Certain cybercrimes you need to know about


Any criminal activity that uses a computer either as an instrumentality, target or a means for cyber crimesperpetuating further crimes comes within the ambit of cybercrime.
All crimes performed by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system. The followings are the top listed types of cybercrime:
Hacking
Hacking is a simple term means illegal intrusion into a computer system without the permission of the computer owner/user. Hackers usually do that with the intention of obtaining confidential information.
Virus Dissemination
Virus itself is software that attacks other software. It may cause for data loss, deduction of bandwidth speed, hardware damage etc. Trojan Horse, Time Bomb, Logic Bomb, Rabbit are the malicious software.
Software Piracy
Theft of software through the illegal coping of genuine programs or distribution of products intended to pass for the original.
Credit Card Fraud
You simply have to type credit card number into www page of the vendor for online transaction. If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.
Sale of Illegal Articles
Narcotics, weapons and wild life etc. are sold by posting information on websites, auction websites, and bulletin board or simply by using email communication. Many of auction sites are believed to be selling cocaine in the name of money.
Intellectual Property Crimes
These include software piracy, copyrights, infringement, trademark violations, theft of computer source code etc.
Email Spoofing
A spoofed email is one that appears to originate from one source but actually has been sent from another source. Personal Relationship may be jeopardized because of email spoofing.
Cyber Defamation
With help of computers and/ or the Internet When any defamation takes place it is called cyber defamation. It can tarnish personal image of any individual or reputation of any company, bank or institution.
Cyber Stalking
Cyber stalking involves following a person’s movement across the Internet by posting messages on the bulletin boards frequented by the victim, entering the chat-room frequently by the victim, constantly bombarding the victim with emails etc.
Email Bombing
Email bombing can be committed by sending huge number of emails to the victim resulting in the victim’s email account ( in case of an individual) or mail servers ( in case of company or an email service provider) crashing. Thousands of emails are sent to the personal account or mail server until it is crashed.
Data Diddling
Data diddling may be committed by altering raw data just before it is processed by a computer and then changing it back after processing is completed. Government offices may be victims to data diddling programs inserted when private parties were computerizing their systems.
Salami Attacks
For the commission of financial crimes salami attacks are used. Here the major thing is to make alteration which is so insignificant that in a single case it would go completely unnoticed. “For example a bank employee inserts a program, into the bank servers, that deduct a small amount of money from the account of every customer. No account holder will probably notice this unauthorized debit, but the bank employee will make a sizeable amount of money every month.

Child pornography

Child pornography is online trading of images of the children
involved in sexual activities.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s