Computer and Internet

There are no precise, reliable statistics on the amount of computer crime and the economic loss to victims, partly because many of these crimes are apparently not detected by victims, many of these crimes are never reported to authorities, and partly because the losses are often difficult to calculate. Internet fraud takes many forms. The Internet’s promise of substantial consumer benefits is coupled with the potential for fraud and deception. Fraud operators are opportunists who are among the first to appreciate the potential of a new technology. There is nothing new about Internet fraud, however, the size and potential market, relative ease, low cost, and speed with which a scam can be perpetrated has increased tremendously. Nevertheless, in this section we have posted some tips for avoiding Computer related Crime, which includes suggestions for increasing the security and reliability of personal computers, as well as protection against cybercrime.

Causes of Computer Crime
  • local_police

    Sharing Identification numbers and password.

  • local_police

    Unauthorised access from remote location (hacking).

  • local_police

    Unauthorised access by non-authorised employee.

  • local_police

    Security system by-passed.

  • local_police

    Poor physical security.

  • local_police

    Poor system security.

  • local_police

    Abuse of legitimate access.

  • local_police

    Viruses etc. or other willful damage by disgruntled employee or competitor.

  • local_police

    Appropriate device security changes not taken when employees with access leave or are transferred.

  • local_police

    Data files and listings not held under proper security.

Recommended Prevention Measures

  • local_police

    Develop and Implement appropriate system failure procedures.

  • local_police

    Shred computer listings after use.

  • local_police

    Do not share Identification numbers and passwords.

  • local_police

    Change passwords regularly.

  • local_police

    Regularly monitor usage of dial-up facilities.

  • local_police

    Implement a system of controlling employees with access to data.

  • local_police

    Physical security of equipment and diskettes.

Hacking, Computerized Fraud And Other Computer Crimes

A “hacker” is a dedicated programming expert who believes in sharing his expertise and experiences with other hackers. A hacker does not believe in vandalizing or maliciously destroying data, or in stealing data of any kind. He may find your credit card number stored there from buying online, or use the information gleaned from your computer to use your ISP account for illegal activity, like distributing child pornography.

How can I stop hackers from gaining access to my computer?

  • local_police

    Only download or accept files from reliable sources.

     

  • local_police

    Use a firewall to block unauthorized access to your computer.

  • local_police

    Install a good virus scanner program and update virus information files at least weekly.

  • local_police

    Do not keep passwords, bank or financial account numbers, or other personal and confidential information on your computer’s hard drive. Store this type of information on removable disks (floppies or zip disks).

The Hijack

It is a relatively new form of fraud unique to the Internet. Consumers are prompted to download a purported “viewer program” to see computer images for free. Once downloaded, the consumer’s computer is “hijacked” by the viewer program, which turns off the consumer’s modem speakers, disconnects the computer from the local Internet provider, dials an international number and connects the consumer to a remote site. The expensive international costs are charged to the consumer’s telephone bill until the telephone is turned off.

Child Safety

  • local_police

    Place the computer in a centrally located area in your home – not in a child’s bedroom. This prevents “secret” communications or access and also allows all members of the family to use it.

  • local_police

    Talk to your children about the Internet. Explain that it is an excellent source of information, but some sites are inappropriate and they are expected to stay away from these sites.

  • local_police

    Establish time frames for Internet access. This will encourage your children to obtain information in a timely manner and discourage aimless wandering.

  • local_police

    Keep an open line of communication with your children.

  • local_police

    Never respond to someone who wants to meet in person or send photographs. Instruct your children to exit the chat room and notify you immediately if this happens.

  • local_police

    Discuss their Internet experiences and guide them to sites that are age-appropriate.

  • local_police

    Consider using software that can block or filter Internet sites or certain words that may indicate inappropriate sites.

  • local_police

    In a chat room never give out any personal information including: name, address, city, state, school attended, telephone number, family names or other personal family information.

  • local_police

    Most importantly, if your child visits a particular chat room, spend at least five or ten minutes monitoring the conversation to see if it is appropriate.

  • local_police

    Consider purchasing computer software products that can help you monitor and control your child’s access to the Internet.

  • local_police

    Monitor your children’s Internet activity by checking all of the sites visited.

Viruses

Simply stated, a virus, Trojan or worm is a small program written to cause harm to one or more computers or networks. A Virus, Worm or Trojan can also be designed to retrieve information from your computer to be delivered to an attacker for future use. For example credit card information, passwords, and security access codes.

If You Have Any Of The Following Symptoms, Your Computer May Be Infected

  • local_police

    Does your computer suddenly take longer to start up?

  • local_police

    Do program sizes keep changing?

  • local_police

    Do you keep running out of disk space?

  • local_police

    Do you keep getting 32 bit error messages?

  • local_police

    Your computer won’t boot up?

  • local_police

    File names are strange or keep changing?

  • local_police

    You can’t access your hard drive without booting from a floppy startup disk?

  • local_police

    Your computers CMOS settings keep changing – and you have a new CMOS battery?

  • local_police

    Your computer is sending out emails that you didn’t write?

  • local_police

    Strange unexplained things are happening with your computer; e.g. the CD ROM opens and closes when no one is using the computer.

  • local_police

    Monitor your children’s Internet activity by checking all of the sites visited.

How can I protect my computer against future infections?

Install and configure a good anti-virus program on your computer. Keep the virus definition files up to date. Anti-virus software programs can be configured to automatically check for new dat files (virus definitions) and your anti-virus program should be setup to do this at least weekly. Your anti-virus program should be configured to scan email, all files and folders, boot sectors and all removable disks (floppy and zip disks). If you receive an attachment or file via email, IRC, ICQ or removable disk, that attachment should be scanned for viruses before opening it.

Tips to keep you safe online

  • local_police

    Never send money to an unsolicited e-mail or a posting you spotted on the Web.

     

  • local_police

    Never agree to a meeting with someone who has posted a fabulous offer. In-person meetings give the con artist a chance to turn on high-pressure sales tactics or even rob you.

  • local_police

    If you are setting up an online identity for e-mail, be very vague. Do not give out personal information in a profile.

  • local_police

    Contact your ISP or local law enforcement if you receive suspicious or threatening e-mail.

  • local_police

    Be alert for any responses to e-mail that you don’t believe you have sent.

  • local_police

    Be alert to e-mail bearing a return address you recognize, but with content that does not match the personality of the sender.

  • local_police

    Look carefully at message headers for discrepancies between sender and provider.

  • local_police

    Acquire and use encryption software if you send e-mail containing confidential or sensitive information.

  • local_police

    Web sites whose purposes are to commit fraud appear and disappear quickly, making it difficult for them to be tracked. If you find a suspicious Web site, print the screen and any correspondence. Present this information when filing a complaint with your ISP or Kolkata Police.