It is a Criminal Activity Committed On The Internet. A generalized definition of Cyber Crime May Be...
-
Upload
leon-anderson -
Category
Documents
-
view
213 -
download
0
Transcript of It is a Criminal Activity Committed On The Internet. A generalized definition of Cyber Crime May Be...
CYBERCRIME
CYBER CRIME It is a Criminal Activity Committed On The
Internet.
A generalized definition of Cyber Crime May
Be “Unlawful Acts wherein the computer is either A tool or target or both”.
Cyber crime offenses against the information technology infrastructure
CYBER CRIME Such conducts includes:-Illegal access-Illegal interception-System interference-Data interference-Misuse of device-Fraud-Forgery
We can categorize cyber crime in two ways:
The computer as a target using a computer to attack other computers.
Hacking, virus/worm attacks, DoS(Denial of Service) attack etc.
The computer as a weapon using a computer to commit real world crimes. Cyber terrorism, Credit cards frauds etc.
Unauthorized access in Hacking Unauthorized access therefore mean
any kind of access without the permission of
either the rightful owner or the person in
charge of a computer, computer system or computer network.
Hackers write or use ready-made computer programs to attack to attack the target computer
E-mail related crimes: Email spamming Email “spamming” refers to sending
email to thousands and thousands of users-similar to a chain letter.
Sending malicious code through email.
Emails are used to send viruses etc. through emails as an attachment or by sending a link of website which on visiting downloads malicious code.
Denial of service(Dos)attack Flooding a computer resource with
more request than it can handle. This causes the resource to crash thereby denying access of service to unauthorized users:
ExampleAttempts to flood a network, there by
preventing legitimate network traffic .
Forgery
Counterfeit currency notes, postage and revenue stamps, marks sheets etc can be forged using sophisticated computers, printers and scanners.
Drug Trafficking Drug traffickers are increasingly taking
advantage of the Internet. To sell their illegal substances through
encrypted e-mail and other Internet Technology. Some drug traffickers arrange deals at internet cafes, use courier Web sites to track illegal packages of pills, and swap recipes for amphetamines in restricted-access chat rooms.
Cyber Terrorism
Targeted attacks on military installations, power plants, air traffic control, banks, telecommunication networks are the most likely. Others like police, medical, fire and rescue systems etc.
Cyber terrorism is an attractive option for modern terrorists for several reasons
Comparison between TraditionalCriminal Techniques and Cyber crime
The U.S. Department of Defense (DoD) notes that cyberspace has emerged as a national-level concern through several recent events of geo-strategic significance. Among those are included the attack on Estonia's infrastructure in 2007, allegedly by Russian hackers. "In August 2008, Russia again allegedly conducted cyber attacks, this time in a coordinated and synchronized kinetic and non-kinetic campaign against the country of Georgia.
Cyber Warfare
Sailors analyze, detect and defensively respond to unauthorized activity within U.S. Navy information systems and computer networks
References http://en.wikipedia.org/wiki/Computer_crime http://www.google.com.ph/search?
q=Cyber+terrorism&client=firefox-a&hs=P9j&rls=org.mozilla:en-US:official&source=lnms&tbm=isch&sa=X&ei=nzwTUqOlLea5iQfA8YCQBw&ved=0CAkQ_AUoAQ&biw=1440&bih=797#facrc=_&imgdii=_&imgrc=w5kqyTCswucaGM%3A%3Bja-Ne1lefcklQM%3Bhttp%253A%252F%252F2we26u4fam7n16rz3a44uhbe1bq2.wpengine.netdna-cdn.com%252Fwp-content%252Fuploads%252F122112_1429_Cyberterror1.jpg%3Bhttp%253A%252F%252Fresources.infosecinstitute.com%252Fcyberterrorism-distinct-from-cybercrime%252F%3B846%3B761