Publicité

Cyber crime

17 Mar 2013
Publicité

Contenu connexe

Publicité
Publicité

Cyber crime

  1. A Study on the Types of Cyber Crimes and Prevention Methods
  2. What is Cyber Crime? A generalized definition of cyber crime may be “unlawful acts wherein the computer is either a tool or target or both” The computer may be used as a tool in the following kinds of activity- financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber defamation, cyber stalking The computer may however be target for unlawful acts in the following cases- unauthorized access to computer/ computer system/ computer networks, theft of information contained in the electronic form, e-mail bombing, Trojan attacks, internet time thefts, theft of computer system, physically damaging the computer system
  3. Computer crimes encompass a broad range of potentially illegal activities. Generally, however, it may be divided into one of two types of categories (1) Crimes that target computer networks or devices directly; Examples -  Malware and malicious code, Denial-of-service attacks and Computing viruses (2) Crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device Examples -  Cyber stalking, Fraud and identity theft, Phishing scams and Information warfare
  4. The Tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders (Vienna, 10-17 April 2000) categorized five offenses as cyber-crime: unauthorized access, damage to computer data or programs, sabotage to hinder the functioning of a computer system or network, unauthorized interception of data to from and within a system or network, and computer espionage.
  5. Classification of Cyber Crimes The subject of cyber crime may be broadly classified under the following three groups. They are: 1. Against individuals  Their person  Their property of an individual. 2. Against an organization  Government  Firm, Company, Group of Individuals 3. Against the society at large
  6. Against Individuals:  Harassment via e-mails  Cyber-stalking  Dissemination of obscene material  Defamation  Unauthorized control/access over computer system  Indecent exposure  Email spoofing  Cheating & Fraud
  7. Against Individual Property:  Computer vandalism  Transmitting virus  Netrespass  Unauthorized control/access over computer system  Intellectual Property crimes  Internet time thefts Against an Organization:  Unauthorized control/access over computer system  Possession of unauthorized information  Cyber terrorism against the government organization  Distribution of pirated software
  8. Against the Society at large: -  Pornography (basically child pornography)  Polluting the youth through indecent exposure  Trafficking  Financial crimes  Sale of illegal articles  Online gambling  Forgery
  9. SPAM:  Spam, or the unsolicited sending of bulk email for commercial purposes, is unlawful to varying degrees. FRAUD:  Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss.  Forms of fraud may be facilitated using computer systems, including bank fraud, identity theft, extortion, and theft of classified information. A variety of Internet scams target consumers direct.
  10.  Valid credit card numbers can be intercepted electronically, as well as physically; the digital information stored on a card can be counterfeited.  Computer networks may also be used in furtherance of extortion. PHISHING:  It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means. SALAMI ATTACK:  In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed.
  11.  Criminal makes such program that deducts small amount like Rs. 2.50 per month from the account of all the customer of the Bank and deposit the same in his account.  In this case no account holder will approach the bank for such small amount but criminal gains huge amount OBSCENE OR OFFENSIVE CONTENT: -  Content considered by some to be objectionable exists in abundance in cyberspace.  This includes, among much else, sexually explicit materials, racist propaganda, and instructions for the fabrication of incendiary and explosive devices.  In some instances these communications may be illegal.
  12.  One area of Internet pornography that has been the target of the strongest efforts at curtailment is child pornography  According to Crime Research, child pornography involves distributing, trafficking, dissemination and posting any child- related obscene material  When executing this cyber crime, offenders will post obscene photos and videos of children and underage teenagers. They will provide these for free or charge a subscription fee to those who sign up for their websites
  13. HARASSMENT:  It involves violating the privacy of another person by using the Internet  Whereas content may be offensive in a non-specific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation  This often occurs in chat rooms, through newsgroups, and by sending hate e-mail to interested parties. Any comment that may be found derogatory or offensive is considered harassment
  14.  Cyber stalking involves following a person's movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat- rooms frequented by the victim, constantly bombarding the victim with emails etc.  Defamation is an act of imputing any person with intent to lower the person in the estimation of the right-thinking members of society generally or to cause him to be shunned or avoided or to expose him to hatred, contempt or ridicule.
  15. TRAFFICKING:  Trafficking may assume different forms. It may be trafficking in drugs, human beings, arms, weapons etc.  Drug traffickers are increasingly taking advantage of the Internet to sell their illegal substances through encrypted e- mail and other Internet Technology.  Some drug traffickers arrange deals at internet cafes, use courier Web sites to track illegal packages of pills, and swap recipes for amphetamines in restricted-access chat rooms.
  16. PIRACY:  Piracy is the act of copying copyrighted material  It involves the use of the Internet to market or distribute creative works protected by copyright  This has caused considerable concern to owners of copyrighted material. Each year, it has been estimated that losses of between US$15 and US$17 billion are sustained by industry by reason of copyright infringement HACKING:  It is hacking websites  This may be done for personal notoriety, the challenge, or a political message just as with traditional defacement of property. It can also include hacking into computer networks
  17. VIRUSES:  Viruses are sent to other people's computers to gain access to their personal information and to eventually destroy their hard drive.  To combat viruses, companies and individuals can purchase anti-virus software for their computer, avoid downloading anything unless they know the source is completely safe and not open emails from anyone they do not know
  18. Conclusion: The above forms of computer-related crime are not necessarily mutually exclusive, and need not occur in isolation  Computer-related crime may be compound in nature, combining two or more of the generic forms outlined above
  19. Child Pornography  The law enforcement agencies are trying to combat this cybercrime by working undercover online Viruses  To combat viruses, companies and individuals can purchase anti-virus software for their computer, avoid downloading anything unless they know the source is completely safe and not open emails from anyone they do not know. Cyber Harassment  To combat cyber harassment, individuals should report all suspected cases to their local law enforcement agency  Law enforcement agencies will take the proper measures to identify the harasser and may choose to prosecute them
  20. Terrorism  Combat this type of cyber crime, law enforcement agencies, particularly the FBI, have special units. The Cyber Division that deals specifically with cyber terrorism Cracking  Cracking can be difficult to solve, but any suspected cracking crimes should be discussed with a local law enforcement agency. If they do not have the man power to pursue the offender, the FBI may decide to pursue it
  21. Prevention Methods Frequent password changing  With the advent of multi-user systems, security has become dependent on passwords. Thus one should always keep passwords to sensitive data secure. Changing them frequently, and keeping them sufficiently complex in the first place can do this. Safe surfing  This is a practice, which should be followed by all users on a network. Safe surfing involves keeping ones e-mail address private, not chatting on open systems, which do not have adequate protection methods, visiting secure sites.
  22.  Accepting data from only known users, downloading carefully, and then from known sites also minimizes risk Frequent virus checks  One should frequently check ones computer for viruses and worms. Also any external media such as floppy disks and CD ROMS should always be virus checked before running Email filters  These are programs, which monitor the inflow of mails to the inbox and delete automatically any suspicious or useless mails thus reducing the chances of being bombed or spoofed
  23. To Conclude, A netizen should keep in mind the following things  To prevent cyber stalking avoid disclosing any information pertaining to oneself. This is as good as disclosing your identity to strangers in public place  Always avoid sending any photograph online particularly to strangers and chat friends as there have been incidents of misuse of the photographs  Always use latest and up date anti virus software to guard against virus attacks  Always keep back up volumes so that one may not suffer data loss in case of virus contamination
  24.  Never send your credit card number to any site that is not secured, to guard against frauds.  Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children.  It is better to use a security programme that gives control over the cookies and send information back to the site as leaving the cookies unguarded might prove fatal.  Web site owners should watch traffic and check any irregularity on the site. Putting host-based intrusion detection devices on servers may do this  Use of firewalls may be beneficial
  25.  And finally, Web servers running public sites must be physically separate protected from internal corporate network
Publicité