Hi frenz lets we have a knowledge on types of cybercrime. As a cyberlaw student we should have a knowledge on it.
Types of Cybercrime
• DENIAL OF SERVICE
• VIRUS DISSEMINATION
• SOFTWARE PIRACY
• IRC Crime
• CREDIT CARD FRAUD
• CYBER STALKING
• SALAMI ATTACK
• NET EXTORTION
The act of gaining unauthorized access to a computer system or network and in some cases making unauthorized use of this access. Hacking is also the act by which other forms of cyber-crime (e.g., fraud, terrorism, etc.) are committed. Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
DENIAL OF SERVICE ATTACK
This is an act by the criminal, who floods the band width of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.
Malicious software that attaches iitself to other software.
(virus, worms, Trojan Horse, Time bomb,Logic Bomb, Rabbit and Bacterium are the malicious soft wares)
Theft of software through the iillegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Retail revenue losses world wide are ever increasing due to this crime
Can be done in various ways such as end user copying, hard disk loading, Counterfeiting, Illegal downloads from the iinternet etc.
Pornography is the first consistently successful ecommerce product. It was a
deceptive marketing tactics and mouse trapping technologies. Pronography encourage customers to access their websites. Anybody including children can log on to the internet and access website with pronography contents with a click of a mouse.
Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other Criminals use it for meeting coconspirators. Hackers use it for discussing their exploits / sharing the techniques
Paedophiles use chat rooms to allure small children.
CREDIT CARD FRAUD
You siimply have to type credit card number into www page off the vendor for
online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.
Copying the company’s confidential data in order to extort said company for huge amount.
It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means.
Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges ,, so as to obtain access to the other computers on the network.
The Criminal follows the victim by sending emails, entering the chat rooms frequently.
The Criminal sends emails containing defamatory matters to all concerned of the victim or post the defamatory matters on a website. (disgruntled employee may do this against boss, ex-boys friend against girl, divorced husband against wife etc)
The Criminal sends threatening email or comes in contact in chat rooms with
victim. (Any one disgruntled may do this against boss, friend or official)
In such crime criminal makes insignificant changes in such a manner that such changes
would go unnoticed. Criminal makes such program that deducts small amount like 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.
posted by Renuka a/p Jeyabalan