THE VOLUME OF THE CONTENT BASED ON ONLINE FRAUDULENT BY: ABIRAMI S, T.S.NANDHINI & R.KRITHIKA

THE VOLUME OF THE CONTENT BASED ON ONLINE FRAUDULENT
 
AUTHORED BY: ABIRAMI S, T.S.NANDHINI & R.KRITHIKA
Dhanalakshmi Srinivasan University, Samayapuram, Trichy.
 
 

Abstract

In this article we explain about online fraud in the state. who are all suffering from online fraud. There are some key aspects of fraudulent we give in this article, also we give types, punishment regarding, ratio of fraudulent, preventing from fraudulent. in this article we give some changes from scam. In this current society we use lots of technologies. The technology can be used in a positive or negative way. It is used in a positive way. It's useful for education, gaining knowledge and also earning. In a negative way we should face scam, online fraud etc... In the future we can live our lifestyle safe and secure. In this article we aim to protect and prevent online fraud.
 
INTRODUCTION
Cybercrime is a crime to commit illegal activities in online sources like computer, network, online database, hacking, bullying, sexortion etc.. It used to hack individual people's privacy. It also affects all children and adults. It is the biggest problem in this world. In the world of the era we all use technology in day to day life. There are different ways to use technology like positive or negative. In a positive way we use it for Education, knowledge gaining, earning, money oriented purposes etc.. But some persons are used in negative shades like to hack individual persons privacy, online money fraud, sex related issues etc... we aims who are all troubling from this online fraudulent to protect and prevent from this Cybercrimes. We implement some ideas to prevent cybercrimes.
 
Definition for cyber crime
·         David's wall: Cybercrime refers to the use of computer technology to commit the commission of crimes, including those that are traditional in nature and that are unique to the digital environment.
 
·         Peter: Cybercrime is a type of a crime that involves the use of computer technology to commit the offences, including fraud.
·         Bruce Schneie: Cybercrime is the use of computers and the internet to commit crimes including identity theft.
·         Kevin Mitnick: Cybercrime is the exploitation of computer systems and technology to commit illegal activities including social engineering and hacking.
 
Types of online fraudulent:-

·         Phishing:

Phishing is a type of fraud. This fraud is done by an individual, not a group, but by a group. This phishing is done through a person's mobile phone or computer. Usually, an attacker attacks by sending an email or snatching the personal information to the user of the computer or mobile phone. The trick to get this personal information is using various technologies such as spam email, links,message, personal notification, texts etc ...
 
·         Hacking:
hacking is an online fraudulent This hacking is the act of taking personal information of a person. This hacking is used to take personal communication or account details. hacking is very useful to take personal information of a person without his knowledge. This can be done by any means, if a person or a group of people use a computer to do this. There are many types of hacking Season hacking, personal data collection, account hacking, mobile hacking, cyber hacking, website In this hacking Dislodged by an OTP or PIN number It is a hacking of online fraud.
 
·         Vishing:
Vishing is an online fraudulent activity. Another name for this type of activity is social engineering. The purpose of this vishing is to obtain personal information from an individual. It is done online. It can involve voice messages, phone calls, and voice recorders. This involves taking personal information from an individual, for example, a credit card number, account number, or sending a message claiming that a product has arrived and then withdrawing money from their account. This vishing is used for criminal activities.
 
·         Account takeover fraud:
Account takeover fraud (Ato) is an online fraudulent activity, the purpose of this Account takeover fraud (Ato) is to hack another person's personal online account, in which the online account can be a personal account, email account, bank account. This is something that is done by another group or an individual without the knowledge of that individual. They will take everything they need from another person's account without the owner's permission.
 
There are having a different types of the of attacks, including phishing, malware attacks, social engineering, or data breaches...
 
·        Online shopping:
Online shopping is that type of online fraudulent activity. This online scam is selling a product that does not exist and the customers who buy it lose money. This online scam has many types of websites, links, emails, social media ads, whatsapp messages, ect ... When people order a product, they will steal money from them. This online shopping is selling products at low prices and they will give advertisements. This is an online shopping.
 
·        Lottery scam:
Lottery scams is a type of online fraudulent activity. This lottery scam is a message that comes as a message on the internet sites like email, phone call, whatsapp, etc. When we receive a message from any of these things, there will be large numbers in it, and it will be indicated that you have won. The purpose of this lottery scanning is to snatch money by saying advance fee. If you pay the advance fee then we will give you lottery money. It is a lottery scam.
 
·         Dating scam:
Dating scam is a type of online fraud. This dating scam is about creating a fake profile. It can also be called a romance scam. This dating scam involves creating a personal profile on websites like Facebook, WhatsApp, Instagram, and through that, they will commit fraud. By creating this fake profile, they gain the affection and trust of another person and through that, they manipulate them into having a close and romantic relationship with them. It is a dating scam.
 
 
·         Identify theft:
Identity theft is a type of online fraud. It is an online scam where a person who has made a mistake hides the mistake and leaves another person who has not made the mistake behind, so that the person who made the mistake can escape. This is identity theft.
 
·         Internet fraud:
This internet fraud is a type of online scam. This internet scam is about knowing the personal details of another person. For example, hacking, phishing, phishing online ect... This internet fraud is generally covered in cybercrime. This helps to take all the personal details through a link and take out money without the owner's permission . This is taken for the apps etc . It is an internet fraud.
 
·         Online harassment:
Online harassment is defined under the IT Act 2000 as any form of harassment that is done by an individual or a group of people repeatedly. This harassment can happen to women . After getting used to talking well on online platforms, they can be subjected to various types of sexual, social abuse, called online harassment.in this taken in a types of harrasment there are denigration, doxxing, exclusion, image based on the sexual abuse, mobbing, upskirting,
 
Trolling, trickery, sexting,internet pile on , masquerading ext...... Its is a online harassment
 
Ratio of cybercrimes in India
o   India is among the most affected countries by cyberattacks and has also increased cybercrimes in recent years.
o   Number of cyber attacks in 2023, India experienced over 79 million cyber attacks, which was a 15% increase from the previous year.
o   The first quarter of 2024, over 500 million cyber attacks were blocked.
o   1.750 crore the India lost in 2024 first four months to cyber criminals
o   The India recovery rate is too low. The recovery rate is 20%.
o   In cybercrime, India takes the 10th rank of the world.The India met cyber fraud involving advance fee payment is a common type.
 
 
The punishment regarding of the cybercrimes:
1.      The Information Technology Act 2000, also known as IT Act, deals with cybercrime and e-commerce. This act was implemented on 17 oct 2000, to provide legal recognition for electronic documents and facilitate e-governance.
2.      Under IT Act 2000, extending punishment like individual guilty can be punished by 2 years or a fine extending one lakhs rupees. Moreover, section 66 provides, punishment for identity theft shall be punished extend three years or fine not extending two lakhs.
3.      There are some penalties and imprisonment for cybercrimes. If penalty 2,00,000 fine and imprisonment 3 years for violation of privacy and tampering with computer source documents.
4.      If the penalty is 10,00,000 fine and imprisonment 7 years for publishing or transmitting obscene material or containing sexually explicit acts etc.., in electronic form and child pornography.
5.      The penalty is 5,00,000 for hacking and 1,00,000 for identity theft. They're not similar crimes. But both crimes have the same punishment. The punishment is 3 years for both hacking and identity theft.
 
·         Preventing Of Cyber Crimes:
We have some ideas to implement in this article that should alert people about such cybercrimes. The people are mostly involved in online shopping. There are many platforms regarding shopping bases. People should be aware that the platform is real or a scam. all online platforms must be approved by the government. all platforms will attach the government approved symbols in their logos.
·         Online Harassment:
Children who are not all 18 years old are prohibited from using the phone. Any online platform should not be approved to login their applications. The parents should not support the childrens to use the phone. The adults who are all 18 years old should be alert to use online platforms. they should not give any personal information to an unknown person. We should use Our knowledge to protect ourselves from these scams.
·         prevent by individuals: educate yourself, learn about fraud schemes, use a strong password, protect the information.
·         use strong password: We should use a different I'd and we should use different passwords in a letter or numbers.
·         secure your computer prevent virus by infecting your computer by installing the regular update antivirus software: secure your mobile devices
·         must aware from the mobile hackers and we must prevent the mobile devices from the hackers.
·         protect your data:  We must make a regular backup    of all your important data.
·         financial prevention: use secure payment processing, verify transactions, keep financial records sure.
 
Conclusion:
In this article, we conclude that people should be alert in such scams. We should not share our personal information with anyone. When we do any online shopping or download an app, we should read all the information that comes in it and then accept it. Similarly, if we receive a message from someone's number on our phone and ask for an OTP, we should not say anything. Only by doing all this can we protect ourselves from online fraud. We should use our knowledge to protect ourselves from these scams.
 
Reference:

Current Issue

THE VOLUME OF THE CONTENT BASED ON ONLINE FRAUDULENT BY: ABIRAMI S, T.S.NANDHINI & R.KRITHIKA

Authors: ABIRAMI S, T.S.NANDHINI & R.KRITHIKA
Registration ID: 1034670| Published Paper ID: WBL3470, 
WBL3471 & WBL3472
Year: Dec - 2024 | Volume: 3 | Issue: 1
Approved ISSN: 2581-8503 | Country: Delhi, India
  • Share on:

Indexing Partner