Вы находитесь на странице: 1из 11

CYBER CRIME AND SECURITY

CONTENTS
Cyber crime
Specific computer crimes
Spam
Phishing
Fraud
Obscene or offensive content
Harassment
Drug trafficking
Cyberterrorism
Documented cases
Applicable laws
Security
Approaches
Some techniques
Applications
Conclusion.

Conventional crimes llike Forgery,, extortion,,
kidnapping
etc.. are being committed with tthe hellp of computers
New generation iis growing up with computers
MOST IMPORTANT - Monetary ttransactions
are moving on to the INTERNET
Computer crime, cybercrime, e-crime, hi-tech
crime or electronic crime generally refers to criminal
activity where a computer or network is the source, tool,
target, or place of a crime
Examples of crimes that merely use computer
networks or devices would include,
Cyber stalking
Fraud and identity theft
Phishing scams
Information warfare
In some legal systems, intangible property cannot
be stolen and the damage must be visible, e.g. as
resulting from a blow from a hammer. Where
human-centric terminology is used for crimes
relying on natural language skills and innate
gullibility
A computer can be a source of evidence. Even
though the computer is not directly used for criminal
purposes, it is an excellent device for record
keeping, particularly given the power to encrypt the
data
Phishing
Phishing is a technique used by strangers to "fish"
for information about you, information that you
would not normally disclose to a stranger, such as
your bank account number, PIN, and other personal
identifiers such as your National Insurance number.
These messages often contain company/bank
logos that look legitimate and use flowery or
legalistic language about improving security by
confirming your identity details
Computer fraud is any dishonest misrepresentation of fact
intended to induce another to do or refrain from doing something
which causes loss.In this context, the fraud will result in obtaining
a benefit by:
altering computer input in an unauthorized way. This requires
little technical expertise and is not an uncommon form of theft by
employees altering the data before entry or entering false data,
or by entering unauthorized instructions or using unauthorized
processes;
altering, destroying, suppressing, or stealing output, usually to
conceal unauthorized transactions: this is difficult to detect;
altering or deleting stored data; or
altering or misusing existing system tools or software packages,
or altering or writing code for fraudulent purposes. This requires
real programming skills and is not common.
Other forms of fraud may be facilitated using computer systems,
including bank fraud, identity theft, extortion, and theft of
classified information(Csonka, 2000)

Computer fraud is any dishonest misrepresentation of fact
intended to induce another to do or refrain from doing something
which causes loss.In this context, the fraud will result in obtaining
a benefit by:
altering computer input in an unauthorized way. This requires
little technical expertise and is not an uncommon form of theft by
employees altering the data before entry or entering false data,
or by entering unauthorized instructions or using unauthorized
processes;
altering, destroying, suppressing, or stealing output, usually to
conceal unauthorized transactions: this is difficult to detect;
altering or deleting stored data; or
altering or misusing existing system tools or software packages,
or altering or writing code for fraudulent purposes. This requires
real programming skills and is not common.
Other forms of fraud may be facilitated using computer systems,
including bank fraud, identity theft, extortion, and theft of
classified information(Csonka, 2000)

Computer fraud is any dishonest misrepresentation of fact
intended to induce another to do or refrain from doing something
which causes loss.In this context, the fraud will result in obtaining
a benefit by:
altering computer input in an unauthorized way. This requires
little technical expertise and is not an uncommon form of theft by
employees altering the data before entry or entering false data,
or by entering unauthorized instructions or using unauthorized
processes;
altering, destroying, suppressing, or stealing output, usually to
conceal unauthorized transactions: this is difficult to detect;
altering or deleting stored data; or
altering or misusing existing system tools or software packages,
or altering or writing code for fraudulent purposes. This requires
real programming skills and is not common.
Other forms of fraud may be facilitated using computer systems,
including bank fraud, identity theft, extortion, and theft of
classified information(Csonka, 2000)

Вам также может понравиться