The Vulnerability of Children in Cyberspace

The Vulnerability of Children in Cyberspace

Vibhuti Nakta, Ekta Sood
Copyright: © 2022 |Pages: 19
DOI: 10.4018/978-1-7998-8641-9.ch019
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The internet is a tremendous tool. It allows users to chat, read, play, and be entertained while viewing content from around the world. It's vibrant, diverse, and provides instant access to knowledge on any topic. Although the internet has many advantages, it still has some drawbacks. The internet can be a dangerous place for anyone, but children and teenagers are particularly at risk. Online dangers can have severe, expensive, and even tragic consequences, ranging from cyber bullies to social media posts that can come back to haunt them later in life. Children can unintentionally expose their families to cyber attacks by downloading malware that gives cyber criminals access to their parents' bank accounts or other sensitive information. The internet can be a dangerous place for children due to cyberbullying, sexual communication, identity theft, scams, and exposure to adult content. The chapter is an attempt to view in detail the possible menace of cyber crime, its types, and the national and international conventions and legislations on the same.
Chapter Preview
Top

Introduction

Technology is an integral part of our existence in today’s world. Our lives are embedded in the layers of it. It becomes almost impossible to reconcile our existence in the absence of technology considering its multifarious benefits. Internet usage has been rapid in our country which has enabled newer avenues with each passing day in the areas of entertainment, infotainment, education, health, business, etc. However, despite all the positives it has multifarious drawbacks as well. Especially because in today’s time various illegal activities are committed using the internet as a tool whether directly or indirectly. It is quite certain that in the future warfare will be carried out using the internet as a weapon. A report of the International Telecommunications, 2019 illustrated in the Global Cyber Security Index 2018 established that today, about half of the world's population is connected to the internet. As per the statistics almost 3.9 billion people i.e., almost 51.2 per cent of the population is using the internet. While it is an important development considering the future of the internet, it also raises the concern to have a much more secure environment for cyber users. As per a report by 2023, there will be 70 percent internet penetration, thus implying an increased need for a secure cyber environment (Maqsood & Rizwan, 2019). As per the reports of Internet World Statistics (Internet usage and World Population Statistic, 2019), India is the second-largest user of the internet after China. India by 2019 had more than one billion of its population using the internet. While there are figures which are griming which show that the increase of unethical activities using the internet has also been manifold. Cybercrime can thus be defined as an activity that is unlawful and which uses the computer as a tool or instrument or target or either of these. The crimes committed using the internet are faceless and invisible which makes it all the more challenging and cumbersome to investigate such crimes (Ministry of Home Affairs, 2019). The cyber-crimes can be classified into three categories:

Computer as a “Tool” for Cybercrime

In this category of crime, ‘computer’ is used as means of committing cybercrime. Here the computer is used as the main source for committing cybercrime. It includes credit card frauds, electronic fund transfer frauds, ATM frauds, telecommunicating frauds, e-Commerce frauds, etc.

Computer as a “Target” for Cybercrime

This form of cybercrime is much more sophisticated and requires computer knowledge. In this type of cybercrime, the crime is committed on a computer while using an external source which is also a computer. The main motive of such crime is to steal information, data, software, etc. it includes, unlawfully accessing Government records, intellectual property crimes, stock transfer fraud, sabotaging computer information, system, or networks, etc.

Computers as “Incidental” to Cybercrime

In these types of crimes, computers are only part of transactional fraud and play a small part in committing such crimes. It includes stalking, hacking, gambling, insurance frauds, pornography, phishing, smishing, etc.

Key Terms in this Chapter

Identity theft: This cybercrime occurs when a criminal gains access to a user’s personal information to steal funds, access confidential information, or participate in tax or health insurance fraud. They can also open a phone/internet account in your name, use your name to plan a criminal activity, and claim government benefits in your name. They may do this by finding out users’ passwords through hacking, retrieving personal information from social media, or sending phishing emails.

Botnets: Botnets are networks from compromised computers that are controlled externally by remote hackers. The remote hackers then send spam or attack other computers through these botnets. Botnets can also be used to act as malware and perform malicious tasks.

Phishing: This type of attack involves hackers sending malicious email attachments or URLs to users to gain access to their accounts or computer. Cybercriminals are becoming more established and many of these emails are not flagged as spam. Users are tricked into emails claiming they need to change their password or update their billing information, giving criminals access.

Prohibited/Illegal Content: This cybercrime involves criminals sharing and distributing inappropriate content that can be considered highly distressing and offensive. Offensive content can include but is not limited to, sexual activity between adults, videos with intense violence, and videos of criminal activity. Illegal content includes materials advocating terrorism-related acts and child exploitation material. This type of content exists both on the everyday internet and on the dark web, an anonymous network.

Exploit Kits: Exploit kits need a vulnerability (bug in the code of software) to gain control of a user’s computer. They are ready-made tools criminals can buy online and use against anyone with a computer. The exploit kits are upgraded regularly similar to normal software and are available on dark web hacking forums.

DDoS Attacks: These is used to make an online service unavailable and take the network down by overwhelming the site with traffic from a variety of sources. Large networks of infected devices known as Botnets are created by depositing malware on users’ computers. The hacker then hacks into the system once the network is down.

Social engineering: Social engineering involves criminals making direct contact with you usually by phone or email. They want to gain your confidence and usually pose as a customer service agent so you’ll give the necessary information needed. This is typically a password, the company you work for, or bank information. Cybercriminals will find out what they can about you on the internet and then attempt to add you as a friend on social accounts. Once they gain access to an account, they can sell your information or secure accounts in your name.

PUPs: PUPS or Potentially Unwanted Programs are less threatening than other cybercrimes but are a type of malware. They uninstall necessary software in your system including search engines and pre-downloaded apps. They can include spyware or adware, so it’s a good idea to install antivirus software to avoid malicious downloads.

Cyberstalking: This kind of cybercrime involves online harassment where the user is subjected to a plethora of online messages and emails. Typically, cyberstalkers use social media, websites, and search engines to intimidate a user and instill fear. Usually, the cyberstalker knows their victim and makes the person feel afraid or concerned for their safety.

Online Scams: These is usually in the form of ads or spam emails that include promises of rewards or offers of unrealistic amounts of money. Online scams include enticing offers that are “too good to be true” and when clicked on can cause malware to interfere and compromise information.

Complete Chapter List

Search this Book:
Reset