Overview

Individuals are also involved in committing cybercrimes against other individuals such as cyberstalking, pornography, and trafficking. Whereas, cybercrimes against any government is considered a serious offence, it is also known as cyber terrorism. This cybercrime involves hacking the website of the government or distributing propaganda. These kinds of cybercrimes are committed by other enemy governments or other nations.

 

In this article, types of cybercrimes committed in India have been discussed as well as the laws governing the cybercrimes in India. In order to protect or prohibit cybercrimes, certain important measures have also been described below.

Important Types Of Cybercrimes In India

Using the internet services or software with internet access for defrauding people or taking advantage of them. Cyber fraud includes crimes such as hacking, phishing, identity theft, spamming, etc.

 

With the growth and advancement of digitalization, the reliance of humans on internet technology has also grown. Generally, cyber fraud takes place on the internet or online. In this type of crime, computer networks or devices are targeted. It is considered pervasive and inevitable. Due to the increase in the use of internet technology cyber frauds have also grown in India, specifically in remote working scenarios due to the pandemic. A major threat is imposed due to the cybercrime to users of the internet where millions of information are being stolen, be it banking credentials, identity information, confidential information of big organisations. Cybercrimes are committed against property which includes details of credentials of the bank of an individual being hacked for gaining access to funds.


It will help identify the potential vulnerabilities in the industrial system if one understands the most common forms of cybercrimes. Generally, cybercrimes are categorised into two types, namely, crimes targeting networks or devices and crimes that are conducted by the use of devices aiding involvement in criminal activities. Virus, Malware, and DoS attacks are the types of cybercrimes that target networks. On the other hand, phishing emails, cyberstalking, and identity theft are included under the second category. 
 

Following are the types of cybercrimes.

  1. Identity theft- This is the type of crime where access is gained to the personal details of the individual for stealing credential information as well as funds or committing health insurance fraud. The criminal uses a phone or internet account with the individual’s name, pretending to be that individual for claiming benefits from the account of such individual.
  2. Phishing- In this kind of cybercrime, malicious mail attachments or URLs are sent by the hacker to the user in the attack for gaining access to the account of the system of the individual. As there has been an increase in cybercrimes today, the criminals have become more established which are not flagged as spam anymore. Therefore, the individual is tricked into the emails where they are asked to make changes in their login credentials.
  3. Cyberstalking- The user in this cyber is targeted for online harassment via several messages as well as emails. Cyberstalking is committed on social media platforms, websites as well as search engines for intimidating the user and threatening them.
  4. Social Engineering- When the cybercriminals are directly involved in making phone calls or emails is known as social engineering cybercrime. For gaining an individual’s confidence and posing as a service agent the criminals acquire the necessary information. The information is mostly a password, or an organisation or bank credentials. In social engineering, cybercrime is committed when the criminals get information about an individual over the internet and then add it as a friend on social media.
  5. Botnets- When an individual’s network is in that large network of infected devices which are created due to deposition of malware on the computer are known as botnets.
  6. DoS Attacks- In this attack, networks are taken down and make them unavailable for use. The site is trafficked through various sources making the online service unavailable. Once the site is taken down, the hackers hack into the system to steal information.
  7. Illegal Content- The sharing, as well as distribution of inappropriate content over the internet, is a serious offence and distressing. Illegal or prohibited content includes and does not limit to sexual activities among adults, videos having violent content, or criminal activity. It may also include professing terrorism or acts related to terrorism or child exploitation.

Steps For Protection Against Cyber Fraud

Following are the steps that one should take while using the internet in order to protect themselves against cybercrimes.
 

  1. Strong passwords- Everyone wants passwords that are easy and convenient for them to remember. While one must remember their passwords for having access we tend to forget what importance passwords carry. Generally, one goes for selecting birthdays, anniversaries, etc. for keeping passwords. However, we end up putting our data or information over the internet at risk. A strong password is suggested to have 8 characters which include a combination of numbers, letters and symbols. For protection against cybercrimes, one can also make use of a password manager where encrypted passwords are assigned as well as stored for various sites. As these passwords are not stored and a unique password applies to the respective sites, therefore the possibility of the password being hacked is less.
  2. Ensuring up-to-date software- To gain access to our systems for committing cyber frauds, by identifying flaws or vulnerabilities. Therefore, the chances of cyber frauds decrease to gain access to personal data or information by patching up those flaws as well as updating the software tools.
  3. Avoiding pop-ups/spams- One should always be aware of any kind of fraudulent emails as well as text messages. When an email or pop-up window wants your username and passwords, one should avoid giving the credentials. Login credentials are never asked by a well-established recognized organisation via email.
  4. Using VPN reduces the chances of cybercrime by keeping one’s software as well as application safe online. Therefore, while accessing any public Wi-Fi network one must use VPN.
  5. One should avoid clicking on unfamiliar links or ads.

Cyber Crime Laws In India

The internet and computer are some of the most important tools for the commission of illegal activities such as cybercrimes. These tools are the most targeted for committing cyber crimes. Cybercrimes also include traditional crimes such as theft, fraud, forgery, defamation as well as mischief as mentioned under the Indian Penal Code. There has been no established stringent statute for the prohibition of cybercrimes however, there are other statutes that have provisions regarding cyber crimes in India. Various new-age offences are addressed in the Information Technology Act of 2001 which is a result of abuse of the technology. According to the provisions of the IT Act 2000, provisions of the Indian Penal Code, Bankers’ Books Evidence Act 191, Indian Evidence Act 172 as well as the Reserve Bank of India Act 1943 were amended. To comply with the sections of the IT Act, several other amendments were made where stringent legal actions and modifications have been attempted.

Need Help?

Get assistance from our support team in finding the right lawyer

FAQs On Cyber Fraud

Cybercrime is defined as illegal behaviour which involves the computer or network or any device having a network. Cybercrimes generally target computers or such devices that harm the system of the user or disable their system to steal credentials. Cybercriminals use malware or viruses to hack the system of the user.
Phishing, cyberstalking, identity theft, social engineering, prohibited content, and botnets are some of the types of cybercrimes.
Cybercrimes are categorised into crimes that target the network or devices through malware, DoS attacks, and crimes where devices are used for involvement in criminal activities via phishing emails, cyberstalking, or identity theft.
In India, the Information Technology Act 2000 is the stator establishment governing cybercrime and addressing stringent legal action for crimes committed by electronic transactions or networks.
One can move to the nearest police station to complain about the blackmailing with obscene photographs on the internet as sharing of private photographs is a punishable offence Information Technology Act as well as Indian Penal Code.
Any individual committing the offence of cyber can be punished with imprisonment of 3 years as well as a fine of Rs 5 lacs under the Information Technology Act 2000.

How Lead India Law Associates Can Help You:

  1. Trustworthy & Confidential - We assure you that all your personal details & documents must be kept private. We never share these details with anyone.  
  2. Expert Advice - Sometimes both partners need expert advice before filing for mutual divorce. We have the most experienced & provide you with the best guidance before filing the mutual divorce petition.
  3. Zero Stress - The partners do not have to worry about the paperwork & complex process at the court. Our Associate will perform all these actions at the court.
  4. Top Quality Lawyers - Lead India Law Associates will help you to choose among the best divorce lawyers for your mutual divorce. There are different associates who work with us, you can choose a lawyer depending upon their practice area, experience & user rating.
  5. Track Your Case - We provide you the opportunity to track your cases from the online dashboard. You can easily track your case status, payment status, etc.

Legal Team

Was this article helpful?
90 out of 100 found this helpful

Popular Lawyers

View all
Advocate Chandan Rajput
Adv. Chandan Rajpu...
  • 43 + user ratings
Advocate Puneet Babu
Adv. Puneet Babu
  • 80 + user ratings
Advocate Ajay Singh
Adv. Ajay Singh
  • 176 + user ratings
Advocate R.K.Babaria
Adv. R.k.babaria
  • 112 + user ratings