Memorable moment in "Bhola Dai ko "Tea shop

    There is a small tea shop in my locality commonly named as “BHOLA DAI KO PASAL.”When I completed my schooling, I came back to my home town for my further study. When I started to enjoy my college life one of my friends used to take me to that tea shop. When I went there for the first time I saw almost the entire student from different colleges used to get together and enjoy tea and smoke and that was like their daily routine. The shop was little bit isolated from the road and that was a plus point for the shop. Though the shop was not so fancy and well managed still it was famous. Students don’t remember their subject teacher name but they remember BHOLA DAI. Slowly and slowly I also became his regular customer. When I leave from my home to college, I used to do attendance to that shop before doing at school and others also do the same.
   Talking about the shop I heard that he started his shop with only one cooking material with 5/6 cups made of glass. He does not think of such a big achievement. He just wanted to open the shop in a good environment where there will be a crowd. Luck was also in favour of him because numbers of colleges were increased in that locality and number of students used to come there. He had never planned for huge number of customers because that shop was only for eradicating his poverty. Number of customers increased beyond his assumption so; slowly he started planning to manage the customers in such a way that none of the customers feel uncomfortable, so he made a partition of the room one for the breakfast stuff and another for smoking. He also started to add different category of cigarette, breakfast item, etc. He also became famous for “alu chop”. He used to provide some tomato checkups with that “alu chop”. Day by day his shop became so much popular. Many more songs related to “BHOLA DAI KO PASAL.” were evolved.  I also heard that he had already built 3 storage buildings near to his shop. Though he has his own house he stays in his shop and rented his house to others. He can stay without continuing his shop, but he still does it. One of my friends who is very closed to him told me that he will give continuity to his shop just for time pass because he does not want to stay idle in his home and that shop became a part of his life. His lifestyle is still the same as like before.

   This example is purely based on luck phenomenon. He does not want to grow bigger. Only the fact was environment around his locality supported him to grow bigger. As I had already mentioned above he just started his shop to eradicate his poverty without any sort of planning. The goal was only to survive in the locality by doing hard work because he was uneducated and unemployed. He never had thought of SWOT and PEST analysis. There are also many more tea shop in that locality but everyone prefers his shop though his shop is not well managed so called HI-FI type.
    There is a small tea shop in my locality commonly named as “BHOLA DAI KO PASAL.”When I completed my schooling, I came back to my home town for my further study. When I started to enjoy my college life one of my friends used to take me to that tea shop. When I went there for the first time I saw almost the entire student from different colleges used to get together and enjoy tea and smoke and that was like their daily routine. The shop was little bit isolated from the road and that was a plus point for the shop. Though the shop was not so fancy and well managed still it was famous. Students don’t remember their subject teacher name but they remember BHOLA DAI. Slowly and slowly I also became his regular customer. When I leave from my home to college, I used to do attendance to that shop before doing at school and others also do the same.
   Talking about the shop I heard that he started his shop with only one cooking material with 5/6 cups made of glass. He does not think of such a big achievement. He just wanted to open the shop in a good environment where there will be a crowd. Luck was also in favour of him because numbers of colleges were increased in that locality and number of students used to come there. He had never planned for huge number of customers because that shop was only for eradicating his poverty. Number of customers increased beyond his assumption so; slowly he started planning to manage the customers in such a way that none of the customers feel uncomfortable, so he made a partition of the room one for the breakfast stuff and another for smoking. He also started to add different category of cigarette, breakfast item, etc. He also became famous for “alu chop”. He used to provide some tomato checkups with that “alu chop”. Day by day his shop became so much popular. Many more songs related to “BHOLA DAI KO PASAL.” were evolved.  I also heard that he had already built 3 storage buildings near to his shop. Though he has his own house he stays in his shop and rented his house to others. He can stay without continuing his shop, but he still does it. One of my friends who is very closed to him told me that he will give continuity to his shop just for time pass because he does not want to stay idle in his home and that shop became a part of his life. His lifestyle is still the same as like before.

   This example is purely based on luck phenomenon. He does not want to grow bigger. Only the fact was environment around his locality supported him to grow bigger. As I had already mentioned above he just started his shop to eradicate his poverty without any sort of planning. The goal was only to survive in the locality by doing hard work because he was uneducated and unemployed. He never had thought of SWOT and PEST analysis. There are also many more tea shop in that locality but everyone prefers his shop though his shop is not well managed so called HI-FI type.

SWOT and PEST analysis of shopping mall named Nepal Bazar which is located in Biratnagar

*SWOT
*PEST

SWOT ANALISIS: An analysis of Strengths, Weaknesses, Opportunities and Threats in the internal environment of the organization is known as SWOT analysis. These factors are under control of the organization.      
There is a shopping mall named Nepal Bazar which is located in Biratnagar. I am well known about this organization. This organization was well settled and strongly adjusted in the environment. SWOT and PEST analysis of this organization is shown in following table.
S (Strengths)
W (Weaknesses)
O (Opportunities)
T (Threats)
1. Good infrastructure
Lack of support from government
Faster market growth than before

Changes in government policies
2. Flexible and responsive to sales
Parking problem
New seats
New competitors
3. High growth
Lack of advance technology
Provide a bonus
Changing market taste
4. Provide discount card
Security
Provide discount cards
-
5. Available all sorts of goods
-
-
-
6. Proper management
-
-
-

-
-
-

Strengths:
This organization has good infrastructure. Many customers are attracted by the name of this organization itself i.e. Nepal bazaar. There is 24 hours A.C and electricity inside the department. Regular customers are given a discount card and also provide with many gift hampers. Well managed environment is setup inside the department. All sorts of goods are available inside the same roof. Price at the grocery is less than the market price. Branded item directly exports from the foreign countries. The amazing thing about this organization is that in the opening ceremony, rickshaw driver was given a chance to cut the ribbon. This also shows that there is no discrimination between poor and rich. Anyone can be the family of this organization.


Weaknesses:
To run the organization smoothly there should be support from the government. But this support lacks in this organization. There is an improper management of parking facilities. No improvement has been seen till now. There is also lack of advanced technology and security.
Opportunities:
It provides lots of opportunities. Yearly it announces new seats for the proper management and function of the organization. It improves market growth than before. It also provides a bonus to the employee. There was a scheme, i.e. if any customer crosses 10,000 Rs while shopping they were given a discount card. Similarly, at the time of festival many schemes were announced. Some are like Shop for Rs.1000 in grocery and get many products absolutely free. They also announced that in every purchase anyone can get a chance to win a trip to Bangkok and many more.

Threats: Changes in the government policies directly affect this organization. Fluctuation in the tax rate and vat rate has encounter to this organization. Many new competitors are planning to decrease the sales rate of this organization. The market price has been decreased in order to slow down the selling rate of this organization by the competitors.

PEST ANALISIS: An analysis of Political, Economical, Socio-cultural and Technological factors in the external environment of the organization is known as PEST analysis. These factors are not under control of the organization.
P (Political)
E (Economical)
S (Socio-cultural)
T (Technological)
1. Political ideologies
Economic condition
Obeys and fulfil social and cultural norms and value
Fails to access the newest technology
2. Government term and change
Economic system
-
Sufficient level of technology
3. Wars and conflicts
Price fluctuation
-
Good internet infrastructure
4. Environmental issues
Globalization
-
-
















Political:
The political ideologies as democracy, socialism, communism, Maoism, etc. also affect this organization. As we know that every political parties whenever they are in a government tries to implement their ideologies which directly affect the environment. This factor affects a lot to this organization.
Economical:
The economical condition of this organization is in a good shape. Economical factor is one of the external factors of the environment. It includes different factors like GDP, national income, per capita income, export and import, purchasing capacity, inflation rate, etc. These factors give shape and form to the development of the economic system of the country. Due to the increasing impact of globalization and liberalization this organization economy is gradually shifting towards an open market economy. This also results in price fluctuation in this organization.
Socio-cultural:
This organization is a social unit as it is established within the society by the people, for the people of the society. This organization obeys and fulfils social and cultural norms and value. This organization manages to proper product quality according to the ever changing life standard of the people and also following and maintaining religion and ethnical value.

Technological: The field of technology is very dynamic as there is a continuous up-gradation in the existing product due to various innovations and renovation. This organization is upgrading its existing technologies, including various machineries and equipments, computer technologies, etc. In order to add its strength by producing extra beneficial product and services in terms of quality, uses, etc. This organization has passed to upgrade itself with the change in the technological field.
*SWOT
*PEST

SWOT ANALISIS: An analysis of Strengths, Weaknesses, Opportunities and Threats in the internal environment of the organization is known as SWOT analysis. These factors are under control of the organization.      
There is a shopping mall named Nepal Bazar which is located in Biratnagar. I am well known about this organization. This organization was well settled and strongly adjusted in the environment. SWOT and PEST analysis of this organization is shown in following table.
S (Strengths)
W (Weaknesses)
O (Opportunities)
T (Threats)
1. Good infrastructure
Lack of support from government
Faster market growth than before

Changes in government policies
2. Flexible and responsive to sales
Parking problem
New seats
New competitors
3. High growth
Lack of advance technology
Provide a bonus
Changing market taste
4. Provide discount card
Security
Provide discount cards
-
5. Available all sorts of goods
-
-
-
6. Proper management
-
-
-

-
-
-

Strengths:
This organization has good infrastructure. Many customers are attracted by the name of this organization itself i.e. Nepal bazaar. There is 24 hours A.C and electricity inside the department. Regular customers are given a discount card and also provide with many gift hampers. Well managed environment is setup inside the department. All sorts of goods are available inside the same roof. Price at the grocery is less than the market price. Branded item directly exports from the foreign countries. The amazing thing about this organization is that in the opening ceremony, rickshaw driver was given a chance to cut the ribbon. This also shows that there is no discrimination between poor and rich. Anyone can be the family of this organization.


Weaknesses:
To run the organization smoothly there should be support from the government. But this support lacks in this organization. There is an improper management of parking facilities. No improvement has been seen till now. There is also lack of advanced technology and security.
Opportunities:
It provides lots of opportunities. Yearly it announces new seats for the proper management and function of the organization. It improves market growth than before. It also provides a bonus to the employee. There was a scheme, i.e. if any customer crosses 10,000 Rs while shopping they were given a discount card. Similarly, at the time of festival many schemes were announced. Some are like Shop for Rs.1000 in grocery and get many products absolutely free. They also announced that in every purchase anyone can get a chance to win a trip to Bangkok and many more.

Threats: Changes in the government policies directly affect this organization. Fluctuation in the tax rate and vat rate has encounter to this organization. Many new competitors are planning to decrease the sales rate of this organization. The market price has been decreased in order to slow down the selling rate of this organization by the competitors.

PEST ANALISIS: An analysis of Political, Economical, Socio-cultural and Technological factors in the external environment of the organization is known as PEST analysis. These factors are not under control of the organization.
P (Political)
E (Economical)
S (Socio-cultural)
T (Technological)
1. Political ideologies
Economic condition
Obeys and fulfil social and cultural norms and value
Fails to access the newest technology
2. Government term and change
Economic system
-
Sufficient level of technology
3. Wars and conflicts
Price fluctuation
-
Good internet infrastructure
4. Environmental issues
Globalization
-
-
















Political:
The political ideologies as democracy, socialism, communism, Maoism, etc. also affect this organization. As we know that every political parties whenever they are in a government tries to implement their ideologies which directly affect the environment. This factor affects a lot to this organization.
Economical:
The economical condition of this organization is in a good shape. Economical factor is one of the external factors of the environment. It includes different factors like GDP, national income, per capita income, export and import, purchasing capacity, inflation rate, etc. These factors give shape and form to the development of the economic system of the country. Due to the increasing impact of globalization and liberalization this organization economy is gradually shifting towards an open market economy. This also results in price fluctuation in this organization.
Socio-cultural:
This organization is a social unit as it is established within the society by the people, for the people of the society. This organization obeys and fulfils social and cultural norms and value. This organization manages to proper product quality according to the ever changing life standard of the people and also following and maintaining religion and ethnical value.

Technological: The field of technology is very dynamic as there is a continuous up-gradation in the existing product due to various innovations and renovation. This organization is upgrading its existing technologies, including various machineries and equipments, computer technologies, etc. In order to add its strength by producing extra beneficial product and services in terms of quality, uses, etc. This organization has passed to upgrade itself with the change in the technological field.

Role of CEO of the newly start-up company

If I became a CEO of the newly start-up company then I would make following unethical practices for the benefit of the company.
1.         Dumping.
            Dumping means the act performed to crush other organization/companies to destroy the local competition by flooding the market and selling them at a much lower price. By the help of dumping company can be benefited. There is a saying that anything can be achieved only after losing something likewise I will manage to sell products at a lower price in order to enhance productivity and ultimately for future profit. On the other hand other companies lose their market. This unethical practice helps my company to attract customers.

2.         False advertising tactics:
         Nowadays, many more companies/organization is applying the same tactics to uplift their business. This is also one of the unethical acts perform to attract the customers. I will advertise about our, company, products, aim, objectives, etc. This tactic can make my company well known around the society. People will be excited to learn more about us. More number of customers can be increased in a short period of time. Strong relation can be established between customers and the company.

3.         Vacancy announcement tactics:

             In order to run the company smoothly, best employee is required. So for this I will rise up the salary of every particular post from top to bottom in the vacancy announcement. I will increase certain percentage more than the other companies do. Similarly, I will announce different types of bonus schemes for the employee. This tactic can increase number of best employee in my company.
If I became a CEO of the newly start-up company then I would make following unethical practices for the benefit of the company.
1.         Dumping.
            Dumping means the act performed to crush other organization/companies to destroy the local competition by flooding the market and selling them at a much lower price. By the help of dumping company can be benefited. There is a saying that anything can be achieved only after losing something likewise I will manage to sell products at a lower price in order to enhance productivity and ultimately for future profit. On the other hand other companies lose their market. This unethical practice helps my company to attract customers.

2.         False advertising tactics:
         Nowadays, many more companies/organization is applying the same tactics to uplift their business. This is also one of the unethical acts perform to attract the customers. I will advertise about our, company, products, aim, objectives, etc. This tactic can make my company well known around the society. People will be excited to learn more about us. More number of customers can be increased in a short period of time. Strong relation can be established between customers and the company.

3.         Vacancy announcement tactics:

             In order to run the company smoothly, best employee is required. So for this I will rise up the salary of every particular post from top to bottom in the vacancy announcement. I will increase certain percentage more than the other companies do. Similarly, I will announce different types of bonus schemes for the employee. This tactic can increase number of best employee in my company.

Shopping mall in Biratnagar

There is a shopping mall named Nepal Bazar which is located in Biratnagar. I am well known about this organization. This organization was recently established in our society. Before this, there was no such type of organization. As this type of organization was launched for the first time in our society, many people were excited to know about this. In the initial phase this organization provided many schemes to the people. People felt more convenient after the existence   of this mall. 
    All sorts of goods were available in the same roof. Slowly and gradually this organization became more popular. There was a scheme, i.e. if any customer crosses 10,000 Rs while shopping they were given a discount card. Similarly, at the time of festival many schemes were announced. Some are like Shop for Rs.1000 in grocery and get many products absolutely free. They also announced that in every purchase anyone can get a chance to win a trip to Bangkok and many more. Also get 15% off at Nanglo Restaurant and 25% off at Neal David saloon with every coupon. Also get gift hamper on every purchase exceeding Rs.1000 at the grocery. They also announced many surprises, offers for the customer. Many people were attracted by this offer and number of customers was increased day by day. This organization also turns out to be the best shopping mall in the entire Morang district.


There is a shopping mall named Nepal Bazar which is located in Biratnagar. I am well known about this organization. This organization was recently established in our society. Before this, there was no such type of organization. As this type of organization was launched for the first time in our society, many people were excited to know about this. In the initial phase this organization provided many schemes to the people. People felt more convenient after the existence   of this mall. 
    All sorts of goods were available in the same roof. Slowly and gradually this organization became more popular. There was a scheme, i.e. if any customer crosses 10,000 Rs while shopping they were given a discount card. Similarly, at the time of festival many schemes were announced. Some are like Shop for Rs.1000 in grocery and get many products absolutely free. They also announced that in every purchase anyone can get a chance to win a trip to Bangkok and many more. Also get 15% off at Nanglo Restaurant and 25% off at Neal David saloon with every coupon. Also get gift hamper on every purchase exceeding Rs.1000 at the grocery. They also announced many surprises, offers for the customer. Many people were attracted by this offer and number of customers was increased day by day. This organization also turns out to be the best shopping mall in the entire Morang district.


Clever code


Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh.
While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5.
One big change brought in with HTML 5 lets websites store more data locally on visitors' PCs. Safeguards built into the "local storage" specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored.
However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.
Only Mozilla's Firefox capped storage at 5MB and was not vulnerable, he found.
"Cleverly coded websites have effectively unlimited storage space on visitor's computers," wrote Mr Aboukhadijeh in a blogpost about the bug.
Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed.
In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers.

Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh.
While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5.
One big change brought in with HTML 5 lets websites store more data locally on visitors' PCs. Safeguards built into the "local storage" specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored.
However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.
Only Mozilla's Firefox capped storage at 5MB and was not vulnerable, he found.
"Cleverly coded websites have effectively unlimited storage space on visitor's computers," wrote Mr Aboukhadijeh in a blogpost about the bug.
Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed.
In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers.

NEWS Update

Google AdSense is one of the largest advertising solutions for abundant number of publishers; probably it is one of the best. Google AdSense provides various features and currently it has updated its Term of Service. Google has announced that the change will go into effect from April 23rd. 

Google says the chief things that are changing in new version of the terms will regarding mobile properties. Further, they have also added some extra stuff for video and media players. .....
Google AdSense is one of the largest advertising solutions for abundant number of publishers; probably it is one of the best. Google AdSense provides various features and currently it has updated its Term of Service. Google has announced that the change will go into effect from April 23rd. 

Google says the chief things that are changing in new version of the terms will regarding mobile properties. Further, they have also added some extra stuff for video and media players. .....

Which cyber-crime is leading the world?

 TERM PAPER


PAPER TITLE: Which cyber-crime is leading the world?


DEERWALK INSTITUE OF TECHNOLOGY
SCHOOL OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY
SIFAL, KATHMANDU, NEPAL.




SUBMITTED DATE: 9/25/2013





Contents
introduction………………………………………………………………………………………………..1
cyber attacks. 3

Abstract

Cyber-crime is the crime committed using a computer and the internet to steal a person’s identity or sell contraband or stalk victims or disrupts operations with malevolent programs. It is one of the fastest-growing types of illegal activity. It has been estimated that about 556 million people are victims of cyber-crime per year. This paper gives detailed information regarding cybercrime, its causes and the people who are responsible for it. I have found that malware is most in practice. At last I found that mobile threat is the most dangerous cyber-crime leading the world.

Introduction

Cyber is a prefix that means computer or computer network whereas crime is an action that is deemed injurious to the public welfare and is legally prohibited.  So, the crime committed using a computer and the internet to steal a person's identity or sell contraband or stalk victims or disrupt operations with malevolent programs is known as cyber-crime. The term “cyber-crime” was first coined by Barry Collins in 1980’s.  In simple words, cyber-crime refers to any crime that involves a computer and a network. It is one of the fastest-growing types of illegal activity. It has been estimated that about 556 million people are victims of cyber-crime per year. More than 600,000 Facebook accounts are compromised every day whereas 15% of social network users have reported that their profiles have been hacked by pretenders. Also, 1 in 10 social network users said they’d fallen victim to a scam or fake link on social network platforms. Computer crime encompasses a broad range of activities. Generally, however, it may be divided into two categories.
·         Crimes that target computers directly
·         Crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.
Crimes that primarily target computer networks or devices include Computer viruses, Denial-of-service attacks and Malware (malicious code) whereas crimes that use computer networks or devices to advance other ends include cyber stalking, fraud and identity theft, information warfare and phishing scams.

Methodology

This research is fully web based. Researches done previously were taken as main reference. All the findings included here are based on internet. I got lots of difficulties during data collection. It is not easy doing any research likewise this research wasn’t easy for me. I went through many papers done previously by experts. I studied every data related to my topic. And finally, I concluded my paper by finding mobile threat as the most dangerous cyber-crime. In this way, I collected the required data and prepared this paper.
Lack of evidence is one of the main causes for cyber-crime. Other causes include confidential information, negligence, complexity of codes, accessibility of victims, etc. Since catching such criminals is difficult, they are increasing day by day. Hence, this has led to a rise in cyber-crime across the world.
Who are responsible?
Most cyber-crimes are committed by individuals or small groups which mostly includes teenagers. However, large organized crime groups are also involved in cyber crime. These professional criminals treat cyber-crime like a business and form global criminal communities. They are not only letting themselves to earn more money but also destructing the whole world.

 Note:Research charts are not displayed in this paper.
Sources are mention in the orginal paper
Cyber attacks
The most common cyber-attacks with their occurrences are as follows
 Attack Types
%
Viruses, malware, worms, Trojans
50%
Criminal insider
33%
Theft of data-bearing devices
28%
SQL injection
28%
Phishing
22%
Web-based attacks
17%
Social engineering
17%
Other
11%

                                                                                       
This data shows that the occurrence of malware is 50% which means malware is leading cyber-crime.

Malware

Malware, short for malicious software, is software that is intended to damage or disable computers and computer systems. It includes computer viruses, computer worms, Trojan horses and other malicious and unwanted software. Malware is made by attackers to disrupt computer operation, gather sensitive information or gain access to private computer systems.
In these days, malwares on mobile phones, also known as mobile threat is increasing day by day.
Mobile Threats
Mobile devices are the fastest growing consumer technology, with worldwide unit sales expected to increase from 300 million in 2010, to 650 million in 2012. Mobile applications are likewise booming. In June 2011, it was found that people on average spent more time using mobile applications than browsing the mobile web. The incentives for cyber-criminals increases as mobile devices grow in popularity. Studies have shown that cyber criminals experiment with new business models specially by targeting mobile phones. Mobile users are not even safe while downloading applications from apps store. Recently over 250,000 Android users had mobile attack when they downloaded malicious software disguised as legitimate applications from the Android Market.
The statistics of Kaspersky Lab indicated this is the first time for the total number of malicious programs for Android exceeding that for Java 2 Micro Edition (J2ME). Over the last two years, the most prevalent platform for malware has been J2ME among mobile threats. However, this dramatic change indicates that virus writers tend to concentrate on Android malware, which is a promising mobile platform. At the end of October, the experts in Kaspersky Lab had detected 1,916 malware for Android belonging to 92 malware families, at the same time, 1,610 variations from 60 families were detected for J2ME. In all, the total number of mobile threats detected in October is 4,053 from 289 families. Figure 1 shows the details of malicious programs for all mobile platforms.

Figure 1: Breakdown of malicious programs for all mobile platforms
                                                     
                                               

Figure: Smartphone sales to end users by operating system in the Second Quarter of 2012, Gartner     
                       


Conclusion
This paper was started with the introduction of cyber-crime.  I found malware to be leading cyber-crime among other types. Within malware, short for malicious software, I found mobile threat is increasing rapidly. From this research, I found that no one is safe from having any kind of cyber attacks. Not even apps store of mobile phone is free from malware. We may be attacked at anytime and anywhere.  So the risk is high and we must be well concerned on minimizing such cyber-crimes.


 TERM PAPER


PAPER TITLE: Which cyber-crime is leading the world?


DEERWALK INSTITUE OF TECHNOLOGY
SCHOOL OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY
SIFAL, KATHMANDU, NEPAL.




SUBMITTED DATE: 9/25/2013





Contents
introduction………………………………………………………………………………………………..1
cyber attacks. 3

Abstract

Cyber-crime is the crime committed using a computer and the internet to steal a person’s identity or sell contraband or stalk victims or disrupts operations with malevolent programs. It is one of the fastest-growing types of illegal activity. It has been estimated that about 556 million people are victims of cyber-crime per year. This paper gives detailed information regarding cybercrime, its causes and the people who are responsible for it. I have found that malware is most in practice. At last I found that mobile threat is the most dangerous cyber-crime leading the world.

Introduction

Cyber is a prefix that means computer or computer network whereas crime is an action that is deemed injurious to the public welfare and is legally prohibited.  So, the crime committed using a computer and the internet to steal a person's identity or sell contraband or stalk victims or disrupt operations with malevolent programs is known as cyber-crime. The term “cyber-crime” was first coined by Barry Collins in 1980’s.  In simple words, cyber-crime refers to any crime that involves a computer and a network. It is one of the fastest-growing types of illegal activity. It has been estimated that about 556 million people are victims of cyber-crime per year. More than 600,000 Facebook accounts are compromised every day whereas 15% of social network users have reported that their profiles have been hacked by pretenders. Also, 1 in 10 social network users said they’d fallen victim to a scam or fake link on social network platforms. Computer crime encompasses a broad range of activities. Generally, however, it may be divided into two categories.
·         Crimes that target computers directly
·         Crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.
Crimes that primarily target computer networks or devices include Computer viruses, Denial-of-service attacks and Malware (malicious code) whereas crimes that use computer networks or devices to advance other ends include cyber stalking, fraud and identity theft, information warfare and phishing scams.

Methodology

This research is fully web based. Researches done previously were taken as main reference. All the findings included here are based on internet. I got lots of difficulties during data collection. It is not easy doing any research likewise this research wasn’t easy for me. I went through many papers done previously by experts. I studied every data related to my topic. And finally, I concluded my paper by finding mobile threat as the most dangerous cyber-crime. In this way, I collected the required data and prepared this paper.
Lack of evidence is one of the main causes for cyber-crime. Other causes include confidential information, negligence, complexity of codes, accessibility of victims, etc. Since catching such criminals is difficult, they are increasing day by day. Hence, this has led to a rise in cyber-crime across the world.
Who are responsible?
Most cyber-crimes are committed by individuals or small groups which mostly includes teenagers. However, large organized crime groups are also involved in cyber crime. These professional criminals treat cyber-crime like a business and form global criminal communities. They are not only letting themselves to earn more money but also destructing the whole world.

 Note:Research charts are not displayed in this paper.
Sources are mention in the orginal paper
Cyber attacks
The most common cyber-attacks with their occurrences are as follows
 Attack Types
%
Viruses, malware, worms, Trojans
50%
Criminal insider
33%
Theft of data-bearing devices
28%
SQL injection
28%
Phishing
22%
Web-based attacks
17%
Social engineering
17%
Other
11%

                                                                                       
This data shows that the occurrence of malware is 50% which means malware is leading cyber-crime.

Malware

Malware, short for malicious software, is software that is intended to damage or disable computers and computer systems. It includes computer viruses, computer worms, Trojan horses and other malicious and unwanted software. Malware is made by attackers to disrupt computer operation, gather sensitive information or gain access to private computer systems.
In these days, malwares on mobile phones, also known as mobile threat is increasing day by day.
Mobile Threats
Mobile devices are the fastest growing consumer technology, with worldwide unit sales expected to increase from 300 million in 2010, to 650 million in 2012. Mobile applications are likewise booming. In June 2011, it was found that people on average spent more time using mobile applications than browsing the mobile web. The incentives for cyber-criminals increases as mobile devices grow in popularity. Studies have shown that cyber criminals experiment with new business models specially by targeting mobile phones. Mobile users are not even safe while downloading applications from apps store. Recently over 250,000 Android users had mobile attack when they downloaded malicious software disguised as legitimate applications from the Android Market.
The statistics of Kaspersky Lab indicated this is the first time for the total number of malicious programs for Android exceeding that for Java 2 Micro Edition (J2ME). Over the last two years, the most prevalent platform for malware has been J2ME among mobile threats. However, this dramatic change indicates that virus writers tend to concentrate on Android malware, which is a promising mobile platform. At the end of October, the experts in Kaspersky Lab had detected 1,916 malware for Android belonging to 92 malware families, at the same time, 1,610 variations from 60 families were detected for J2ME. In all, the total number of mobile threats detected in October is 4,053 from 289 families. Figure 1 shows the details of malicious programs for all mobile platforms.

Figure 1: Breakdown of malicious programs for all mobile platforms
                                                     
                                               

Figure: Smartphone sales to end users by operating system in the Second Quarter of 2012, Gartner     
                       


Conclusion
This paper was started with the introduction of cyber-crime.  I found malware to be leading cyber-crime among other types. Within malware, short for malicious software, I found mobile threat is increasing rapidly. From this research, I found that no one is safe from having any kind of cyber attacks. Not even apps store of mobile phone is free from malware. We may be attacked at anytime and anywhere.  So the risk is high and we must be well concerned on minimizing such cyber-crimes.


Hacking, a leading crime.


 TERM PAPER


PAPER TITLE: Hacking, a leading crime.


DEERWALK INSTITUE OF TECHNOLOGY
SCHOOL OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY
SIFAL, KATHMANDU, NEPAL.


NAME: Suman Thapa
ROLL NUMBER:0215
CLASS: 0216 ‘A’



SUBMITTED DATE: 9/24/2013





Contents
Methodology…….………………………………………………………………………..………………..1
History of hacking…………………………………………………………………………………………..2
Charts..…………………………………………………………………………..........................................2

Abstract

Nowadays Hacking has been one of the common practices made by the computer expert in order to try
and find vulnerabilities in a network infrastructure. In this paper I have mentioned three different types
of Hacker i.e. White Hat Hacker, Grey Hat Hacker and Black Hat hacker. White Hat Hacking is the practice made by the hackers to dominant the world by their criminal skills. It is used in the profit making purpose.  Whereas Grey Hat Hacker is a Hacker who is part White Hat and part Black Hat. They can be both helpful and harmful purpose. Grey Hat Hackers can also be known as ethical hackers. Similarly last and most demanding types of hacker known as Black Hat Hacker is described in this paper. It is also known as cracker or dark side hacker. Further, we talk about Daily trends of hacking attacks including Distribution of Attack Techniques and Distribution of Targets. We also found which country has high risk of hacking. In this way I also have found the preventive measures for being safe from hackers.

Introduction

The word ‘hack’ refers to use a computer to gain unauthorized access to data in a system. When someone modifies computer hardware or software in a way that alters the creator's original intent, it is known as computer hacking and People who hack computers are called hackers. Nowadays Hacking has been one of the common practices made by the computer expert in order to try and find vulnerabilities in a network infrastructure. There are  different types of hacking  White Hat Hacking, Grey Hat Hacking and Black Hat hacking. White Hat Hacking is the practice made by the hackers to dominant the world by their criminal skills. It is used in the profit making purpose. Similarly other type of hacking is Grey Hat Hacking in which he or she is submerged in the world of hacking for non-profitable purpose Grey Hat Hackers can also be known as ethical hackers. Similarly last and most high demanding types of hacking known as Black Hat Hacking is describe in this paper. It is also known as cracker or dark side hacker. In this types of hacking he or she is fully involve in profit making activities by destroying organization network, stealing others valuable data ,documents, hacking bank account and transferring  money to their own and so on.

Methodology
This research is based on internet. It is a totally web based research. Different types of hacking with their motivates are found using internet. Also the daily trend of attack is studied in this paper. The top 3 countries leading in high hacking is found on the basis of previous researches. Since, only few data were existed on the basis of objective of research so it took lot of time in searching. I went through almost all the search engines. Time taken for finding results differed in each search engines. However, I managed to do the best in my own view.

There are three types of hackers and they are white hat, grey hat, and black hat. 
White hat hackers : White Hat Hacking is the practice made by the hackers to dominant the world by their criminal skills. It is used in the profit making purpose.
A Grey hat hacker is a Hacker who is part White Hat and part Black Hat. They can be both helpful and harmful, and should be treated with respect.
A Black hat hacker. In this types of hacking he or she is fully involve in profit making activities by destroying organization network, stealing others valuable data ,documents, hacking bank account and transferring  money to their own and so on.
History of hacking
Nowadays many people have different views on the hacking scenes. The origin of the term "hacker began in the 1960s at MIT (Massachusetts Institute of Technology) similarly during 1960s hackers emerged out of the artificial intelligence labs at MIT.
In1969, Bell Labs employee Ken Thompson invented UNIX. Then in 1970s, Dennis Ritchie invented "C” programming language which was specifically invented to be used with UNIX. ARPANET (
Advanced Research Projects Agency Network) was founded by the Department of Defense as a means to link government offices later on it was evolved into internet.
Charts
Here the summer shows its effects showing a constantly decreasing shape after the peak occurred the 15th
Sorry 4 the technical error
Below is the chart of Distribution of Attack Techniques and it is found that Defacements lead the Chart. Also the account Hijackings are becoming very popular. Whereas SQLi and DDoS are out from the first three ranks. Defacements are taken into consideration only when they are meaningful, that is targeting Governmental primary domains or high profile targets, or also when they cause the leaking of data.
Sorry 4 the technical error
The Distribution of Targets Chart below confirms governmental targets at the first place with nearly 30%, immediately followed by, as usual, industries (18.8%) & organizations (12.5%). In any case the level of attention of crooks is also high against targets belonging to the Financial and News sector, which steadily rank respectively at number 4 & 5 of this unwelcome chart with the 10.9% and 9.4%.

Sorry 4 the technical error
                                                            
Hacking attacks in US , India and China
Here are the 3 countries with respective data showing their hacking statistics
1. United States
The United States topped in overall malicious activity measured by Symantec, with 19 percent of the total in 2009. This is a drop from 23 per cent in 2008. The United States was the country of the most bot-infected computers observed by Symantec in 2009, accounting for 11 per cent of the global total, a slight decrease from 12 percent in 2008. It also topped as the No.1 country of origin for Web-based attacks in 2009, accounting for 34 per cent of the worldwide total.
2. China
China is ranked second in the list in terms of bots and origin of most attacks. It is ranked sixth in terms of phishing hosts and eighth in terms of spam zombies. China was at the same position last year also.
3. India
India is the world's third largest hotspot of malicious activity, according to Symantec's Internet Security Threat report. The top Web-based attack in 2009 was associated with malicious PDF activity, which accounted for 49 percent of the total attacks. The education sector accounted for 20 percent of data breaches that could lead to identity theft during this period, more than any other sector; this is a decrease from 27 percent in 2008, when it was also the highest ranked sector for data breaches. Symantec observed an average of 46,541 active bot-infected computers per day in 2009; this is a 38 percent decrease from the 75,158 per day average observed in 2008. The report pointed out that 'bot' or 'robot software' is being highly preferred in cyber-attacks.
 We can take following steps for prevention of hacking:
·         Harden our system by deactivating unnecessary software.
·         Installing Firewall on the system.
·         Not using same password for multiple account.
·         Using encrypted connection.
Conclusion    
Hence, from this research, it can be concluded that hacking is increasing day by day. US are leading in having hacking attacks whereas China and India are on second and third position. We know these countries are also leading in development in many fields. If such countries are not safe from hacking then no one else is safe which ultimately means we may be hacked at any time anywhere. So, we can call hacking as a leading crime.



 TERM PAPER


PAPER TITLE: Hacking, a leading crime.


DEERWALK INSTITUE OF TECHNOLOGY
SCHOOL OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY
SIFAL, KATHMANDU, NEPAL.


NAME: Suman Thapa
ROLL NUMBER:0215
CLASS: 0216 ‘A’



SUBMITTED DATE: 9/24/2013





Contents
Methodology…….………………………………………………………………………..………………..1
History of hacking…………………………………………………………………………………………..2
Charts..…………………………………………………………………………..........................................2

Abstract

Nowadays Hacking has been one of the common practices made by the computer expert in order to try
and find vulnerabilities in a network infrastructure. In this paper I have mentioned three different types
of Hacker i.e. White Hat Hacker, Grey Hat Hacker and Black Hat hacker. White Hat Hacking is the practice made by the hackers to dominant the world by their criminal skills. It is used in the profit making purpose.  Whereas Grey Hat Hacker is a Hacker who is part White Hat and part Black Hat. They can be both helpful and harmful purpose. Grey Hat Hackers can also be known as ethical hackers. Similarly last and most demanding types of hacker known as Black Hat Hacker is described in this paper. It is also known as cracker or dark side hacker. Further, we talk about Daily trends of hacking attacks including Distribution of Attack Techniques and Distribution of Targets. We also found which country has high risk of hacking. In this way I also have found the preventive measures for being safe from hackers.

Introduction

The word ‘hack’ refers to use a computer to gain unauthorized access to data in a system. When someone modifies computer hardware or software in a way that alters the creator's original intent, it is known as computer hacking and People who hack computers are called hackers. Nowadays Hacking has been one of the common practices made by the computer expert in order to try and find vulnerabilities in a network infrastructure. There are  different types of hacking  White Hat Hacking, Grey Hat Hacking and Black Hat hacking. White Hat Hacking is the practice made by the hackers to dominant the world by their criminal skills. It is used in the profit making purpose. Similarly other type of hacking is Grey Hat Hacking in which he or she is submerged in the world of hacking for non-profitable purpose Grey Hat Hackers can also be known as ethical hackers. Similarly last and most high demanding types of hacking known as Black Hat Hacking is describe in this paper. It is also known as cracker or dark side hacker. In this types of hacking he or she is fully involve in profit making activities by destroying organization network, stealing others valuable data ,documents, hacking bank account and transferring  money to their own and so on.

Methodology
This research is based on internet. It is a totally web based research. Different types of hacking with their motivates are found using internet. Also the daily trend of attack is studied in this paper. The top 3 countries leading in high hacking is found on the basis of previous researches. Since, only few data were existed on the basis of objective of research so it took lot of time in searching. I went through almost all the search engines. Time taken for finding results differed in each search engines. However, I managed to do the best in my own view.

There are three types of hackers and they are white hat, grey hat, and black hat. 
White hat hackers : White Hat Hacking is the practice made by the hackers to dominant the world by their criminal skills. It is used in the profit making purpose.
A Grey hat hacker is a Hacker who is part White Hat and part Black Hat. They can be both helpful and harmful, and should be treated with respect.
A Black hat hacker. In this types of hacking he or she is fully involve in profit making activities by destroying organization network, stealing others valuable data ,documents, hacking bank account and transferring  money to their own and so on.
History of hacking
Nowadays many people have different views on the hacking scenes. The origin of the term "hacker began in the 1960s at MIT (Massachusetts Institute of Technology) similarly during 1960s hackers emerged out of the artificial intelligence labs at MIT.
In1969, Bell Labs employee Ken Thompson invented UNIX. Then in 1970s, Dennis Ritchie invented "C” programming language which was specifically invented to be used with UNIX. ARPANET (
Advanced Research Projects Agency Network) was founded by the Department of Defense as a means to link government offices later on it was evolved into internet.
Charts
Here the summer shows its effects showing a constantly decreasing shape after the peak occurred the 15th
Sorry 4 the technical error
Below is the chart of Distribution of Attack Techniques and it is found that Defacements lead the Chart. Also the account Hijackings are becoming very popular. Whereas SQLi and DDoS are out from the first three ranks. Defacements are taken into consideration only when they are meaningful, that is targeting Governmental primary domains or high profile targets, or also when they cause the leaking of data.
Sorry 4 the technical error
The Distribution of Targets Chart below confirms governmental targets at the first place with nearly 30%, immediately followed by, as usual, industries (18.8%) & organizations (12.5%). In any case the level of attention of crooks is also high against targets belonging to the Financial and News sector, which steadily rank respectively at number 4 & 5 of this unwelcome chart with the 10.9% and 9.4%.

Sorry 4 the technical error
                                                            
Hacking attacks in US , India and China
Here are the 3 countries with respective data showing their hacking statistics
1. United States
The United States topped in overall malicious activity measured by Symantec, with 19 percent of the total in 2009. This is a drop from 23 per cent in 2008. The United States was the country of the most bot-infected computers observed by Symantec in 2009, accounting for 11 per cent of the global total, a slight decrease from 12 percent in 2008. It also topped as the No.1 country of origin for Web-based attacks in 2009, accounting for 34 per cent of the worldwide total.
2. China
China is ranked second in the list in terms of bots and origin of most attacks. It is ranked sixth in terms of phishing hosts and eighth in terms of spam zombies. China was at the same position last year also.
3. India
India is the world's third largest hotspot of malicious activity, according to Symantec's Internet Security Threat report. The top Web-based attack in 2009 was associated with malicious PDF activity, which accounted for 49 percent of the total attacks. The education sector accounted for 20 percent of data breaches that could lead to identity theft during this period, more than any other sector; this is a decrease from 27 percent in 2008, when it was also the highest ranked sector for data breaches. Symantec observed an average of 46,541 active bot-infected computers per day in 2009; this is a 38 percent decrease from the 75,158 per day average observed in 2008. The report pointed out that 'bot' or 'robot software' is being highly preferred in cyber-attacks.
 We can take following steps for prevention of hacking:
·         Harden our system by deactivating unnecessary software.
·         Installing Firewall on the system.
·         Not using same password for multiple account.
·         Using encrypted connection.
Conclusion    
Hence, from this research, it can be concluded that hacking is increasing day by day. US are leading in having hacking attacks whereas China and India are on second and third position. We know these countries are also leading in development in many fields. If such countries are not safe from hacking then no one else is safe which ultimately means we may be hacked at any time anywhere. So, we can call hacking as a leading crime.