Open In App

What is a Scam?

Today, almost every person and industry, like in commerce, government, education, entertainment, etc., uses the internet for different purposes. As we know that internet is the source through which we can get and share information or content with a large number of people in the world. The Internet can be beneficial, but it can also be harmful because there are so many people on the internet who are available with bad intention. Their main motive is to harm other people or to get money/personal information from people. So, in this article, we will discuss what is online scams, and how to protect yourself from these scams. 

What is a Scam?

Any fraudulent technique or activity that is done to gain money or some other valued thing from a person is referred to as a scam. Large amounts of unsolicited messages delivered by email, instant messaging, or other digital communication methods to a person with the wrong intention are referred to as spam. Advertisers prefer it since it has no running costs other than the cost of maintaining email lists.



A person who does a scam is known as a scammer. Scammers usually make unwanted phone calls or give deceptive pop-up ads so that they can distract unwary computer users, such as their machines have a critical problem that has to be treated right away. Scammers frequently impersonate officials of well-known computer and software firms. Once a person is on the phone with a fraudster or clicks the advertisement link, the scammer frequently requests remote access to the victim’s computer. The scammer then can steal passwords, install malware or try to sell superfluous services or products. Some scanners can be caught easily while some cannot be if they are too clever.

The goal of the scammers is to persuade you to:



Types of Scams

Different types of scams are available on the internet and some of the common scams are:

How to protect yourself against internet scams?

To protect yourself from Internet scams, always keep the following points in your mind:

Internet Manners/ Rules To be followed

The following rules must follow while using the internet:

Sample Questions

Question 1. Write a note on the Indian Information Technology Act (IT Act).

Solution:

Many examples of cyber crimes, scams, cyber attacks, and cyber bullying have been documented as the Internet has grown in popularity. The type of fraudulent actions and crimes is always evolving. To combat such threats, many governments have enacted legislation to secure sensitive personal data and defend Internet users’ rights. 
The Information Technology Act, 2000 (commonly known as the IT Act) of the Government of India, as revised in 2008, gives users instructions on how to process, store, and transmit sensitive data. Many Indian states have cyber cells in police stations where anyone can report any type of cyber crime. By recognizing electronic records and digital signatures, the legislation establishes a legal framework for electronic government. The act defines cyber crime and the penalties associated with it. 

Question 2. What is cyber safety?

Solution:

Cybersecurity can be defined as a set of procedures aimed at promoting safe internet use and preventing exposure to internet infection, fraud, and theft. 

Question 3. Write a short note on the Importance of Cyber laws and the Information Technology (Amendment ) Act 2008.

Solution:

Cyberlaw is significant because it encompasses nearly all elements of transactions and activities on and with the Internet, the World Wide Web, and Cyberspace. In Cyberspace, every action and reply has certain legal and cyber legal implications. 

The Information Technology (Amendment) Act 2008, or IITA, not only addresses more charges related to information security, cyber terrorism, data protection, and privacy, but it also increases the penalties for particular offenses to life imprisonment and a fine of up to Rs. 10 lakhs.

Question 4. What are computer ethics and good practices to follow while using the internet?

Solution:

Computer ethics is concerned with the rules, norms, and practices that govern the process of consuming computing technology and associated disciplines without endangering or violating any individual’s, organization’s, or entity’s moral ideals and beliefs. 
Computer ethics is an ethical notion that deals with the ethical issues and restrictions that come from the use of computers, as well as how to reduce or prevent them. 

The good practices that must be followed are :

  • Use the computer in a way that does not endanger others.
  • Do not use another person’s computer unless they have given you permission.
  • Do not steal information using computer technology.
  • Do not use digital technology in order to spread of wrong information.
  • Don’t snoop on someone else’s computer data.
  • Avoid copying software or purchasing pirated copies.
  • Unless the software is free, you should pay for it.
  • Consider the societal impact of any of  software before going for its implementation.
  • It is incorrect to claim ownership of a product that is the result of other’s mind.
  • Do not use computer technology to disrupt the work of other users.

Question 5. What is Internet Fraud?

Solution:

The term “internet fraud” refers to a sort of deception that takes place on the internet. This type of fraud comes in a variety of shapes and sizes. It includes everything from spam e-mails to internet fraud. Internet fraud can occur whether it is partially based on the use of internet services or is entirely dependent on the use of the internet. 


Article Tags :