Skip to main content

Impacts of Internet on society

Today I am back with my new topic which is based on Impacts of Internet on society


Let's start!!

tech buddy


The most important thing which Internet has done is that it has brought people of the world very class to each other. The communication has become so good that whereas it used to take 15 days for a letter to come from the USA, it now takes 15 seconds to send an e-mail to anywhere in the world. This has done a very significant difference to the approach of people towards computers too. Whereas it as though to be a learning tool only, now it has become a necessary tool for each home. 

CRIME ON/THROUGH THE INTERNET

Most of the crimes on the Internet are related to breaking codes of various information available on the net. One can crack the password of somebody's credit card and encash money. The other is of spreading the virus. Even spreading of wrong and inflammatory information too. 

WHAT IS CYBERCRIME?

When the Internet was developed, the founding fathers of Internet hardly had any inclination that Internet could also be misused for criminal activities. Today, there are many distributing things happening in cyberspace. Cybercrime refers to all the activities done with criminal intent in cyberspace. These could be either the criminal activity in the conventional sense or could be activities, newly evolved with the growth of the new medium. Because of the anonymous nature of the Internet, it is possible to engage in a variety of criminal activities with impunity an people with intelligence, have been grossly misusing the aspect of the Internet to perpetuate criminal activities in cyberspace. The filed of cybercrime is just emerging and new forms of criminal activities in cyberspace are coming to the forefront with the passing of each new day. 

Cybercrime is defined as a crime in which the computer or the Internet is used to harm a user. Cybercrimes can be classified as: 


  1. Hacking:  A computer programmer who uses his skills to intentionally access a computer without authorization is known as hacking. The person is called a hacker. He doesn't have the intention of causing damage. 
  2. Cracking:  When there is intentional hacking i.e. when the person who gains unauthorized access causes damage, the person is called a cracker. 
  3. Plagiarism:  Any person who distributes any electronic book or document without the consent of the concerned person.
  4. Software Piracy:  Unauthorized copying of software.
  5. Forgery: Counterfeit currency notes, postage and revenue stamps, mark sheets can be forged using sophisticated computers, printers, and scanners. 
  6. Cyber Stalking:  Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group or an organization.
  7. Email crimes:→
  • Spoofing refers to email that appears to have been originated from one source when it was actually sent from another source.
  • Spamming refers to sending email to thousands of users. It is a chain letter.
  • Sending malicious code:  Emails are used to send viruses. Trojan either as attachments or sending a link to a website which on the visiting downloads malicious code.
  • Bombing is abusers repeatedly sending an identical email message to a particular address.
8.  Banking/credit card related crimes:
  • Use of stolen card information.
  • Salami-deduce small amount of money from all customer accounts and adding it to own account.
Malware

Malware is used in short form for malicious software. It is a software that can be used to compromise computer function, steal data, bypass access controls, or otherwise cause harm to the host computer. Malware is a broad term that refers to a variety of malicious programmes. The most common types of malware are adware, bots, bugs, spyware, trojan horses, viruses, and worms.
  1. Adware
Adware (short for advertising-supported software) is a type of malware that automatically delivers advertisements. Common examples of adware include pop-up ads on websites and advertisements that are displayed by a software. Often times software and application offer "free" versions that come bundled with adware. Most adware is sponsored or authorized by advertisers and serves as a revenue-generating tool. 


2.  Bot 

Bots are software programs created to automatically perform specific operations. While some bots are created for a relatively harmless purpose (video gaming, Internet auctions, online contests, etc), it is becoming increasingly common to see bots being used maliciously. Bots can be used in botnets ( collections of the computer to be controlled by third parties ) for DDoS attacks, as spambots that render advertisements on the websites, as web spiders that scrape server data, and for distributing malware disguised as popular search items on downloads sites. 

3.  Bug

In the context of software, a bug is a flaw produces an undesired outcome. These flaws are usually the result of human error and typically exist in the source code or compilers of a program. Minor bugs only slightly affect a program's behavior and as a result, can go for long periods of time before being discovered. More significant bugs can cause crashing or freezing. Security bugs are the most severe type of bugs and can allow attackers to bypass user authentication, override access privileges, or steal data. Bugs can be prevented with developer education, quality control, and code analysis tools. 

4.  Spyware 

Spyware is a type of malware that functions by spying on user activity without their knowledge. These spying capabilities can include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data ), and more. Spyware often has additional capabilities as well, ranging from modifying security settings of software or browsers to interfering with network connections. Spyware spreads by exploiting software vulnerabilities, bundling itself with legitimate software, or in Trojans.   

5. Trojan Horse 

A Trojan Horse is known as a "Trojan" is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware. A Trojan can give a malicious party remote access to an infected computer. Once an attacker has access to an infected computer, it is possible for the attacker to steal data (logins, financial data, even electronic money), install more malware, modify files, monitor user activity (screen watching, keylogging, etc), use the computer in botnets, and anonymize Internet activity by the attacker. 

6.  Virus 

A Virus is a form of malware that is capable of copying itself and spreading to other computers. Viruses often spread to other computers by attaching themselves to various programs and executing code when a user launches one of those infected programs. Viruses can also spread through the script files, document, and cross-site scripting vulnerabilities in web apps. Viruses can be used to steal information, harm host computers and networks, create botnets, steal money, render advertisement, and more. 

THANKS, FRIENDS TO READ THIS POST
NEW TIPS FOR TECH

Comments

Popular posts from this blog

How Viruses are spread on our computer

Today I am back with my new topic which is based on How Viruses are spread on our computer Let's start !! A program that has the capability to infect other program and make copies of itself and spread into other programs is called Virus. A Virus can be identified if our system:    Takes a long time to load applications.     Has an inability to boot.     Shows unpredictable program behavior.     Has strange graphics appearing on the screen. The types of viruses are:   File Virus, which infects and replicates when it gets attached to MS-DOS program files with EXE or COM extensions. Boot Sector virus infects the boot sector of the floppy disk or hard disk.   Macro Viruses insert unwanted words or phrases in MS Word or Excel. How Viruses are spread? It seems to be a common belief that viruses are spread by games, by Internet file downloads or by Bulletin Board Systems (BBSs). The truth is more intricate. A physical disk has to be involved in case

How Internet Works and how much kind of it

Today I am back with an interesting topic which is how the Internet works. Let's Start! About Vinton Gray Cerf The Vinton Gray Cerf is an American Internet Pioneer. He was born in (June 23, 1943). Who is recognized as one of the fathers of the Internet? Sharing this title with TCP/IP co-inventor Bob Kahn. His acknowledge and lauded, repeatedly, with the honorary awards that include the National Media Of Technology, the Turing Award, the Presidental Medal Of Freedom, the Marconi Prize and membership in the National Academy Of Engineering.  If you want to read more about Vint Cerf then click on the link:  https://bit.ly/1je8u4g Wired Communication Media The data is physically transmitted from the source computer to the destination computer through the wired transmission medium. Bounded media are made up of the external conductor (Usually Copper) bounded by the jacket material. Bounded media are great for LABS because they offer high speed, good security, a

Safely browsing the web and using social networks

Today i am back with my new topic which is Cyber security. Let's start!! Internet is the most recent telecommunication technology,which has brought a technological revolution not only in offices but also in homes. Internet is the world's largest computer network, which connects several computers of different types belonging to various networks all over the world. Internet is not governed by a single authority. So, there are no official rules and regulations to control activities involving it.  This has many problems being associated with the internet. Individuals or organization use  their computers to store important and valuable data.Very often this data is kept confidential and needs to be stored securely. However, with the internet connecting all these computers, this security is now being threatened.   INTERNET APPLICATION  It is not that the Internet is used only for sending and receiving information. It has its commercial aspect too. Internet