In the world with population of over 7.8 Billion, almost every person have some electronic devices associated with themselves. It is reported that, number of connected devices that are in use worldwide are now more than 17 Billion, which is more than two times of the world’s total population. This number is estimated to be more than 20 Billion by 2030.
Every device is directly or indirectly connected to one or more devices, which overall forms a huge network of devices. These devices are used by people and they often share their valuable information while completing various day-to-day tasks. Caber Criminals tend to use this information against them in an offensive manner.
Caber Crime is a very broad term. The simple way to explain this would be, “Any illegal activity which is done by making use of any computer and network”. These are some serious threats to one’s privacy. The depth of this can be understood by following example,
DEFCON (Defense Readiness Condition) is world’s largest continuously run underground hacking conference. Ethical Hackers from all across the world actively participate in this. When this conference is held, all the security agencies are put on high alert. It is seen that the hackers are capable of hacking various devices from ATM Machine to a Car.
There are many ways in which Caber Crime is carried out. Some of the commonly seen Caber Crimes are Hacking, Social Engineering, Identity Theft, Spreading Communal Hate, Encouraging Terrorism, Caber Bulling and many more.
The modern technology has made it possible to hack any device which is connected to other devices in the network. The simple example of this would be Wi-Fi Network. Wi-Fi hacking is very common but one should be concerned about this as there are chances that the whole Computer Network Security can be compromised. Common attacks include,
SQL injection: Entering the True SQL command which enables to access unauthorized data from database of the application.
XSS: Cross Site Scripting refers to accessing the cookies or digital identity from the target’s server and carry out activity using target’s identity.
In general, hacking is carried out by identifying the loop holes in the source code, written to program the software. The measures that can be taken to prevent this are securing the firewalls, avoid use of third-party applications and secure all the end points of the network.
- Social Engineering:
Social Engineering basically refers to hacking into people’s mind. Here attacker tends to access data by manipulating the target psychologically. This can be carried out in many ways, one of them is by creating fake links and trick the target to click on it, which then allows the attacker to gain control over target’s system.
One good example to explain this, is the well-known Tamara phishing scam, where the scamper retrieved the personal bank account details of people by manipulating them which resulted in money theft.
- Ransom attack: Breaching into person’s or organization’s personal data and encrypting it, so that the target can access his own data only with the help of key known by the attacker. One of many ways to counter this, is to avoid accessing malicious web applications. Such type of attacks may cost millions to a company.
Recently, ‘Big Basket’ has reported a data leak of 15 GB from their database, which included user’s name, email, contact number, password hashes, location and their system’s IP address. Later, this data was made available for sale on Dark net, which is a part of internet, that can be accessed only with particular software and makes it difficult to trace the IP address or any communication protocol.
- Identity Theft:
It refers to misuse of target’s personal identifying data without their consent to carry out some illegal activity.
Sim Card Cloning: It refers in duplicating a legit sim card, which can be used in a similar way as original sim card. This is possible by extracting sim card’s IMSI (International Mobile Subscriber Identifier) and Authentication Key.
Some basic measures in order to secure our networks are to make use of long passwords including special characters and numbers which makes it difficult to decrypt, Backup the data which can be useful in the scenario of Ransom attack, Keep on learning about the latest attacks and ways to tackle them, in case of an organization make sure to have a caber insurance. Government of India is actively working to prevent this and have an open portal to report a Caber Crime in India:
For Women and Children: