Thursday 1 November 2012

Cyber Crime


Types of Cyber Crime

• HACKING
• DENIAL OF SERVICE ATTACK
• VIRUS DISSEMINATION

• SOFTWARE PIRACY
• PORNOGRAPHY
• IRC Crime
• CREDIT CARD FRAUD
• NET EXTORTION
• PHISHING
• SPOOFING
• CYBER STALKING
• CYBER

1) HACKING

Hacking in simple terms means illegal
intrusion into a computer system without the
permission of the computer owner/user.

2)DENIAL OF SERVICE ATTACK

Thiis iis an act by the criimiinall,, who
flloods the bandwiidth of the viictiim’’s
network or fiilllls hiis e-maiill box wiith
spam maiill depriiviing hiim of the
serviices he iis entiitlled to access

3)VIRUS DISSEMINATION

• Malliiciious sofftware that attaches iitsellff to
other sofftware..
(viirus,, worms,, Trojjan Horse,, Tiime bomb,,
Logiic Bomb,, Rabbiit and Bacteriium are the
malliiciious sofftwares

4)SOFTWARE PIRACY

• Theft of software through the iillllegall copyiing of
genuiine programs or the counterfeiitiing and
diistriibutiion of products iintended to pass for the
oriigiinall..
• Retaiill revenue llosses worlldwiide are ever
iincreasiing due to thiis criime
• Can be done iin variious ways-
End user copyiing,, Hard diisk lloadiing,, Countterfeiittiing,,
Illllegall downlloads from tthe iintternett ettc..

5)PORNOGRAPHY

• Pornography is the first consistently successful ecommerce
product.
• Deceptive marketing tactics and mouse trapping
technologies Pornography encourage customers
to access their websites.
• Anybody including children can log on to the
internet and access websites with pornographic
contents with a click of a mouse.
• Publishing, transmitting any material in electronic
form which is lascivious or appeals to the prurient
interest is an offence under the provisions of
section 67 of I.T. Act -2000.


6) IRC CRIME

Internet Relay Chat (IRC) servers have
chat rooms in which people from
anywhere the world can come together
and chat with each other
• Criminals use it for meeting coconspirators.
• Hackers use it for discussing their
exploits / sharing the techniques
• Paedophiles use chat rooms to allure small
children
• Cyber Stalking - In order to harass a woman
her telephone number is given to others as if she
wants to befriend males

7) CREDIT CARD FRAUD

You siimplly have to type crediit card
number iinto www page off the vendor ffor
onlliine transactiion
Iff ellectroniic transactiions are not secured
the crediit card numbers can be stollen by
the hackers who can miisuse thiis card by
iimpersonatiing the crediit card owner

8) NET EXTORTION

• Copyiing the company’’s conffiidentiiall data
iin order to extort saiid company ffor huge
amount..

9) PHISHING

It is technique of pulling out
confidential information from the
bank/financial institutional
account holders by deceptive
means

10) Spoofiing

• Gettiing one computer on a network to
pretend to have the iidentiity off another
computer,, usualllly one wiith speciiall access
priiviilleges ,, so as to obtaiin access to the
other computers on the network

11) CYBER STALKING

The Criimiinall ffollllows the viictiim by
sendiing emaiills,, enteriing the chat rooms
ffrequentlly..

12) CYBER DEFAMATION

The Criminal sends emaiills contaiiniing
deffamatory matters to allll concerned off
the viictiim or post the deffamatory matters
on a websiite..
(diisgruntlled emplloyee may do thiis agaiinst
boss,, ex-boys ffriiend agaiinst giirll,, diivorced
husband agaiinst wiiffe etc)

13) THREATENING

The Criimiinall sends threateniing emaiill
or comes iin contact iin chat rooms wiith
viictiim..
(Any one diisgruntlled may do thiis agaiinst
boss,, ffriiend or offffiiciiall)

14) SALAMI ATTACK

In such crime criminal makes insignificant
changes in such a manner that such changes
would go unnoticed.
Criminal makes such program that deducts
small amount like Rs. 2.50 per month from the
account of all the customer of the Bank and
deposit the same in his account. In this case no
account holder will approach the bank for such
small amount but criminal gains huge amount.

15) SALE OF NARCOTICS

• Salle & Purchase through net..
• There are web siite whiich offffer salle and
shiipment off contrabands drugs..
• They may use the techniiques off
stegnography ffor hiidiing the messages..



PLEASE SHARE YOUR VALUABLE COMMENTS WITH US

No comments:

Post a Comment