Today we are enjoying the Internet with a traffic flow of nearly 200 petabytes per month. Earlier when we wanted to purchase the latest electronic gadget,we had to walk to a relevant shop and purchase it. Today a lot goes beyond mere shopping,the 21st century peeks into the mindset of normal people,trying to gauge what gives them more convenience. In this highly technological world we do not reach a shop to purchase a thing instead a shop comes under our finger tips with the mere click of a mouse. It is not just the matter of shopping but everything can be purchased from across the globe. Nowadays international bank transactions,railway booking and many more are conveniently doing online. With the advantages there comes a dangerous threat to Internet  world that is hacking. Hacking is a illegal magic tool to access computer system and its info without the implied permission of its owner. Hacking is a word coined by William Gipson in his novel Neuro Mancer in the year1984. Cyber crime is not defined in Indian penal code till 2008. In 2008 cyber laws introduced by the IT act provided severe punishments for people,who practice cyber hacking which are categorally of three sorts:                                                 A White hacker is a computer and network expert who attacks a security system on behalf of its owner or as a hobby,seeking  without adequate protection  that a malicious hacker could exploit. To protect against a white hacker,the system owner needs to fix the breach before it can be taken advantage of.                                                            A black hat is a person who compromises the security of a computer without permission from an authorised party,typically with malicious intent.                                                            A grey hat is a skilled hacker who sometime acts legally  and other times may not. They are a cross between white hack and black hat hackers,they usually do not hack for just personal gains but may at times be involved in big crimes.                                                                    There are different types of hacking. Some of them are:                                                                                         E-mail spoofing:-A spoofed E-mail may be said to be one, which misleads its origin. It shows its  origin to be different from which it actually originates.                                                        Online Gambling:- online fraud and cheating is one of the lucrative businesses that are growing intensively in today’s cyber space. There are many causes  that have come to light such as- credit card crimes,contractual crimes,offering jobs etc.                                                 Transmitting virus:-Viruses are  programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worm attacks play a major role in affecting the computerised system of the individuals.                                                                      Cyber stalking:- It means expressed or implied physical threat that creates fear through the use of computer technology such as Internet,e-mails,phones, text messages,webcam,websites or videos.                                                                          Cyber Terrorism:- cyber terrorism is a major issue in the domestic as well as global arena. The common form of terrorist attacks on the Internet is by creating terror by circulating terrorism threats,hate websites and hate e-mails,attacks on sensitive computer networks etc. Cyber terrorism activities endanger the sovereignty  and integrity of the nation.                                                  Hackers are not criminals by birth but situations instigate them to make money through illegal ways. The government should try to change the catchment area of hackers rather than just punishing the hackers,to destroy the crime rate from its roots.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s