Password crackers concern themselves with cryptography and how to break current encryption techniques.<\/div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong>Phishing:<\/strong> The act of sending faked e-mails to a user that falsely appears to come from a legitimate (and often well-known) business enterprise. This is an attempt to lure unsuspecting email users to divulge their personal data such as account usernames, passwords and credit card numbers on a bogus website.<\/div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong>Scam:<\/strong> A fraudulent business scheme aimed to hoodwink an individual or corporation. The perpetrator typically promises his victims a large financial return with little or no risk involved.<\/div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong>Script Kiddies:<\/strong> These are people (usually teenagers) who want to be recognized as dangerous hackers but lack miserably in the required determination and skills. They use ready-made cracking programs (made by others), intending to cause damage to and corrupt systems.<\/div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong>Spamming:<\/strong> Spamming is the act of sending unsolicited messages to many users at a time, possibly up to the thousands, with the usual intention of advertising products to potential customers.<\/div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong>Spyware:<\/strong> A program that gathers information about a person or an organization and sends this information to a third party, often without their permission or knowledge.<\/div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong>Trojan horse:<\/strong> Trojan horses (or simply Trojans) are computer programs that that disguise themselves to be useful software, but instead they compromise your security and privacy. Trojans can allow hackers to take control of your computer or capture your keystrokes.<\/div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong>Virus:<\/strong> A virus is a piece of computer code that that hides within other programs or documents so it can spread from computer to computer, infecting as it travels. Viruses can damage your software, your hardware, and your files. Viruses are often written with the intention of replicating themselves.<\/div>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong>Warez:<\/strong> Refers to commercial software, movies and games that has been modified by a cracker and made freely available to the public on the Internet.<\/div>\n<p><strong>Website Defacement:<\/strong> The act of damaging the appearance of a website.<\/p>\n<div style=\"border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;\">\n<strong>White Collar Crime: <\/strong>Crimes of theft and deception committed by qualified professionals.<\/div>\n<p><strong>Worm:<\/strong> A worm is a computer program which is programmed to spread from one computer to another maliciously, without any user interaction. Worms do not need to travel through a &#8220;host&#8221; program or file. They can travel alone and replicate themselves in great volume and slow down computer networks.<br \/>\n<strong><em><br \/>\n<\/em><\/strong><strong><em><\/em><\/strong><br \/>\nSource of Information<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Don&#8217;t *Expose yourself that you are not available in town or give your details about location and itinerary when email auto responder enabled. *Hand over your credit card to any person. *Auto-connect to open Wi-Fi (wireless fidelity) networks . *Get confused, frightened or pressured into divulging information if you receive an e-mail purporting to be from your bank or credit card provider as criminal use scare tactics. *Keep passwords stored on your computer. *Go online without virus protection and a firewall in place. *Open email attachment if you are not sure about it. *Assume a company is legitimate based on <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,66],"tags":[108,1879],"class_list":["post-10438","post","type-post","status-publish","format-standard","hentry","category-update","category-useful-informations","tag-tips","tag-update"],"_links":{"self":[{"href":"https:\/\/dwarkaparichay.com\/blog\/wp-json\/wp\/v2\/posts\/10438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dwarkaparichay.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dwarkaparichay.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dwarkaparichay.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dwarkaparichay.com\/blog\/wp-json\/wp\/v2\/comments?post=10438"}],"version-history":[{"count":16,"href":"https:\/\/dwarkaparichay.com\/blog\/wp-json\/wp\/v2\/posts\/10438\/revisions"}],"predecessor-version":[{"id":64635,"href":"https:\/\/dwarkaparichay.com\/blog\/wp-json\/wp\/v2\/posts\/10438\/revisions\/64635"}],"wp:attachment":[{"href":"https:\/\/dwarkaparichay.com\/blog\/wp-json\/wp\/v2\/media?parent=10438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dwarkaparichay.com\/blog\/wp-json\/wp\/v2\/categories?post=10438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dwarkaparichay.com\/blog\/wp-json\/wp\/v2\/tags?post=10438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}