Вы находитесь на странице: 1из 9

Cyber Crimes Types: On Role of Computer

1.

Computer As a Mean When the individual is the main target of the crime, the computer can be considered the tool rather than the target. It Could be
A.

Spam: Spamming is the act of sending unsolicited messages to many users at a time, possibly up to the thousands, with the usual intention of advertising products to potential customers. Cyber Stalking: Getting the secret information from you without making you know about it.

B.

C.

Fraud: When the rip-off results in some form of financial harm, then it is called fraud.
q

Phishing: the act of sending faked e-mails to a user that falsely appears to come from a legitimate source.

Auction Fraud: Includes


Non Delivery, Giving false information about the item, Traingulation, Fee Stacking, Black Market Goods like pirated soft wares, Multiple Bidding Shill Bidding

Pyramid Schemes: This attracts the target by pay the money, develop the network and earn commission on a target reach.

Nigerian Scam: A letter informs the recipient about a major corporation, government agency or high-profile individuals (royalty or officials) who are in some sort of embarrassing or legal situation. The reward for lending a hand in

D.

Piracy: Piracy involves the illegal reproduction and distribution of software applications, games, movies and audio CDs. Can be done through copying the original or from Warez sites or through Cracking.

E.

Identity Theft: an unscrupulous person obtains enough of ones personal information to be able to impersonate you and use your identities to obtain financial gain.

F.

Cyber Pornography: This would include pornographic websites; pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc).

G.

Forgery: Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners.

Cyber Crimes Types: When Computer As a Target


2.

Computer As a Target
When the computer is the main target of the crime, the computer can be considered the target rather than the tool. Requires high technical knowledge. It Could be
A.

Network Intrusion: Involve unauthorized entry in the network and accessing the information he needs.

B.

Network Attack: Network attacks concern themselves mostly with bringing down a network in order that it becomes almost totally unusable. It includes:
q

Eavesdropping: secretly listening to the data traveling through the attacked network. Network Admn. Doesnt know about it.

Identity Spoofing: It involves tricking the network into believing that the hacker is using some other computer.

Denial for Service: DOS attack repeatedly attacks a particular network or server until it is too overwhelmed that it is brought down.

C.

Malware: Malware or malicious programs are written with the intention of causing various types of damages and nuisances to a computer and the information on the computer.
Viruses: A virus is a piece of computer code that hides within other programs so that it can spread from computer to computer, infecting as it travels. Viruses can damage software, your hardware, and files.
Worms: A worm, like a virus, is programmed to spread from one computer to another, but it does so without any user interaction. Worms do not need to travel through a "host" program or file. They can travel alone and replicate themselves in great volume. Worms slow down networks Trojans: computer programs that disguise themselves to be useful software, but instead they compromise your security and cause a lot of damage.

Cyber Crimes Types: When Computer As a Target


D.

Cyber Terrorism: the act of carrying out terrorism using cyberspace, or in other words, the Internet. It is the hacking or attacking of networks and computers to obtain or modify information for political and/or social objectives. Defacement: It is the act of intruding into a server and changing without permission all the aspects of a website which the public can see.

D.

People Behind Cyber crimes: Cyber criminals


A.

Categories
Kids (Age Group 9-16 etc.): They consider that hey know lot about computers and proud to hack a website for fun. Organized Hacktivists: Hacktivists are hackers with a particular (mostly political) motive. In other cases this reason can be social activism, religious activism, etc Disgruntled Employees: the increase independence on computers and the automation of processes, it is easier for disgruntled employees to do more harm to their employers by committing computer related crimes. Professional Hackers: All information are now a days in eformat. Rival organizations employ hackers to steal industrial secrets and other information that could be beneficial to them

Putting the public or any section of the public in fear

Motives Behind Cyber Crimes & Controls Authorities in India

Affecting adversely the harmony between different religious, racial, language or regional groups or castes or communities Coercing or overawing the government established by law Endangering the sovereignty and integrity of the nation.

Adjudicating Authorities & Laws in India:

Cyber Regulations Appellate Tribunal (CRAT). Cyber Crime Investigation Cell Jurisdictional Procedure The Information Technology Act 2000

1.

Tools & Techniques Used in Cyber Crimes

2.

3. 4.

5.

Unauthorized Access: "Access" is defined in Section 2(1)(a) of the Information Technology Act as "gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network". Unauthorized access would therefore mean any kind of access without the permission Packet Sniffing: A person is trying to access to the whole process -'C' wishes to intercept the transmission between 'A' and 'B', he would have intercept the data packets and then go on to translate them back from hex to the actual data. Tempest Attack: Tempest is the ability to monitor electromagnetic emissions from computers in order to reconstruct the data. Password Cracking: computer attempts to "cache" the password so that internal prompts during the same session do not cause external prompts to the user and this cache can be hacked. Buffer Overflow: It involves input of excessive data into a computer. The excess data "overflows" into other areas of the computer's memory. This allows the hacker to insert executable code along with the input, thus enabling the hacker to break into the computer.

Вам также может понравиться