It is a Criminal Activity Committed On The Internet. A generalized definition of Cyber Crime May Be...

Post on 23-Dec-2015

213 views 0 download

Transcript of It is a Criminal Activity Committed On The Internet. A generalized definition of Cyber Crime May Be...

CYBERCRIME

CYBER CRIME It is a Criminal Activity Committed On The

Internet.

A generalized definition of Cyber Crime May

Be “Unlawful Acts wherein the computer is either A tool or target or both”.

Cyber crime offenses against the information technology infrastructure

CYBER CRIME Such conducts includes:-Illegal access-Illegal interception-System interference-Data interference-Misuse of device-Fraud-Forgery

We can categorize cyber crime in two ways:

The computer as a target using a computer to attack other computers.

Hacking, virus/worm attacks, DoS(Denial of Service) attack etc.

The computer as a weapon using a computer to commit real world crimes. Cyber terrorism, Credit cards frauds etc.

Unauthorized access in Hacking Unauthorized access therefore mean

any kind of access without the permission of

either the rightful owner or the person in

charge of a computer, computer system or computer network.

Hackers write or use ready-made computer programs to attack to attack the target computer

E-mail related crimes: Email spamming Email “spamming” refers to sending

email to thousands and thousands of users-similar to a chain letter.

Sending malicious code through email.

Emails are used to send viruses etc. through emails as an attachment or by sending a link of website which on visiting downloads malicious code.

Denial of service(Dos)attack Flooding a computer resource with

more request than it can handle. This causes the resource to crash thereby denying access of service to unauthorized users:

ExampleAttempts to flood a network, there by

preventing legitimate network traffic .

Forgery

Counterfeit currency notes, postage and revenue stamps, marks sheets etc can be forged using sophisticated computers, printers and scanners.

Drug Trafficking Drug traffickers are increasingly taking

advantage of the Internet. To sell their illegal substances through

encrypted e-mail and other Internet Technology. Some drug traffickers arrange deals at internet cafes, use courier Web sites to track illegal packages of pills, and swap recipes for amphetamines in restricted-access chat rooms.

Cyber Terrorism

Targeted attacks on military installations, power plants, air traffic control, banks, telecommunication networks are the most likely. Others like police, medical, fire and rescue systems etc.

Cyber terrorism is an attractive option for modern terrorists for several reasons

Comparison between TraditionalCriminal Techniques and Cyber crime

The U.S. Department of Defense (DoD) notes that cyberspace has emerged as a national-level concern through several recent events of geo-strategic significance. Among those are included the attack on Estonia's infrastructure in 2007, allegedly by Russian hackers. "In August 2008, Russia again allegedly conducted cyber attacks, this time in a coordinated and synchronized kinetic and non-kinetic campaign against the country of Georgia.

Cyber Warfare

Sailors analyze, detect and defensively respond to unauthorized activity within U.S. Navy information systems and computer networks

References http://en.wikipedia.org/wiki/Computer_crime http://www.google.com.ph/search?

q=Cyber+terrorism&client=firefox-a&hs=P9j&rls=org.mozilla:en-US:official&source=lnms&tbm=isch&sa=X&ei=nzwTUqOlLea5iQfA8YCQBw&ved=0CAkQ_AUoAQ&biw=1440&bih=797#facrc=_&imgdii=_&imgrc=w5kqyTCswucaGM%3A%3Bja-Ne1lefcklQM%3Bhttp%253A%252F%252F2we26u4fam7n16rz3a44uhbe1bq2.wpengine.netdna-cdn.com%252Fwp-content%252Fuploads%252F122112_1429_Cyberterror1.jpg%3Bhttp%253A%252F%252Fresources.infosecinstitute.com%252Fcyberterrorism-distinct-from-cybercrime%252F%3B846%3B761