• Legal Armor

Critical Analysis on Cyber Crimes

What picture hits into mind when you come across the term " cybercriminal" or "Hacker"? Do the imaginary cells of brain picture a shady boy perhaps in a dark sweatshirt, somewhere camped and writing furiously in a damp basement? While this imagination stems from the world we see in film and television, the true image of a cybercriminal is very different: cybercrime is incredibly organized and professional. Digital wrongdoing is a vigilantism movement that primarily takes place on a computer, organize a gadget or system.


Although most digital violations are carried out to earn profits by miscreants, some digital wrongdoings are executed legitimately against computers or gadgets to harm or incapacitate them. Others also resort to hacking, transmitting malware, unlawful data, pictures, or different materials into someone else’s system. As the phenomenon of digital hacking accelerates all over the world, dismantling systems and gadgets all over the world, understanding cyber crimes and consequent Laws against them becomes essential.


History to Status Quo


Abacus is known to have existed since 3500 B.C. in China, India, and Japan. By and by the time of current computers started with the expository motor of Charles Babbage. One of the landmarks and the biggest cybercrime-related cases took place when Joseph-Marie Jacquard, a silk-maker in France, designed the loom in 1820. This framework required the progression of steps in the weaving of unique textures to be reproduced. This led to fear among Jacquard representatives that their usual jobs and jobs would go through an assault. They attempted to prevent Jacquard from using innovation. This, in the history of all the cyber crimes, became the biggest cybercrime.


Computers have made some amazing progress today, with neural systems and nano-computers promising to transform each molecule in a glass of water into a gadget fit for performing one billion tasks for every second. Cybercrime has taken on rather sinister implications especially in a scenario wherein the functioning of all the major tasks of individuals to companies is running on computers, from microwaves and coolers to plants with atomic force.


Digital wrongdoing comprises burglary, misrepresentation, forging, criticizing, and disturbing custom crimes. Also, the misuse of computers and gadgets at the hands of these hackers have prompted a progression of new-period misdeeds which includes hacking, web damage, digital harassment, web hacking, etc.

There is no denying that cybercrime is getting worse every year. Therefore, the analysis of its impact in recent years is equally important. Taking from the year 2008 to 2019, records regarding the number of breaches had a drastic increase from 134 million to 2 billion. With an increase of more than 2 billion records violated in nine years, it is clear that cybercrime is increasing at a rapid pace.

The Way Forward...


A Juniper Research study by 2024 estimates that the total cost of penetrating knowledge will reach 5 trillion. The review anticipated that this cosmic sum would result from an expansion in fines, largely due to the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and other laws on information security that will rise over the next five years.


Nevertheless, we also hope to see a huge cybercrime flood similar to one during the 1970s, another clarification for the ascent at the expense of breakdown of information. The examination anticipated that the Artificial Intelligence (AI) would be liable for a significant portion of the ascent, not because more organizations would later rely on man-made awareness, but also on the fact that compromising on-screen characters would use innovation to launch a cutting-edge digital assault.


With this rapid rise in cybercrime, cybersecurity professionals need to stay up-to-date with developments and simultaneously should come up with the mechanisms which would assist in preventing and recovering from the cyber attacks. Additionally, reliance can always be placed on the cyber-incident response product and services from IT Governance which would facilitate an organization identifying, detecting, and containing incidents beforehand and accordingly mitigate the impact of an incident and restore services.



ABOUT THE AUTHOR

Rudra Madhav Marndi is currently pursuing law from National Law University, Odisha.

You can contact them on 18bba042@nluo.ac.in

Edited by: Swathi Ashok Nair

Disclaimer by Legal Armor:

We at Legal Armor do not endorse the Authors' views and are in no way responsible for the said views. We are just publishing the Write-ups as blogs with just light editing, and are in no way responsible for any legal claims. Legal Armor shall not be liable for any plagiarized content.

©2020 by Legal Armor. Proudly created with Wix.com